PGP Endpoint Application Control 4.4 SR5 User guide

  • Hello! I am an AI chatbot trained to assist you with the PGP Endpoint Application Control 4.4 SR5 User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
User Guide
PGP Endpoint Application Control 4.4 SR5
PGP Endpoint Application Control
- 2 -
- 3 -
Notices
Version Information
PGP Endpoint Application Control User Guide - PGP Endpoint Application Control Version 4.4SR5 - Released:
September 2010
Document Number: 02_104P_4.4SR5_102711507
Copyright Information
Copyright
©
1991-2010 by PGP Corporation. All Rights Reserved. No part of this document can be reproduced or
transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written
permission of PGP Corporation.
Trademark Information
PGP, Pretty Good Privacy, and the PGP logo are registered trademarks of PGP Corporation in the US and other
countries. IDEA is a trademark of Ascom Tech AG. Windows and ActiveX are registered trademarks of Microsoft
Corporation. AOL is a registered trademark, and AOL Instant Messenger is a trademark, of America Online, Inc.
Red Hat and Red Hat Linux are trademarks or registered trademarks of Red Hat, Inc. Linux is a registered trademark
of Linus Torvalds. Solaris is a trademark or registered trademark of Sun Microsystems, Inc. AIX is a trademark or
registered trademark of International Business Machines Corporation. HP-UX is a trademark or registered trademark
of Hewlett-Packard Company. SSH and Secure Shell are trademarks of SSH Communications Security, Inc.
Rendezvous and Mac OS X are trademarks or registered trademarks of Apple Computer, Inc. All other registered
and unregistered trademarks in this document are the sole property of their respective owners.
Licensing and Patent Information
The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech AG. The
CAST-128 encryption algorithm, implemented from RFC 2144, is available worldwide on a royalty-free basis for
commercial and non-commercial uses. PGP Corporation has secured a license to the patent rights contained in the
patent application Serial Number 10/655,563 by The Regents of the University of California, entitled Block Cipher
Mode of Operation for Constructing a Wide-blocksize block Cipher from a Conventional Block Cipher. Some third-
party software included in PGP Universal Server is licensed under the GNU General Public License (GPL). PGP
Universal Server as a whole is not licensed under the GPL. If you would like a copy of the source code for the GPL
software included in PGP Universal Server, contact PGP Support (http://www.pgp.com/support). PGP Corporation
may have patents and/or pending patent applications covering subject matter in this software or its documentation;
the furnishing of this software or documentation does not give you any license to these patents.
Acknowledgements
This product includes or may include:
• The Zip and ZLib compression code, created by Mark Adler and Jean-Loup Gailly, is used with permission from
the free Info-ZIP implementation, developed by zlib (http://www.zlib.net). • Libxml2, the XML C parser and
toolkit developed for the Gnome project and distributed and copyrighted under the MIT License found at http://
www.opensource.org/licenses/mit-license.html. Copyright
©
2007 by the Open Source Initiative. • bzip2 1.0, a freely
available high-quality data compressor, is copyrighted by Julian Seward,
©
1996-2005. • Application server (http://
jakarta.apache.org/), web server (http://www.apache.org/), Jakarta Commons (http://jakarta.apache.org/commons/
license.html) and log4j, a Java-based library used to parse HTML, developed by the Apache Software Foundation.
The license is at www.apache.org/licenses/LICENSE-2.0.txt. • Castor, an open-source, databinding framework
for moving data from XML to Java programming language objects and from Java to databases, is released by the
ExoLab Group under an Apache 2.0-style license, available at http://www.castor.org/license.html. • Xalan, an open-
source software library from the Apache Software Foundation that implements the XSLT XML transformation
PGP Endpoint Application Control
- 4 -
language and the XPath XML query language, is released under the Apache Software License, version 1.1, available
at http://xml.apache.org/xalan-j/#license1.1. • Apache Axis is an implementation of the SOAP (“Simple Object
Access Protocol”) used for communications between various PGP products is provided under the Apache license
found at http://www.apache.org/licenses/LICENSE-2.0.txt. • mx4j, an open-source implementation of the Java
Management Extensions (JMX), is released under an Apache-style license, available at http://mx4j.sourceforge.net/
docs/ch01s06.html. • jpeglib version 6a is based in part on the work of the Independent JPEG Group. (http://
www.ijg.org/) • libxslt the XSLT C library developed for the GNOME project and used for XML transformations
is distributed under the MIT License http://www.opensource.org/licenses/mit-license.html. • PCRE version 4.5
Perl regular expression compiler, copyrighted and distributed by University of Cambridge.
©
1997-2006. The
license agreement is at http://www.pcre.org/license.txt. • BIND Balanced Binary Tree Library and Domain Name
System (DNS) protocols developed and copyrighted by Internet Systems Consortium, Inc. (http://www.isc.org)
• Free BSD implementation of daemon developed by The FreeBSD Project,
©
1994-2006. • Simple Network
Management Protocol Library developed and copyrighted by Carnegie Mellon University
©
1989, 1991, 1992,
Networks Associates Technology, Inc,
©
2001- 2003, Cambridge Broadband Ltd.
©
2001- 2003, Sun Microsystems,
Inc.,
©
2003, Sparta, Inc,
©
2003-2006, Cisco, Inc and Information Network Center of Beijing University of Posts
and Telecommunications,
©
2004. The license agreement for these is at http://net-snmp.sourceforge.net/about/
license.html. • NTP version 4.2 developed by Network Time Protocol and copyrighted to various contributors.
• Lightweight Directory Access Protocol developed and copyrighted by OpenLDAP Foundation. OpenLDAP is
an open-source implementation of the Lightweight Directory Access Protocol (LDAP). Copyright
©
1999-2003,
The OpenLDAP Foundation. The license agreement is at http://www.openldap.org/software/release/license.html.
• Secure shell OpenSSH version 4.2.1 developed by OpenBSD project is released by the OpenBSD Project under
a BSD-style license, available at http://www.openbsd.org/cgibin/cvsweb/src/usr.bin/ssh/LICENCE?rev=HEAD.
• PC/SC Lite is a free implementation of PC/SC, a specification for SmartCard integration is released under the
BSD license. • Postfix, an open source mail transfer agent (MTA), is released under the IBM Public License 1.0,
available at http://www.opensource.org/licenses/ibmpl.php. • PostgreSQL, a free software object-relational database
management system, is released under a BSD-style license, available at http://www.postgresql.org/about/licence. •
PostgreSQL JDBC driver, a free Java program used to connect to a PostgreSQL database using standard, database
independent Java code, (c) 1997-2005, PostgreSQL Global Development Group, is released under a BSD-style
license, available at http://jdbc.postgresql.org/license.html. • PostgreSQL Regular Expression Library, a free
software object-relational database management system, is released under a BSD-style license, available at http://
www.postgresql.org/about/licence. • 21.vixie-cron is the Vixie version of cron, a standard UNIX daemon that runs
specified programs at scheduled times. Copyright
©
1993, 1994 by Paul Vixie; used by permission. • JacORB, a Java
object used to facilitate communication between processes written in Java and the data layer, is open source licensed
under the GNU Library General Public License (LGPL) available at http://www.jacorb.org/lgpl.html. Copyright
©
2006 The JacORB Project. • TAO (The ACE ORB) is an open-source implementation of a CORBA Object Request
Broker (ORB), and is used for communication between processes written in C/C++ and the data layer. Copyright
(c) 1993-2006 by Douglas C. Schmidt and his research group at Washington University, University of California,
Irvine, and Vanderbilt University. The open source software license is available at http://www.cs.wustl.edu/
~schmidt/ACEcopying. html. • libcURL, a library for downloading files via common network services, is open
source software provided under a MIT/X derivate license available at http://curl.haxx.se/docs/copyright.html.
Copyright (c) 1996 - 2007, Daniel Stenberg. • libuuid, a library used to generate unique identifiers, is released under
a BSD-style license, available at http://thunk.org/hg/e2fsprogs/?file/fe55db3e508c/lib/uuid/COPYING. Copyright
(C) 1996, 1997 Theodore Ts’o. • libpopt, a library that parses command line options, is released under the terms
of the GNU Free Documentation License available at http://directory.fsf.org/libs/COPYING.DOC. Copyright
©
2000-2003 Free Software Foundation, Inc. • gSOAP, a development tool for Windows clients to communicate with
the Intel Corporation AMT chipset on a motherboard, is distributed under the GNU Public License, available at
Notices
- 5 -
http://www.cs.fsu.edu/~engelen/soaplicense.html. • Windows Template Library (WRT) is used for developing user
interface components and is distributed under the Common Public License v1.0 found at http://opensource.org/
licenses/cpl1.0.php. • The Perl Kit provides several independent utilities used to automate a variety of maintenance
functions and is provided under the Perl Artistic License, found at http://www.perl.com/pub/a/language/misc/
Artistic.html.
Export Information
Export of this software and documentation may be subject to compliance with the rules and regulations promulgated
from time to time by the Bureau of Export Administration, United States Department of Commerce, which restricts
the export and re-export of certain products and technical data.
Limitations
The software provided with this documentation is licensed to you for your individual use under the terms of the End
User License Agreement provided with the software. The information in this document is subject to change without
notice. PGP Corporation does not warrant that the information meets your requirements or that the information is
free of errors. The information may include technical inaccuracies or typographical errors. Changes may be made to
the information and incorporated in new editions of this document, if and when made available by PGP Corporation.
PGP Endpoint Application Control
- 6 -
Table of Contents
- 7 -
Table of Contents
Preface: About This Document................................................................................................................................11
Typographical Conventions........................................................................................................................................................11
Getting Assistance......................................................................................................................................................................11
Chapter 1: PGP Endpoint Application Control Overview................................................................................... 13
Product Overview.......................................................................................................................................................................14
Application Control Server, Database and Client Process........................................................................................................16
System Requirements.................................................................................................................................................................16
Minimum Hardware Requirements......................................................................................................................................17
Supported Operating Systems..............................................................................................................................................18
Supported Databases............................................................................................................................................................21
Other Software Requirements..............................................................................................................................................21
Recommended Configuration.............................................................................................................................................. 22
Client Supported Languages................................................................................................................................................22
Chapter 2: Using Application Control....................................................................................................................23
Getting Started with PGP Endpoint Application Control......................................................................................................... 23
The File Authorization Setup Process.......................................................................................................................................24
Accessing the Management Server Console............................................................................................................................. 26
Logging In to the Management Server Console.................................................................................................................26
Logging Out of the Management Server Console..............................................................................................................27
Common Functions within the Management Server Console...................................................................................................27
Viewing the Management Server Console..........................................................................................................................27
Common Conventions..........................................................................................................................................................28
Using the Management Server Console Control Panel.......................................................................................................29
Resizing and Repositioning Panels..................................................................................................................................... 29
Organizing Columns for Display.........................................................................................................................................30
Using the File Menu............................................................................................................................................................31
Using the View Menu..........................................................................................................................................................31
Using the Tools Menu.........................................................................................................................................................32
Using the Reports Menu......................................................................................................................................................33
Using the Explorer Menu....................................................................................................................................................33
Using the Window Menu.................................................................................................................................................... 34
Using the Help Menu.......................................................................................................................................................... 34
PGP Endpoint Application Control
- 8 -
PGP Endpoint Application Control Modules......................................................................................................................35
License Expiration......................................................................................................................................................................35
Chapter 3: Using the Authorization Wizard..........................................................................................................37
Working with the Authorization Wizard...................................................................................................................................37
Authorizing Executable Files...............................................................................................................................................38
Chapter 4: Using Modules........................................................................................................................................43
Working with Scan Explorer.....................................................................................................................................................44
Creating a File Scanning Template ....................................................................................................................................44
Scanning Files on a Client Computer.................................................................................................................................47
Comparing Scans................................................................................................................................................................. 49
Modifying File Authorization..............................................................................................................................................51
Local Authorization............................................................................................................................................................. 51
Working with the Exe Explorer ............................................................................................................................................... 53
Setting Up the Exe Explorer Default Options.................................................................................................................... 53
Adding a File Group............................................................................................................................................................54
Renaming a File Group....................................................................................................................................................... 55
Deleting a File Group..........................................................................................................................................................56
Working with User Explorer..................................................................................................................................................... 56
About File Groups............................................................................................................................................................... 56
File Group by User Tab.....................................................................................................................................................57
The User by File Group Tab...............................................................................................................................................61
Working with Database Explorer.............................................................................................................................................. 63
The Files Tab.......................................................................................................................................................................65
The Groups Tab...................................................................................................................................................................68
Working with Log Explorer.......................................................................................................................................................70
The Log Explorer Window..................................................................................................................................................71
Navigation Control Bar........................................................................................................................................................71
Column Headers...................................................................................................................................................................72
Log Explorer Templates...................................................................................................................................................... 79
Select and Edit Templates Dialog.......................................................................................................................................84
Template Settings Dialog.....................................................................................................................................................87
Criteria/Properties Panel...................................................................................................................................................... 98
Results Panel/Custom Report Contents...............................................................................................................................98
Upload Latest Log Files....................................................................................................................................................102
Chapter 5: Using Tools........................................................................................................................................... 105
Table of Contents
- 9 -
Synchronizing Domains........................................................................................................................................................... 106
Synchronizing Domain Members......................................................................................................................................106
Synchronizing Domain Users............................................................................................................................................107
Database Clean Up...................................................................................................................................................................107
Deleting Database Records................................................................................................................................................108
Defining User Access...............................................................................................................................................................109
Assigning Administrators...................................................................................................................................................110
Defining Administrator Roles............................................................................................................................................111
Assigning Administrator Roles..........................................................................................................................................113
Defining Default Options.........................................................................................................................................................114
Default Options Page.........................................................................................................................................................114
Default Option Precedence Rules......................................................................................................................................121
Changing Default Options.................................................................................................................................................127
Managing Path Rules............................................................................................................................................................... 127
Creating a Path Rule for All Users...................................................................................................................................129
Creating a Path Rule for a User or User Group...............................................................................................................132
Modifying a Path Rule...................................................................................................................................................... 135
Deleting a Path Rule..........................................................................................................................................................137
Defining a Trusted Owner.................................................................................................................................................138
Deleting a Trusted Owner................................................................................................................................................. 140
Defining Spread Check............................................................................................................................................................141
Enabling Spread Check......................................................................................................................................................141
Sending File Authorization Updates to Computers.................................................................................................................142
Sending Updates to All Computers...................................................................................................................................142
Sending Updates to a Single Computer............................................................................................................................142
Working with Standard File Definitions................................................................................................................................. 143
Importing Standard File Definitions..................................................................................................................................144
Exporting File Authorization Settings.....................................................................................................................................145
Exporting Settings..............................................................................................................................................................146
Importing Settings..............................................................................................................................................................146
Working with Endpoint Maintenance......................................................................................................................................147
Creating Endpoint Maintenance Tickets........................................................................................................................... 148
Chapter 6: Using Reports.......................................................................................................................................151
About Reports...........................................................................................................................................................................151
Reporting by User Role...........................................................................................................................................................151
Working with Reports..............................................................................................................................................................152
PGP Endpoint Application Control
- 10 -
Opening a Report...............................................................................................................................................................152
Closing a Report................................................................................................................................................................ 152
Saving a Report..................................................................................................................................................................152
Printing a Report................................................................................................................................................................153
Available Reports...............................................................................................................................................................153
File Groups by User.......................................................................................................................................................... 154
User by File Group............................................................................................................................................................155
User Options.......................................................................................................................................................................156
Machine Options................................................................................................................................................................157
Client Status....................................................................................................................................................................... 158
Server Settings................................................................................................................................................................... 159
Chapter 7: Using PGP Endpoint Client Deployment..........................................................................................161
PGP Endpoint Client Deployment Window............................................................................................................................162
Packages Panel...................................................................................................................................................................162
Packages Menu...................................................................................................................................................................163
Computers Panel................................................................................................................................................................ 163
Computers Menu................................................................................................................................................................164
Creating Deployment Packages............................................................................................................................................... 165
Adding Computers....................................................................................................................................................................168
Deploying Packages................................................................................................................................................................. 170
Querying Client Status.............................................................................................................................................................174
Appendix A: PGP Endpoint Administrative Tools..............................................................................................177
Using the PGP Endpoint Authorization Service Tool.............................................................................................................177
Scheduling Domain Synchronization.......................................................................................................................................181
Manage Administrator Rights..................................................................................................................................................183
Using PGP Endpoint with Novell........................................................................................................................................... 184
Using Novell Shared Data File Directory.........................................................................................................................184
Running the Novell Synchronization Script......................................................................................................................185
Opening Firewall Ports............................................................................................................................................................ 186
Open Ports by Firewall Exception.................................................................................................................................... 186
Open Ports by Active Directory Policy............................................................................................................................ 187
- 11 -
Preface
About This Document
This User Guide is a resource written for all users of PGP Endpoint Application Control 4.4 SR5. This document
defines the concepts and procedures for installing, configuring, implementing, and using PGP Endpoint
Application Control 4.4 SR5.
Tip:
PGP documentation is updated on a regular basis. To acquire the latest version of this or any other published
document, please refer to the PGP Support Portal Web Site (https://support.pgp.com).
Typographical Conventions
The following conventions are used throughout this documentation to help you identify various information
types.
Table 1: Typographical Conventions
Convention Usage
bold Buttons, menu items, window and screen objects.
bold italics
Wizard names, window names, and page names.
italics New terms, options, and variables.
MONOSPACE UPPERCASE Keyboard keys.
BOLD UPPERCASE SQL Commands.
monospace File names, path names, programs, executables, command syntax, and
property names.
Getting Assistance
Getting Product Information
Unless otherwise noted, the product documentation is provided as Adobe Acrobat PDF files that are installed
with PGP Endpoint. Online help is available within the PGP Endpoint product. Release notes are also available,
which may have last-minute information not found in the product documentation.
PGP Endpoint Application Control
- 12 -
Contacting Technical Support
To learn about PGP support options and how to contact PGP Technical Support, please visit the PGP
Corporation Support Home Page (http://www.pgp.com/support).
To access the PGP Support Knowledge Base or request PGP Technical Support, please visit PGP Support
Portal Web Site (https://support.pgp.com).
Note:
You may access portions of the PGP Support Knowledge Base without a support agreement; however, you
must have a valid support agreement to request Technical Support.
For any other contacts at PGP Corporation, please visit the PGP Contacts Page (http://www.pgp.com/
company/contact/index.html).
For general information about PGP Corporation, please visit the PGP Web Site (http://www.pgp.com).
To access the PGP Support forums, please visit PGP Support (http://forums.pgpsupport.com). These are user
community support forums hosted by PGP Corporation.
- 13 -
Chapter
1
PGP Endpoint Application Control Overview
In this chapter:
Product Overview
Application Control Server,
Database and Client Process
System Requirements
PGP offers a complete portfolio of solutions for controlling the use of
software applications and devices in your computing environment.
PGP Endpoint solutions include:
PGP Endpoint Device Control, which prevents unauthorized
transfer of applications and data by controlling access to input and
output devices, such as memory sticks, modems, and PDAs.
PGP Endpoint Device Control client for Embedded Devices, which
moves beyond the traditional desktop and laptop endpoints to a
variety of platforms that include ATMs, industrial robotics, thin
clients, set-top boxes, network area storage devices and the myriad
of other systems running Microsoft
®
Windows XP
®
Embedded.
PGP Endpoint Application Control, which delivers granular control
of application execution in an enterprise environment.
PGP Endpoint Application Control Terminal Services Edition,
which extends application control to Citrix
®
or Microsoft Terminal
Services
®
environments that share applications among multiple
users.
PGP Endpoint Application Control Server Edition, which delivers
application control to protect enterprise servers, such as web
servers, e-mail servers, and database servers.
PGP Endpoint Application Control
- 14 -
Product Overview
PGP Endpoint software is based on a multi-tier software architecture that processes and stores data for
Application Control and Device Control. Users can interact with the application through the client interface. A
separate Management Server Console provides a user interface for network administrators.
The primary components of the PGP Endpoint Application Control solution are:
The Application Control database which serves as the central repository of authorization information for
devices and applications.
One or more Administration Servers that communicate between the database, the protected clients, and the
Management Server Console.
The Management Server Console, which provides the administrative user interface for the Administration
Server.
The Application Control client, which is installed on each computer, either endpoint or server, that you want
to protect.
PGP Endpoint Application Control Overview
- 15 -
The following figure illustrates the relationships between the PGP Endpoint components.
Figure 1: Application Control Component Relationships
PGP Endpoint Application Control
- 16 -
Application Control Server, Database and Client Process
The Administration Server communicates between the database and the protected client computers.
The following describes the communication process flow between the Administration Servers, database, and
clients when using Application Control.
Figure 2: Application Control Process Flow
System Requirements
The following sections describe the minimum system requirements necessary for successful installation of PGP
Endpoint and the languages supported by the client.
The listed specifications are a minimum; larger network environments, may require additional hardware and
software resources. The system requirements for PGP Endpoint are listed in the following topics.
PGP Endpoint Application Control Overview
- 17 -
Minimum Hardware Requirements
The minimum PGP Endpoint hardware requirements depend upon your service network environment, including
the type of database supported, the number of Administration Servers you need to support a distributed network,
and the number of subscribed clients.
The hardware requirements for PGP Endpoint vary depending upon the number of servers and clients you
manage. The following minimum hardware requirements will support up to:
200 connected PGP Endpoint clients for PGP Endpoint Device Control
50 connected PGP Endpoint clients for PGP Endpoint Application Control
Table 2: Minimum Hardware Requirements
PGP Endpoint Component Requirement
Database
1 GB (4 GB recommended) memory
Pentium
®
Dual-Core CPU processor or AMD equivalent
3 GB minimum hard disk drive
100 MBits/s NIC
Administration Server
512 MB (1 GB recommended) memory
Pentium
®
Dual-Core CPU or AMD equivalent
3 GB minimum hard disk drive
100 MBits/s NIC
Management Server Console
512 MB (1 GB recommended) memory
15 MB hard disk drive for installation, and 150 MB additional for
application files
1024 by 768 pixels for display
Client
256 MB (1 GB recommended) memory
10 MB hard disk drive for installation, and several additional GB for
full shadowing feature of PGP Endpoint Device Control
100 MBits/s NIC
PGP Endpoint Application Control
- 18 -
Supported Operating Systems
PGP Endpoint supports multiple Microsoft Windows operations systems for the Administration Server,
Management Server Console, database, and client.
The operating system requirements for PGP Endpoint components are outlined as follows.
Table 3: Operating System Requirements
PGP Endpoint Component Requirement
Database One of the following:
Microsoft Windows
®
XP Professional Service Pack 2 or higher
(SP2+) (32-bit)
Windows XP Service Pack 2 (SP2) (64-bit)
Microsoft Windows Server 2003, Standard Edition with Service
Pack 2 (SP2) or later (32-bit)
Microsoft Windows Server 2003, Enterprise Edition with SP2
or later (32-bit)
Microsoft Windows Server 2008, Standard Edition with SP2 or
later (32-bit and 64-bit)
Microsoft Windows Server 2008, Enterprise Edition with SP2
or later (32-bit and 64-bit)
Microsoft Windows Server 2008 R2 (64 bit only)
Administration Server One of the following:
Windows Server 2003, Standard Edition with SP2 or later (32-
bit)
Windows Server 2003, Enterprise Edition with SP2 or later (32-
bit)
Windows Server 2008, Standard Edition with SP2 or later (32-
bit and 64-bit)
Windows Server 2008, Enterprise Edition with SP2 or later (32-
bit and 64-bit)
Windows Server 2008 R2 (64 bit only)
PGP Endpoint Application Control Overview
- 19 -
PGP Endpoint Component Requirement
Management Server Console One of the following:
Windows XP Professional SP2+ (32-bit)
Windows Server 2003, Standard Edition with SP2 or later (32-
bit)
Windows Server 2003, Enterprise Edition with SP2 or later (32-
bit)
Windows Server 2008, Standard Edition with SP2 or later (32-
bit and 64-bit)
Windows Server 2008, Enterprise Edition with SP2 or later (32-
bit and 64-bit)
Windows Server 2008 R2 (64 bit only)
Microsoft Windows Vista
SP1+ (32- and 64-bit)
Microsoft Windows 7 (32- and 64-bit)
PGP Endpoint Application Control
- 20 -
PGP Endpoint Component Requirement
Client One of the following:
Microsoft Windows
®
Server 2000 Service Pack 4 or higher
(SP4+) (32-bit)
Microsoft Windows 2000 Professional SP4+ (32-bit)
Microsoft Windows XP Professional Service Pack 2 or higher
(SP2+) (32- and 64-bit)
Windows Server 2003, Standard Edition with SP2 or later (32-
bit)
Windows Server 2003, Enterprise Edition with SP2 or later (32-
bit)
Windows Server 2008, Standard Edition with SP2 or later (32-
bit and 64-bit)
Windows Server 2008, Enterprise Edition with SP2 or later (32-
bit and 64-bit)
Windows Server 2008 R2 (64 bit only)
Windows Vista SP1+ (32- and 64-bit)
Windows 7 (32- and 64-bit)
Microsoft Windows XP Embedded (XPe) Service Pack 2 (SP2)
(32-bit)
Microsoft Windows Embedded Point of Service (WEPOS) (32-
bit)
Microsoft Windows XP Tablet PC Edition (32-bit)
Citrix Access Gateway
4.5
Citrix Presentation Server
4.0 for Windows Server 2003 SP1/
SR2+ (32-bit)
Citrix Presentation Server 4.5 for Windows Server 2003 SP1/
SR2+ (32- and 64-bit)
/