Novell ZENworks Endpoint Security Management 3.5 Manuale Utente

Pagina di 245
ZENworks® ESM 3.5
Administrator’s Manual
62
ZENworks File Decryption Utility
The ZENworks File Decryption Utility is used to extract protected data from the Shared Files 
folder on encrypted removable storage devices. This simple tool can be provided by the user 
(though it cannot be placed on the removable storage device), to a third party so they can access 
the files in the Shared Files folder.
Common Use of the File Decryption Utility
To use the File Decryption Utility:
Step 1: Plug the storage device into the appropriate port on your computer.
Step 2: Open the File Decryption Utility.
Step 3: Browse to the storage device’s Shared Files directory and select the desired file.
Step 4: To extract directories (folders) rather than files, click the Advanced button and select 
Directories, then browse to the appropriate directory (click Basic to return to the default 
view). 
Step 5: Browse to the path on the local machine where these files will be stored.
Step 6: Click Extract.
The transaction can be monitored by clicking the Show Progress button.
Administrator Configured Decryption Utility
The File Decryption Utility can also be configured in “administrator mode” with the current key 
set, and can extract all data from an encrypted storage device. This configuration is not 
recommended, as it can potentially compromise all current keys used by SES. However, in cases 
where the data would be unrecoverable otherwise, this configuration may be necessary.
To configure the tool:
Step 1: Create a shortcut of the File Decryption Utility within its current directory.
Step 2: Right-click the shortcut and select Properties.
Step 3: At the end of the target name, and after the quotes, enter -k (example: "C:\Admin 
Tools\stdecrypt.exe" -k).
Step 4: Click Apply then OK
Step 5: Open the tool using the shortcut and click Advanced.
Step 6: Click the Load Keys button, the Import Key window will open.
Step 7: In this window, browse for the keys file and enter the password for the keys. 
Step 8: All files encrypted with these keys can now be extracted.