
Introduction | Wave Systems Corp. 2012
ESC 2.9.5 Client Manual
Contents
Contents ........................................................................................................................................................ 2
1. Introduction .......................................................................................................................................... 4
2. Installation ............................................................................................................................................ 5
2.1. Prerequisites ................................................................................................................................. 5
2.1.1. Hardware............................................................................................................................... 5
2.1.2. Supported Operating Systems .............................................................................................. 5
2.1.3. Other Requirements ............................................................................................................. 5
2.1.4. Compatibility with 3
rd
Party Security Packages ..................................................................... 6
2.1.5. Support Statement For SED Management ............................................................................ 7
2.2. Upgrades ....................................................................................................................................... 8
2.3. Interactive Installation .................................................................................................................. 9
2.4. Silent Installation ........................................................................................................................ 10
2.5. Installing ESC to Manage TPM .................................................................................................... 11
2.6. Repair an ESC Installation ........................................................................................................... 12
2.7. Services Installed by ESC ............................................................................................................. 13
3. Configuration for Remote Management of ESC ................................................................................. 14
3.1. Installation Procedure with No Manual ERAS Connector Configuration: ................................... 14
3.2. Easy Way to Re-Adjust ERAS Connector Settings: ...................................................................... 14
3.3. Out-Of-Domain Management with ERAS .................................................................................... 14
4. TPM Lifecycle Management ................................................................................................................ 15
4.1. How to Archive and Restore TPM keys ....................................................................................... 17
4.2. Wave Cryptographic Service Providers (CSPs) ............................................................................ 18
4.3. Wave Key Service Providers (KSPs) ............................................................................................. 18
4.4. Clearing and Disabling a TPM...................................................................................................... 19
5. TPM as a Virtual Smart Card ............................................................................................................... 20
5.1. Configuration .............................................................................................................................. 21
5.2. Usage ........................................................................................................................................... 21
5.3. Change Pin .................................................................................................................................. 23
5.4. Remote Desktop ......................................................................................................................... 23
5.5. Configure for Offline Windows Logon ........................................................................................ 24
5.5.1 Cached Virtual Smartcard Expiration .................................................................................. 25
5.6. Uninstallation/Removal .............................................................................................................. 25
5.7. Troubleshooting .......................................................................................................................... 25
6. Wave Endpoint Monitor ..................................................................................................................... 26
6.1. Client Requirements ................................................................................................................... 26
6.2. Additional WEM requirements ................................................................................................... 26
7. Secure Windows Logon ....................................................................................................................... 27
7.1. Biometrics ................................................................................................................................... 28
7.2. How to Enroll Fingerprints .......................................................................................................... 30
7.3. Smart Card at Secure Windows Logon ........................................................................................ 31
7.4. Configurable Logon Graphic........................................................................................................ 32
Kommentare zu diesen Handbüchern