all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual | Users Manual | 662.67 KiB | September 11 2009 / October 11 2009 | |||
1 | Cover Letter(s) | September 11 2009 / October 11 2009 | ||||||
1 | Cover Letter(s) | September 11 2009 / October 11 2009 | ||||||
1 | Cover Letter(s) | September 11 2009 / October 11 2009 | ||||||
1 | Cover Letter(s) | September 11 2009 / October 11 2009 | ||||||
1 | Cover Letter(s) | September 11 2009 / October 11 2009 | ||||||
1 | Operational Description | September 11 2009 / October 11 2009 | ||||||
1 | External Photos | September 11 2009 / October 11 2009 | ||||||
1 | Internal Photos | September 11 2009 / October 11 2009 | ||||||
1 | ID Label/Location Info | September 11 2009 / October 11 2009 | ||||||
1 | Test Report | September 11 2009 / October 11 2009 | ||||||
1 | Test Setup Photos | September 11 2009 / October 11 2009 |
1 | User Manual | Users Manual | 662.67 KiB | September 11 2009 / October 11 2009 |
Users Guide XyLoc Client
(ver 8.x.x) Table of Contents Introduction .................................................................................................................................... 4 Your XyLoc Package ............................................................................................................................... 4 Support Information ................................................................................................................................. 4 XyLoc Core Functionality ........................................................................................................................ 5 XyLoc Solo Overview .................................................................................................................... 6 The XyLoc System ................................................................................................................................... 6 XyLoc Product Architecture .................................................................................................................... 7 How XyLoc Works ........................................................................................................................................... 7 XyLoc Secure Login and Password Overview ......................................................................................... 8 Windows 2000/XP ............................................................................................................................................ 8 XyLoc Password ............................................................................................................................................... 8 Getting Started ............................................................................................................................... 9 Using the XyLoc Lock ............................................................................................................................. 9 Installing the XyLoc Lock (USB) ............................................................................................................ 9 Placement of the XyLoc Lock ........................................................................................................................... 9 The XyLoc Lock Status Light ......................................................................................................................... 11 Using the XyLoc Key ............................................................................................................................. 12 Installing the XyLoc Software ............................................................................................................... 14 Understanding Core Settings .................................................................................................................. 27 Administrative Levels ..................................................................................................................................... 27 Administrator .......................................................................................................................................... 27 User ......................................................................................................................................................... 28 Guest ....................................................................................................................................................... 28 AutoLogon ...................................................................................................................................................... 28 Authentication Methods .................................................................................................................................. 28 Login Authentication ............................................................................................................................... 28 Unlock Authentication ............................................................................................................................ 29 Configuring the XyLoc Software ........................................................................................................... 30 Security Configuration and User Preferences .................................................................................................. 30 User Setup ....................................................................................................................................................... 31 User Name ............................................................................................................................................... 31 Add User ............................................................................................................................................. 32 What It Does: ......................................................................................................................................... 32 Delete User .......................................................................................................................................... 32 Key ID ..................................................................................................................................................... 32 Add Key .............................................................................................................................................. 32 Delete Key ........................................................................................................................................... 32 Login Authentication ............................................................................................................................... 32 Allow Password Override (No Key) ....................................................................................................... 33 Unlock Authentication ............................................................................................................................ 34 Allow Password Override (No Key) ....................................................................................................... 34 Unlock to Key Only for up to x seconds/minutes .................................................................................... 34 Range ...................................................................................................................................................... 35 Range Refinement ................................................................................................................................... 35 Personal Name ........................................................................................................................................ 35 Advanced Settings ................................................................................................................................... 35 Advanced User Settings .................................................................................................................................. 36 Administrative Level ............................................................................................................................... 36 Auto Logoff Time ................................................................................................................................... 37 User can logoff locked workstation ......................................................................................................... 37 Key ID ..................................................................................................................................................... 37 Pass Key .................................................................................................................................................. 38 Beep When Locking ................................................................................................................................ 38 Lock if the Key is Stationary for ............................................................................................................. 38 Note: Ensure recommends the 1-minute option for demonstration purposes only. .............................. 38 Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 2 of 62 XyLoc Password ..................................................................................................................................... 39 What It Does: ......................................................................................................................................... 39 Sets the XyLoc password. ..................................................................................................................... 39 Note: This box will only appear if this key is part of a Kiosk Account. .............................................. 39 Lock in Password Override ..................................................................................................................... 39 Run Application Integration Logoff ........................................................................................................ 39 Setting the Active Zone ........................................................................................................................... 40 Adding New Users .................................................................................................................................. 42 Kiosk Accounts ....................................................................................................................................... 45 Adding New Keys ................................................................................................................................... 46 PC Setup .......................................................................................................................................................... 48 XyLoc Lock Attached To ........................................................................................................................ 48 XyLoc Security Server Search Order ...................................................................................................... 48 Log Records To Upload .......................................................................................................................... 49 Advanced Settings ................................................................................................................................... 49 Advanced PC Settings ..................................................................................................................................... 50 XSS Client Port ....................................................................................................................................... 50 XyLoc Mode ........................................................................................................................................... 50 Min. Password Length ............................................................................................................................. 50 Logging ........................................................................................................................................................... 51 User Activity Log .................................................................................................................................... 51 NOTE: This option will only be available to a XyLoc Administrator. ................................................ 51 Testing XyLoc Keys ....................................................................................................................................... 52 Find Specific Key Mode .......................................................................................................................... 53 Find Strongest Key Mode ........................................................................................................................ 53 Sequence number .................................................................................................................................... 53 Range ...................................................................................................................................................... 54 Key Voltage ............................................................................................................................................ 54 Key Revision ........................................................................................................................................... 54 Overriding the XyLoc System ................................................................................................................ 55 User Forgets Their Key ............................................................................................................................... 55 User Does Not Have a XyLoc Key ............................................................................................................. 56 Unlocking using Password Override ........................................................................................................... 56 Replacing the XyLoc Battery ................................................................................................................. 57 Software Removal .................................................................................................................................. 57 Troubleshooting ..................................................................................................................................... 58 System Functionality ................................................................................................................... 60 Normal Operational Mode ..................................................................................................................... 60 Hardware Architecture ........................................................................................................................... 60 Radio Frequency (RF) System ............................................................................................................... 60 Spectral Reuse ................................................................................................................................................. 61 Time Division Multiple Access (TDMA) ....................................................................................................... 61 Technical Specifications ................................................................................................................................. 61 Revision History ........................................................................................................................... 62 Ensure Technologies, 1998-2008. All rights reserved. XyLoc and Ensure Technologies are trademarks of Ensure Technologies, Inc. Other trademarks are the property of their respective owners. Acrobat Reader copyright 1987-2008 Adobe Systems Incorporated. All rights reserved. Adobe and Acrobat are trademarks of Adobe Systems Incorporated Technical information contained herein is subject to change without notice. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 3 of 62 Your XyLoc Package The following is a checklist of all items included in the XyLoc Users Package:
Introduction
Software Release Notes
Quick Start Instructions
XyLoc Solo
XyLoc Key
XyLoc USB Lock
USB Extension Cable
XyLoc Lanyard
CD-ROM containing:
XyLoc software installer
Electronic version of XyLoc Users Guide in Adobe Acrobat format
Adobe Acrobat Reader installer Support Information We are available to answer any questions or provide any needed assistance. Please contact:
Ensure Technologies Technical Support
(734) 547-1631 support@ensuretech.com FCC Compliance This device complies with Part 15 of the FCC Rules and with RSS-210 of Industry Canada. Operation of this device is subject to the following two conditions:
1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause undesired operation. Warning: Changes or modifications not expressly approved by Ensure Technologies for compliance could void the users authority to operate the equipment. The term IC: before the radio certification number only signifies that Industry Canada technical specifications were met. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 4 of 62 XyLoc Core Functionality The XyLoc Solo is a flexible hardware/software platform with expanding capabilities. Below is an overview of the core capabilities in the XyLoc Solo and future capabilities. Capability Functionality Full-Time Access Control Continuously monitors for the presence or absence of authorized users, secures the PC when user leaves Active Zone, and unlocks when user returns Proximity-Based ID and Authentication Confirms the users identity and verifies authorized access to the PC based on users proximity to PC Automatic Network Logon Provides automatic logon to pre-configured network services; maintains network sessions when the user leaves Active Zone. Multi-User Support One Key can be programmed to unlock hundreds of Locks (for system administrators or department managers); One Lock can support multiple Keys (for shared PC environments); Kiosk accounts Access Methods Single factor security: Hands-Free, Select User Name Dual factor security (recommended): Must Enter Password Transparent Operation Protects PC without requiring any action or intervention by the user Programmable Range User-definable Active Zone for maximum flexibility Management User or administrator locally manages and administers XyLoc system System Connection Connects via the USB port OS Support Key Type Installation Screen Saver Support Windows 2000, and XP. NOTE: Windows 95, Windows 98, NT4 and Windows ME are not supported KeyCard Installs in minutes using only one cable and simple installation Wizard Any windows screen saver is supported. NOTE: Since XyLoc takes over the security of the workstation a password protected screen saver in Windows 2000/XP is no longer available or needed. XyLoc will secure the workstation for the user immediately when they exit the Active Zone. Scalable Management XyLoc Security Server for central management and audit log tracking of the users Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 5 of 62 XyLoc Solo Overview XyLoc Solo delivers desktop security that positively identifies authorized users and permits access to PCs and portables as appropriate. The focus of XyLoc Solo is three-fold:
1. Providing full-time access control to PCs and portables 2. Taking the burden of compliance off the end user 3. Making the computer more convenient for the user XyLoc Solo runs on Windows 2000 and Windows XP. It has been designed with careful consideration to the varying security dynamics of these operating systems. XyLoc provides an additional layer of protection to the built-in security capabilities of Windows 2000 and XP. The XyLoc System XyLoc KeyCard XyLoc Lock Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 6 of 62 XyLoc Product Architecture XyLoc is a microprocessor-based turnkey solution. Its patented technology is based on wireless radio frequency (RF) technology that continuously monitors authorized users based on their proximity to the PC and grants access to the PC as appropriate. The XyLoc system consists of:
XyLoc Software: authenticates and identifies multiple users and controls the lock and key;
XyLoc Lock: a small ultra-low power receiver that plugs into a USB port;
XyLoc Key: a small, wireless transmitter with unique user ID that can be clipped to a belt or key ring, worn on a neck lanyard, or attached to an ID badge. How XyLoc Works The XyLoc Lock and Key are in constant, encoded two-way wireless communication with each other. As an authorized user approaches the PC, the XyLoc Key identifies and authenticates the user, and unlocks the PC when the user enters the pre-set Range. Then, when the authorized user moves out of the Active Zone, XyLoc automatically secures the desktop. The PC is instantly secured and remains so until an authorized user returns to within a user-configured unlock range. Background tasks, such as printing and downloading, however, may continue while the PC is securely locked. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 7 of 62 XyLoc Secure Login and Password Overview Windows 2000/XP The Windows NT based Operating Systems (2000/XP) are designed with more inherent security. There is already a GINA in place which controls the logins, profiles and security permissions on the workstation. The XyLoc system also has a GINA, which takes over the primary windows logon and in turn calls the Microsoft GINA. Most of the inherent Microsoft security is still in place, and XyLoc enhances that security with a proximity based solution. The XyLoc Secure Login will be the first screen that is displayed on the PC, and the same basic login process will be used. The exception is that hitting CTRL+ALT+DEL on the keyboard will allow access to the standard Microsoft/Novell login box and a user can login with a valid local or domain account and override XyLoc. This is to allow an Administrator to still gain access to the PC, even if that Administrator does not have a XyLoc account. There is a registry setting that can be enabled which will block all non-XyLoc accounts from gaining access to the system, even Administrators, however this setting is disabled on the default installation. Also, the F8 keystroke at boot up is not disabled at login. This is due to the security of Windows itself, and only an Administrator should have access to truly bypass XyLoc in Safe Mode. Lastly, in Windows 2000/XP, the password-protected screensaver is no longer password protected. Because XyLoc takes control of the security of the workstation, XyLoc also handles the locking action of the PC. Since the system will lock immediately when the user leaves his/her active range the password protection on the screensaver is no longer needed. It will still function as a standard screensaver, but will no longer have a password. XyLoc Password For flexibility and security, the XyLoc system provides an additional password, the XyLoc Password (sometimes referred to as a PIN). The XyLoc password is only used in a Kiosk account and has two possible applications:
1. It is used by the Kiosk Account feature to provide multi-factor authentication in a shared log-on account. NOTE: Starting in version 8.2.4, this is the only password that is accepted in conjunction with a users XyLoc key. 2. It is used in conjunction with the users Personal Name when performing a Password Override in a Kiosk account to ensure individual security even when a XyLoc Key is not present. NOTE: In a XyLoc Solo, when used in a unique account environment, the XyLoc Password
(PIN) will synchronize with the users unique account password. The Kiosk account is the only type that will have a XyLoc password that can differ from the users system account password. If it is desired to use at PIN with a unique account, XyLoc 8.3.6 with XSS 4.2.4 must be used. Earlier version of either will not support this functionality. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 8 of 62 Getting Started Using the XyLoc Lock The XyLoc Lock included in this package is a low power receiver that is connected to the PC through a USB interface. Note: Windows 2000/XP users must have local Administrator privileges to complete the installation. Installing the XyLoc Lock (USB) 1. Close all open applications. 2. Please wait to attach USB XyLoc lock until prompted by XyLoc software install wizard. 3. Insert the XyLoc CD into the CD drive. 4. Install the XyLoc System Software. If the Auto Run does not start the CD, please go to the CD and click on the Install.exe file and follow the instructions. Placement of the XyLoc Lock USB Plug XyLoc uses advanced wireless technology to make PC security more convenient for the user. The proper placement of the XyLoc Lock will ensure that users get the best performance from XyLoc. For additional guidelines and suggestions, please view the XyLoc Positioning Tutorial included on the installation CD. Ideal placement is with the face of the Key parallel to the LED on the front of the Lock. The best performance of the system will be achieved by trying to maintain this positioning while you are seated at your PC doing your work. The primary factor in deciding where to place the XyLoc Lock is to determine where the user will wear the XyLoc Key the majority of the time. The Key can be clipped to a shirt pocket or belt or worn on a lanyard around the users neck. Once youve identified where the Key will be worn, place the Lock at the same height as where the Key will be when the user is at the PC. You should also make sure that the path between the Lock and Key is unobstructed (such as obstruction caused by your arm that might occur while using your mouse or keyboard). For example, if the user will wear the Key on the left side of the shirt, use the Velcro strip to secure the Lock to the left side of the users monitor at the same height as the Key will be when the user is seated. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 9 of 62 If the user will wear the Key on the right side of the belt, use the Velcro strip to secure the Lock to the underside of the users desk. The Lock should be at the same height as the Key will be when the user is seated. The user should keep the face of the Key pointing at the LED. Ideal Lock Placement Acceptable Lock Placement Less Desirable Lock Placement Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 10 of 62 The XyLoc Lock Status Light The LED indicator light on the XyLoc Lock has three possible states:
1. Green The indicator light is green when the computer is unlocked and available for access. 2. Red The indicator light is red when the computer is locked or disabled. 3. Off The indicator light is off if the XyLoc system is not receiving power. LED Status Light Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 11 of 62 Using the XyLoc Key The XyLoc Key is a low power radio transmitter with a unique non-volatile and non-
cloneable user identification code. LED Status Light ON Button OFF Button The KeyCard is powered by single coin cell that last approximately twelve to twenty-four months. The KeyCard has two switches on its front panel marked O and X. The O turns the Key ON and X manually turns the Key OFF. The Status LED flashes green when the system is turned ON and red when it is turned OFF. The OFF action requires an extended depression of the X button to turn the Key OFF, but to turn the key ON just press and release the O button. The KeyCard uses sophisticated power management technology and will automatically turn OFF approximately 9 hours after it was first turned ON. You may extend this automatic turn OFF time up to 4 additional hours by pressing the O button one time for each additional hour, any time after the Key has been turned ON. The Status LED also functions as a battery tester. As long as the LED functions, the KeyCard has sufficient battery power. The XyLoc software also incorporates a Battery Voltage Meter with which the user may check the battery life through the XyLoc configuration software (See the section for Testing the XyLoc Keys). Also, the XyLoc Security Server (XSS) at any time has a status log that reports when a battery is running low on battery life. Please review the XSS User Guide for more details. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 12 of 62 The Key must be in the possession of the user at all times. The XyLoc system provides tools to help ensure user compliance. XyLoc is capable of identifying a Key that has been left stationary. The XyLoc system can be configured to automatically secure the workstation, should a Key be left unattended. This action is also recorded in the Audit Logs. NOTE: To insert the battery into the KeyCard, place the KeyCard with the XyLoc logo face down, remove the two retaining screws and slide open the lid. Replace the CR 3032 coin cell with the + up. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 13 of 62 Installing the XyLoc Software The XyLoc software controls the operation of the Lock/Key and their interaction with the PCs operating system. The software offers flexible configuration options and selectable desktop preferences to meet the users varying needs. Installation is accomplished via a simple-to-use wizard. Except where noted, the following instructions apply to all supported Microsoft Windows systems. NOTE: Windows 2000/XP users must have local Administrator privileges to complete the installation. NOTE: The Windows XPe version of the XyLoc client only supports English. The other language versions have been removed to keep the install package small enough to be installed on a Windows XPe Thin Client device. NOTE: In version 8.2.4 the installation program was changed to an MSI based installer. This has changed some of the installation process slightly as well as the screens that are displayed. The instructions below are for this new installer, except where indicated. 1. Exit any applications that are currently running. 2. Place the XyLoc CD-ROM into the CD-ROM drive. Choose Install XyLoc Software. 3. If the installer does not automatically launch, use either My Computer or Windows Explorer to select the CD-ROM drive, and run install.exe to execute the Installation Wizard and then follow the Wizards instructions. 4. Select the language for the installation. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 14 of 62 5. Click Next on the welcome screen to continue with installation. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 15 of 62 6. Please review the terms of the Software License Agreement. If you accept all of the terms of the Software License Agreement, click Yes, and the installation will continue. If you do not accept all of the terms of the Software License Agreement, click No to cancel the installation process. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 16 of 62 7. Once the program is ready to install the files, the Ready to Install window will display. Click Install on this screen when you are ready to install (NOTE: This screen does not come up in 8.2.3 and earlier) 8. For NT4 users, the Question window will be presented. Select Yes when using the USB lock. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 17 of 62 9. Login Account Selection: Select the desired user name from the list. This list is created by examining the Users database on the PC. If XyLoc is to be configured for a network logon account, type the account name here, being careful to enter the name exactly as it appears for your normal logon. Please create a user via the Users control panel in Windows. 10. Lock Identification: XyLoc will attempt to find the port to which the Lock is attached. Click OK to continue. On a new installation, the Lock should not be connected yet, therefore XyLoc will not find the Lock. The Port Selection screen will appear. Please confirm that the correct port has been selected and correct it if necessary. Click Next. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 18 of 62 11. If you are using the USB version, connect the lock to the computer at this time. NOTE:
On Windows XP, the Found New Hardware Wizard will appear. Leave the default for Install the software automatically (Recommended) and click Next. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 19 of 62 12. Let the system find the drivers and install automatically. 13. If for some reason Windows XP does not find the driver it will likely prompt the user to Insert the disk labeled XyLocUSB Installation Diskette. If this occurs, click OK, and then click Browse. Point to C:\WINDOWS\System32\Drivers\ directory, which should contain the XyLocUSB.sys file necessary to install the USB device. Click OK. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 20 of 62 14. Click Finish to complete the new device installation. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 21 of 62 15. Once Windows has finished installing the device, click Continue. 16. Confirm XyLoc Key ID: XyLoc will attempt to identify the closest Key and insert that Key ID into this field. Refer to the label on your XyLoc Key and verify that it matches the Key ID shown. If no Key ID is shown, or if it is not the correct Key ID, please enter it manually. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 22 of 62 17. Personal Name Identification: Enter the users full name to further identify the Key owner. NOTE: This field is an optional field. If the name is left blank, the actual Account Name will be used instead. 18. XSS IP Configuration. This screen has a field to enter the address of the XSS (XyLoc Security Server), if there is one. If there is no XSS, this field can be left blank. NOTE:
XyLoc 8.2.4 also added the ability to use the servers DNS name for the address instead of the IP address. You can enter either address at this screen. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 23 of 62 19. XyLoc Configuration Summary. This screen provides a summary of the features you just selected. Choose Finish to complete the Installation Wizard. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 24 of 62 20. Click Finish once the installation is complete. 21. Restart your computer when prompted. 22. If your installation was successful, upon restart you will see the XyLoc logon window. Logon by clicking on the personal name associated with the XyLoc key. 23. Your network provider logon screen (Microsoft or Novell) will then appear. Enter your system account password. Unless your system account password periodically expires, this will be the last time you will be asked to enter your Microsoft or Novell password from the network provider logon screen. 24. Once the desktop appears you will also see a XyLoc Status message that will appear briefly in the system tray. By default, this message will appear whenever the XyLoc Status changes (unlocking, disabled, etc.). NOTE: If it is desired to have this status Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 25 of 62 message appear at all times, then right-click on the XyLoc icon and click on Show XyLoc State. This will cause the XyLoc Status window to stay resident on the desktop. 25. The XyLoc icon should also be displayed in your system tray. XyLoc Icon in System Tray 26. Test your XyLoc system by stepping away from your PC and watch to see if it secures. If it does, youre all set and ready to go! You can also adjust the range at which the XyLoc locks and unlocks your PC see Setting the Active Zone in the section for Advanced User Settings. 27. To further customize your installation, follow the directions under Configuring the XyLoc Software. NOTE: The XyLoc icon in the System Tray can be used to view the status of your system and to help troubleshoot the system. Simply move your cursor over the XyLoc icon to view the pop-up that will provide the status of the system. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 26 of 62 Understanding Core Settings Although a detailed description of the many XyLoc configuration options is discussed in the Configuring the XyLoc Software section, an overview of the differences among the core settings is useful. Administrative Levels All authorized XyLoc Keys will grant a person access to a particular PC. However, there are three different Administrative Levels that affect that persons ability to make changes to the way XyLoc operates. The Administrative Levels are set under the Advanced Settings button in the User Setup tab of the XyLoc Configuration Manager (see Getting Started User Setup). Only an Administrator can access the Administrative Levels settings:
Administrator User Setup Full access to Configuration Manager and all Users settings PC Setup User*
Only Range Settings and Personal Name can be changed No changes can be made Guest
* A User can only access his/her own settings: no one elses settings will be visible or accessible No access to XyLoc Configuration Manager Administrator A person with Administrator privileges has complete access to all of the features of the XyLoc Configuration Manager. This includes the ability to add and delete users from the database and to create and modify all settings for individual users. NOTE: Each XyLoc installation must have at least one user with Administrator privileges. The Administrator level is appropriate for the person with the responsibility of managing an organizations security or IT infrastructure. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 27 of 62 User A person with User privileges has limited access to the features of the XyLoc Configuration Manager. This level is best suited for most users. These users need regular access to a particular PC and would benefit from the ability to modify the way XyLoc works in their specific environment. A person with User privileges will only see their name in the User Name field no other peoples names will be visible or accessible. The only settings available for modification under the User Setup tab are Range, Range Refinement and Personal Name. Guest A person with Guest privileges will not be able to launch the XyLoc Configuration Manager. This level is helpful even for regular users to prevent a user from accidentally leaving the Configuration Manager open and disabling the XyLoc security. AutoLogon XyLocs AutoLogon feature simplifies the logon process for the user. The first time a user successfully logs in to XyLoc (using any of the methods described below) they will be prompted to enter their network logon and password. The next time the user logs in XyLoc will automatically log the user in to their network account. Authentication Methods There are two types of authentication settings available in the User Setup tab of the XyLoc Configuration Manger: Login Authentication and Unlock Authentication (see User Setup). The Login Authentication setting determines the method of authentication during login, and the Unlock Authentication setting determines the method of authentication once a user has logged in and XyLoc locks the PC. Your choice of settings will likely be driven by your organizations security policies and your specific security needs:
Login Authentication Hands-Free AutoLogon: This setting provides the most convenience. When an authorized user enters the Active Zone, the user is automatically logged in without requiring that any other action be taken. Select User Name: This setting finds all the keys in the area and then prompts the user to select their name from the list of users found. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 28 of 62 Must Enter Password: This setting requires that a user enter his/her password before that user is logged in. The system will display all the authorized keys in the area and once the user selects their name from the list, they will be prompted for their password. If only one user is found, the system will display the password prompt automatically. Unlock Authentication Hands-Free Unlock: This setting provides the most convenience. When an authorized user enters the Active Zone, the PC is automatically unlocked without requiring that any other action be taken. Select User Name: This setting finds all the keys in the area and then prompts the user to select their name from the list of users found. Must Enter Password: This setting requires that a user enter his/her password before that user can unlock. The system will display all the authorized keys in the area and once the user selects their name from the list, they will be prompted for their password. At Unlock, the user must select their name from the list regardless of how many keys are found. Unlike at Login, the password prompt will not be displayed automatically. Administrators should also see the Allow Password Override (No Key) option under the User Setup section for information on requiring both a password and a key to unlock a computer. Note: If there is only one administrative account on the PC, that Administrator may not disable Allow Password Override for himself. At least one administrator on every machine must be allowed to password override as a safety precaution. Thus, the option Allow Password Override (no key) is only available to XyLoc users other than the designated administrator. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 29 of 62 Configuring the XyLoc Software Security Configuration and User Preferences XyLocs operating parameters are set through the XyLoc Configuration Manager. To launch the XyLoc Configuration Manager, select XyLoc Configuration from the Start menu (Start/Programs/XyLoc/XyLoc Configuration). You may also double click on the ET (XyLoc icon) in the System Tray. The XyLoc Configuration Manager has two tabs from which XyLocs operating parameters are set:
User Setup PC Setup NOTE: The XyLoc system is NOT disabled when the XyLoc Configuration Manager is running. If the system locks while the configuration manager is open, any unsaved changes will be lost. NOTE: Starting with XyLoc version 8.3.5, if an XSS address is configured in the client, the settings in the configuration manager under User Setup will be entirely grayed out. All user settings must be managed from the XSS at that point. The settings in the PC Setup tab are still available. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 30 of 62 User Setup Select a log-on account from the User Name list to modify that users settings Login Select Authentication method Allow Select Password Override
(No Key) to allow override access at the initial login. Unlock Select Authentication the method for Select the Range at which XyLoc will lock/unlock the PC for the selected key Allow Password Select Override (No Key) to enable override access to the desktop from a locked state. Click Add User to use the Configuration Wizard to add a new log-on account Click Delete User to delete the selected account Select the time during which the XyLoc will unlock the PCs desktop without requiring the user to enter a password Shows the key or keys assigned to the selected log-on account Click Add Key to use the Key Wizard to add a new key Click Delete Key to delete the selected key Click Advanced Settings to access additional settings Click Range Refinement to make fine adjustments to the range at which desktop will lock/unlock. Enter the Personal Name to associate a friendly user name with the selected account NOTE: A users Key ID must be selected before the following options are available. User Name What It Does:
Shows currently the selected login account from the User Name list. Recommended Use:
See Adding New Users. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 31 of 62 Add User What It Does:
Enables you to add a network account for XyLoc to login with. Recommended Use:
(See Adding New Users) This does NOT create a the machine. Local accounts must be created through Windows and will automatically show up in the XyLoc User Name window. local Windows account on Delete User What It Does:
Enables you to delete a network account or remove all keys local account. from a Key ID What It Does:
Shows the unique number of the Key or Keys issued to login account. particular a Recommended Use:
Does NOT remove local Windows accounts;
this must be done through Windows if a user account is to be removed. Also see Disable this Account. Recommended Use:
See Adding New Keys and Kiosk Accounts. Add Key What It Does:
Enables you to add a new key for the selected user or kiosk account. Delete Key What It Does:
Enables you to delete a key from the selected user or kiosk account. Login Authentication Recommended Use:
See Adding New Keys and Kiosk Accounts. Recommended Use:
Delete a key when the user has lost a key or when you want to remove a key from a kiosk account (see Kiosk Accounts). Hands-Free AutoLogon What It Does:
User automatically logged in without requiring that any other action be taken. is Recommended Use:
For maximum convenience and completely hands-free operation; if users are within set proximity of their PC, they will logged in. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 32 of 62 Select Username What It Does:
Finds all the keys in the area and then prompts the user to select their name. Must Enter Password What It Does:
User must enter a password to login. The system finds the strongest key in the area and then prompts the user for a password. Recommended Use:
This setting is useful for environments where many users are in a small area such as cubicles, labs, or the nurses station at a hospital. Recommended Use:
For use in environments with a need for greater security. Administrators should also see Allow Password Override information on settings for maximum security. for Allow Password Override (No Key) What It Does:
Allows the user to login to the PC without requiring an authorized key. Recommended Use:
Administrators should enable this setting if they want to allow user access without the XyLoc Key (e.g., when the user forgets his Key). If this option is unchecked the account cannot be accessed without a key. This provides maximum security, especially when used in combination with the Must Enter Password and Select User and Enter Password modes. XyLoc requires that at least one administrative account allow for password override as a safety precaution. NOTE: By default a non-XyLoc user is able to use CTRL+ALT+DEL at a login screen and login to their account. This is to provide access for administrators. If you do not want to allow any non-XyLoc users to override, then there is a registry setting that can be enabled. Contact Ensure Technologies Technical Support for more details. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 33 of 62 Unlock Authentication Hands-Free Unlock What It Does:
When an authorized user enters the Active Zone, the is PCs automatically unlocked without requiring that any other action be taken. desktop Select User Name What It Does:
Finds all the keys in the area and then prompts the user to select his key. Must Enter Password What It Does:
User must enter a password to unlock the PC. Recommended Use:
This is the default setting and provides the most convenience. Recommended Use:
This setting is useful for environments where many users are in a small area such as cubicles, labs, or a nurses station at a hospital. Recommended Use:
For use in environments with a need for greater security. Administrators should also see Allow Password Override information on settings for maximum security. for Allow Password Override (No Key) What It Does:
Allows the user to unlock the PC without requiring an authorized key. Recommended Use:
Administrators should enable this setting if they want to allow the user to unlock without the XyLoc Key (e.g., when the user forgets his Key). If this option is unchecked the account cannot be unlocked without a key. This provides maximum security, especially when used in combination with the Must Enter Password and Select User and Enter Password modes. Unlock to Key Only for up to x seconds/minutes What It Does:
Enables a grace period in which PC will unlock to user presence of authorized key alone. by Recommended Use:
For increased convenience in organizations, use this setting in situations where the system locks while the user is still in control of the PC
(e.g., when the user turns away from the PC to get something out of a filing cabinet on the other side of her cube or office), and then returns to work at the PC within the specified time. After specified time, user must provide selected unlock a password). authentication
(e.g., Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 34 of 62 Range What It Does:
Defines the Active Zone the range at by setting which XyLoc will lock/unlock the PC. Note: The numbers that are referenced for unlock and lock are not a reference to feet or meters. The numbers are a reference to strength of signal between lock and key. Range Refinement the What It Does:
Permits fine adjustment of the Active Zone by opening the Range Setting box. Personal Name What It Does:
Specifies name. the users full Advanced Settings Recommended Use:
Choose Short, Medium or Long distance for XyLoc operation based on user preference and office size/environment. Recommended Use:
Select when minor adjustments of the Active Zone are desired. Recommended Use:
Enter the users full name if you prefer additional user information beyond the users login name. This is especially helpful in Audit logs and in Kiosk accounts. What It Does:
Opens the Advanced User Settings window. Recommended Use:
Click the Advanced Settings button to modify Administrative Level and other settings. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 35 of 62 Advanced User Settings Allows this user account to logoff another user account in a locked state that is Allows the Key ID to be changed to a new ID while maintaining existing settings feature It is used by the Kiosk Account to provide multiple factor authentication a shared log-on account in the lock Used to workstation automatically due inactivity when Password mode. to in Override the Select Administrative Level for the selected user and key to Select the Auto Logoff Time close an account after a period of inactivity after screen is locked Select Disable Key to disable key from log-on account specific Select to enable Pass Key option Administrators the for to play Select the Default system sound when XyLoc secures the PC to assist with Select from preventing users leaving key unattended to run Used a configured Application Integration logoff script automatically when the PC is locked. Administrative Level Administrator What It Does:
Gives to configure settings for all administrators, users and guests. access full User What It Does:
Gives access to configure the users Range Settings and Personal Name; only the specific users name is Recommended Use:
Given to the person or persons given the responsibility of managing an organizations computer security. Recommended Use:
Given to a person who is authorized to make limited changes to the configuration settings. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 36 of 62 visible in the User Name field. Guest What It Does:
Allows a person to use a PC without the ability to view any change configuration settings or Auto Logoff Time What It Does:
After the authorized user leaves the active zone and the desktop locks, XyLoc starts an inactivity timer. If the logged-in user does not return before time is expires, logged off. For fastest multi-user access, also see Kiosk accounts. Note: Any data that was not saved by the user may be lost. the account this Recommended Use:
The most limiting level; no access to XyLoc Configuration Manager Recommended Use:
This is a secondary and less sophisticated method to provide automated log-off access to users. In general Ensure recommends the use of the User can logoff locked workstation feature as the primary method of logging-off users. Auto Logoff allows you to prevent a locked PC from staying logged-on indefinitely. This feature can work in conjunction with the User can logoff locked workstation function. independently or User can logoff locked workstation to the user What It Does:
Allows log-off another user who logged on to and locked a workstation. For fastest multi-user access, also see Kiosk accounts. Note: Any data that was not saved by the user may be lost Recommended Use:
This is the primary and recommended method for logging-off users who lock a PC and then leave. When this option is selected, the XyLoc user will be able to force a log-off of another users locked desktop. With this option, the user forcing the logoff will need to select their name from the list. Once the logoff has occurred, the user will then use their normal login authentication. Key ID What It Does:
Lets administrators change the Key this account. for ID Recommended Use:
This is useful when you desire to change an accounts Key ID but maintain all existing settings. This allows the administrator to easily replace a lost or stolen XyLoc key. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 37 of 62 Pass Key What It Does:
Lets administrators access the current users desktop without logging that person out. is useful in situations where Recommended Use:
This the administrator needs to troubleshoot a problem that may be specific to a particular users account. To use a XyLoc Key as a Pass Key, the Pass Key holder must approach the secured computer and press Ctrl-Alt-Del
(under Windows 2000/XP). The Pass Key holder will then have to enter their user name and XyLoc password into the dialog box to gain access to the current users desktop. When the Pass Key user leaves the active range, the computer will relock. NOTE: If the Pass Key user is also an Administrator under Windows 2000 and XP, the XyLoc Password MUST be different from the Windows password. Beep When Locking What It Does:
Plays the Default system sound when XyLoc secures the PC. Recommended Use:
Enable this setting initially to provide users with audio feedback when their PCs are secured. After users are familiar with XyLocs operation, they may no longer need or desire this feature. Lock if the Key is Stationary for What It Does:
Secures computers the desktop automatically if the user leaves their XyLoc key next to their computer for the set time period. Note:
Ensure recommends the 1-minute option for demonstration purposes only. Recommended Use:
Use to assist with enforcing compliance with security policy and to encourage the user to keep the XyLoc key with them at all times. The system senses that the strength of signal from the key is not varying enough, and secures the desktop after the specified time. A message noting a stationary key for this user is recorded into the Audit Log and sent to the XyLoc Security Server (XSS). NOTE: If other factors in the environment cause the signal from the key to vary, it is possible the signal could vary enough to keep from locking, even when stationary. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 38 of 62 XyLoc Password What It Does:
Sets the XyLoc password. Note: This box will only appear if this key is part of a Kiosk Account. Recommended Use:
It is used by the Kiosk Account feature to provide multiple factor authentication in a shared log-on account. Lock in Password Override What It Does:
Locks the PC after a period of inactivity in password override mode. Recommended Use:
Enable this for when the users key has been forgotten and you wish the PC to lock after a period of the recommended use of XyLoc, as it does not take advantage of XyLocs full-time proximity based security capabilities. inactivity. is NOT This Run Application Integration Logoff What It Does:
Executes a logoff script after the desktop has been locked for the specified amount of time. Recommended Use:
Works in conjunction with Application Integration. Recommended for use when a logoff script needs to be run so as to terminate an application or session. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 39 of 62 Setting the Active Zone Set the Active Zone by selecting the appropriate Range for your environment. You can further refine this range with Range Refinement. The top bar labeled Active Zone shows the approximate range where the computer will remain unlocked. Below this is an adjustable range scale. This permits the setting of Initial Unlock and the Lock. The Initial Unlock setting (shown in Green) sets the Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 40 of 62 approximate distance where the XyLoc will unlock the computer when the user returns. The Lock setting (shown in Red) is the approximate location where the computer will secure as the user steps away. NOTE:
Given the nature of RF communications and the differing environmental characteristics of each users office or cubicle environment, the precise Active Zone setting will vary for each users environment. Ensure recommends that users initially selecting Short and then decide if Medium or Long is a more appropriate setting. Further adjustments can be made within these three settings through the Range Refinement setting. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 41 of 62 Adding New Users The first user is created during Installation (see Getting Started Installing the XyLoc software). All local accounts on a machine will appear in the User Name window of the Configuration Manager for an administrator to create XyLoc accounts from. You can also add existing network accounts to XyLoc by using the XyLoc Configuration Managers Add User button. NOTE: This will only add existing Microsoft or Novell network accounts to XyLoc. This does not actually create a new network account. The Network Administrator on the Microsoft or Novell server must do that. 1. Click on the Add User button. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 42 of 62 2. To create a new network user, enter a valid user name in the field and then click Next to proceed. 3. Select the Administrative Level for the new user. Click Next to proceed. 4. Enter the identification number for the XyLoc Key assigned to the new user. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 43 of 62 5. Select the Range setting for this Key 6. Select the Authentication Methods for this Key. 7. Finally, enter a personal name to be used to more identify the owner of this Key. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 44 of 62 Kiosk Accounts Workstation and network logins and logouts are often times several minutes in duration. In a multi-user environment, this delay can be frustrating. Ensure Technologies has developed a secure multi-user shared account feature that provides both security and fast multi-user access. In many settings, you may want to set up a single system account (Microsoft or Novell) for an entire class of users (for example, a Nurses account in a hospital or a Sixth Grade Math account in a school). You may easily set up such a kiosk account by adding multiple keys to the same account. In this Kiosk account, all users share the same XyLoc preferences except for Range and XyLoc Password. This enables the shared use of a single account, while still tracking individual users access of the account in the XyLoc activity logs. Switching among users is fast and convenient. NOTE: Support for Kiosk accounts in the XyLoc Solo package is limited to 5 users. The XSS-MD package is required for further support of Kiosk accounts. Please review the XSS User Guide for more detail on creating Kiosk accounts in that package. The IT Staff kiosk account Three Keys assigned to the IT Staff kiosk account A kiosk account called IT Staff with three keys assigned to it. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 45 of 62 Adding New Keys 1. To create or add users to a Kiosk Account, simply select the user name in the User Name list and then press the Add Key button. This will launch the Key Wizard. Enter the new Key number (found on the label on the back of the Key) and click Next to proceed. 2. Select the Range for the new Key and click Next to continue. 3. Enter and confirm a unique Password for the new Key and click Next to continue (NOTE: This password is the XyLoc Password or XyLoc PIN that has been referenced in this document already. Starting in version 8.2.4, this password is the only password that is accepted when used in conjunction with the XyLoc Key. Previously, the client would also accept the Kiosk accounts own Microsoft/Novell password for login/unlock). Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 46 of 62 4. Finally, enter a personal name to be used to more fully identify the owner of this Key. Locking the Desktop Manually It is possible to manually lock the desktop. Right-click on the XyLoc icon and select Lock Screen. This is useful when a user forgets his/her key and wants to manually secure the desktop before stepping away from the PC. It is also possible to have a button available on the desktop to manually lock the desktop without having to right-click the icon. By default, this button is disabled. To activate this feature, right-click on the XyLoc icon and on the popup menu click on Show Lock PC Button. This will put a lock button right above the system tray on the desktop. The user can click this button at any time to manually lock the computer. NOTE: Locking the desktop manually will require the user to re-authenticate to the PC before access is granted. If the user has a Key and manually locks the screen, the Unlock to Key only timer will not apply. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 47 of 62 PC Setup Select the port to which XyLoc is attached Specify the number of log records to be uploaded to the XSS Works with Application Integration. Sets one of the function keys to be used launch a Hot Trigger Script. to Setting for use with the XyLoc Security Server. Enter the IP address or DNS name of the XSS server. Click Save to keep any settings changes you have made Advanced Click Settings to access additional settings such as Logging Level XyLoc Lock Attached To What It Does:
Allows user to select and change the port to which XyLoc is attached. Recommended Use:
This will be one of the available COM ports or the USB port. NOTE: Port selection will depend on the model of XyLoc Lock you are using. XyLoc Security Server Search Order Recommended Use:
Not used with XyLoc Solo installations, but offers easy expansion and management of larger XyLoc installations. Please refer to XSS User Guide for additional details. What It Does:
Allows XyLoc installation to be centrally managed through a XyLoc Security Server (XSS). Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 48 of 62 Log Records To Upload What It Does:
Specifies the number of log records to upload to the XSS at a time. Recommended Use:
Provides an Administrator to manage traffic on the network between the XyLoc client and the XSS the ability Advanced Settings What It Does:
Opens the Advanced PC Settings window. Recommended Use:
Click the Advanced Settings button to modify XSS and Password settings. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 49 of 62 Advanced PC Settings for Settings XyLoc Security Server port (not active for XyLoc Solo) Settings for client port use for XyLoc Solo)
(not active Provides two modes of operation: normal use
(Security) or third party software development
(SDK) Sets length of Password the minimum the XyLoc XSS Client Port What It Does:
Allows XyLoc installation to be centrally managed through a XyLoc Security Server (XSS). XyLoc Mode What It Does:
two modes of Provides operation:
normal use
(Security) or third party software development
(SDK). Min. Password Length What It Does:
Determines the minimum acceptable password length for the XyLoc Password. Recommended Use:
Not used with XyLoc Solo installations, but offers easy expansion and management of larger XyLoc installations. Please refer to XSS User Guide for additional details. Recommended Use:
NOTE: This must be set to Security in order for the XyLoc to lock the PC. Recommended Use:
This should be set to at least 4 to provide robust security. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 50 of 62 Logging XyLoc will collect data to track User Activity. This encrypted log may be accessed under the Tools menu of the XyLoc Configuration Manager. User Activity Log What It Does:
Displays a history of each user that has logged on and logged off of the machine Recommended Use:
Track user activity, including dates and times. NOTE: This option will only be available to a XyLoc Administrator. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 51 of 62 Testing XyLoc Keys Selecting Display Key Info from the Tools menu provides administrators with a diagnostic tool for identifying and testing XyLoc Keys. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 52 of 62 The Key Information tool offers two modes: Find Specific Key and Find Strongest Key. NOTE: The Key ID is located on the label on the back of the XyLoc Key Find Specific Key Mode What It Does:
Allows you to test a specified XyLoc Key Recommended Use:
Select Specific Key mode and enter the Key ID in the Key ID field; click Start Search to test the Key. NOTE: Only a XyLoc Administrator can view other keys and therefore change this setting from the active key. Find Strongest Key Mode What It Does:
Allows you to test the XyLoc Key with the strongest signal within 50 feet of the XyLoc Lock Recommended Use:
Select Find Strongest Key mode and click Start Search to identify the XyLoc Key with the strongest signal; you can also use this function to determine or verify a Key ID by placing the XyLoc Key next to the XyLoc Lock. NOTE: Only a XyLoc Administrator has this setting available. Sequence number What It Does:
Displays the ID of the last data received from the Key; the number should update every 1-2 seconds Recommended Use:
Lets you know communicating properly that Key and Lock are Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 53 of 62 Range What It Does:
Displays the current range of the Key from the Lock Recommended Use:
Use this value to help determine the optimal Range for your environment Key Voltage What It Does:
Displays the current voltage of keys that support this function. Recommended Use:
While the system is searching for the key, press the O button on the key and the voltage will be displayed. Key Revision What It Does:
Displays the current revision of the key. Recommended Use:
Use to determine the revision of the key when instructed by Ensure Technologies Technical Support. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 54 of 62 Overriding the XyLoc System There will be times when it is necessary to override the XyLoc system. At login, there are two basic methods of overriding the XyLoc system. One is for a XyLoc user that has a badge that is authorized on the PC, but has forgotten it or lost it. The other is for a user that does not have a XyLoc badge assigned, yet still needs to gain access to the PC. User Forgets Their Key In the event a user forgets or loses the Key, pushing the Password Override button on either the Login or Locked Workstation screens and entering the users Login and Password will override the system. The user can enter either their standard Microsoft username/password, or they can enter their XyLoc Personal Name in conjunction with their XyLoc Password (in a Kiosk account). Using the personal name enables XyLoc to correctly identify the specific user in a Kiosk account when many users are sharing a single username. However, if the Allow Password Override (No Key) option is unchecked, the user will not be able to access their account if the key is not present. The XyLoc system software ensures that there is always at least one administrator that can password override into a machine. NOTE: Make sure that your XyLoc installation is working with the Allow Password Override (No Key) checked before un-checking the option. You will not be able to gain access to your computer if the Key is missing (or not functioning properly) or if you forget your password. Once access is obtained with this password, XyLoc is overridden and in a standby mode. The XyLoc icon in the System Tray will have a slash though it, indicating that the XyLoc system is no longer actively protecting your system:
XyLoc will resume protecting your PC when one of the following occurs:
1. The user manually locks the PC. 2. The user manually restarts the PC or logs off from the current session. 3. If system is idle for longer than the time specified in the Lock in Password Override. 4. The authorized XyLoc Key is returned to the active range (XyLoc will recognize the presence of the authorized Key and the status will change accordingly. NOTE: If the user is in a Kiosk account, they must perform the override using the Personal Name/XyLoc Password combination in order for XyLoc to recognize the proper Key for the user. If the standard Microsoft credentials are used for override, XyLoc will ignore all keys assigned to that account for security reasons. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 55 of 62 User Does Not Have a XyLoc Key If a user does not have a XyLoc key assigned to them, or has a XyLoc key but this key has not been configured as an authorized key on a particular PC, the user can still gain access to the PC using the standard Ctrl+Alt+Del keystroke combination. This user will be bypassing the XyLoc security and will login with their account. They will have whatever permissions assigned to them network or PC. Administrators or Helpdesk staff mostly use this to allow them access to a PC when they dont have a XyLoc key. There is a registry setting available to disable any non-XyLoc user from gaining access to a XyLoc protected PC, however this is not recommended unless the centralized server (XSS) is available as this does restrict ALL non-XyLoc users including Administrator. Contact Ensure Technologies Technical Support for more details. Unlocking using Password Override At unlock, either process can be used to get a dialog box to enter credentials in and either method can be used. However, the user must use the same as was used at the initial login. Once an account is logged into the PC, only that same account can unlock the PC using Password Override. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 56 of 62 Replacing the XyLoc Battery The KeyCard is powered by a single coin cell (CR3032) that lasts approximately 8-12 months. A user may check the battery by depressing the switch marked O on the key. If the battery is good, a Green LED will momentarily flash. The user is able to check the battery life through the XyLoc configuration software. Replacement batteries may be purchased at a local electronics distributor, directly through Ensure Technologies or your local reseller. You can also find these batteries at http://digikey.com/. Their part number is P121-ND. To replace the XyLoc battery:
1. Flip over the Key 2. You will see the battery compartment with the tab 3. Remove the two retaining screws from the battery compartment 4. Slide open the top of the battery compartment 5. Remove the battery and replace it with the new battery, observing proper polarity indicators (+ side up) 6. Slide compartment cover to close and replace the screws Software Removal In the event that you have to remove the XyLoc client software, please use the following instructions:
1. Before you can remove the software, you must stop the XyLoc service. This can be done through the Services applet in the Control Panel in Windows, or through the XyLoc Configuration Manager under Tools -> Stop XyLoc (NOTE: You must be a system administrator to stop a Windows service, and if done through the configuration manager, you must also be a XyLoc Administrator. 2. Once the services are stopped, you can close the XyLoc Configuration Manager (if open) and then go to the Windows Control Panel and then to Add/Remove Programs. From here select the XyLoc Security Service and remove it. 3. After removal, you will need to reboot. 4. Once the system is rebooted, you can delete the Ensure Technologies directory under Program Files. 5. The USB drivers do NOT get removed during this process. This way if you wanted to reinstall, you dont have to go through the device installation again. However, if you want to remove the device, follow the standard process for uninstalling a device in Windows. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 57 of 62 Troubleshooting Please refer to the solutions to common setup problems below. If you still cannot resolve the problem, please call Ensure Technologies Technical Support at (734) 547-1600, or send an email to support@ensuretech.com. Helpful Hints:
1. Use the default settings until you become familiar with XyLocs operation. 2. The XyLoc application requires that at least one network protocol be loaded on the PC to properly load and operate. For example, most PCs commonly have protocols such as TCP/IP or NetBEUI loaded by default. Either or both of these meet the requirement. 3. Starting with XyLoc 8.2.4, in a Kiosk account, when the login or unlock is attempted with a XyLoc key, and the user is set for Must Enter Password mode, the XyLoc Password (PIN) is the only password that is accepted. In previous versions, the Kiosk account password was also accepted. The kiosk account password is still accepted for overrides, when used with the kiosk account name. The user can also override with their Personal Name and XyLoc Password (PIN) combination. 4. Windows 2000/XP: An administrator or a user with FULL, local administrator privileges is required to install the XyLoc system. 5. Windows XP Fast-User Switching: Microsofts Fast-User Switching feature is not designed to operate in a network environment (reference Microsoft TechNet article Q294739). Ensure Technologies supports Windows XP in a network environment. The XyLoc Kiosk account provides this type of functionality. Please contact Ensure Technologies for further information. 6. The XyLoc icon in the System Tray can be used to view the status of your system and to help troubleshoot the system. Simply move your cursor over the XyLoc icon to view the current status of the XyLoc system. 7. When running Scandisk or Disk Defragmenter and experiencing disk restarts, you should stop XyLoc. Once Scandisk or Disk Defragmenter has completed, re-start XyLoc. 8. The use of a screen saver may no longer be necessary or desired. In Windows 2000/XP, the Microsoft GINA controls the password protection. Since the XyLoc GINA has taken over control of the security of the PC, the password protection is automatically disabled. The screen saver functionality will still take place, however it will no longer be password protected. This is no longer necessary, since the PC will automatically lock when the user takes their Key out of range. Use the Lock in Password Override timer to provide the same protection when in Password Override mode. If your monitor has been turned off as a result of using Power Management or Energy Saving mode, or if a screen saver has activated, a key press or mouse movement may be required to activate your PC even though the authorized XyLoc Key has already unlocked the computer. 9. 10. Windows Power Management: At this time, Suspend/Hibernate in Windows 2000/XP are not fully supported. Ensure Technologies recommend that these features not be used. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 58 of 62 11. Windows XP Embedded Thin Clients: The XPe version of the XyLoc client does not support languages other than English at this time. Earlier versions did erroneously allow the user to select other languages. However, English is the only option that will install successfully. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 59 of 62 System Functionality Normal Operational Mode The majority of users will use XyLoc in Normal Operational Mode. In normal operation, the XyLoc Lock and Key are in constant, encoded wireless communication with each other, with the Lock searching for the presence or absence of authorized Keys. As an authorized user approaches the PC, XyLoc responds and the Key and the Lock engage in an over-the-air authorization. Once XyLoc identifies and authenticates the user, it unlocks the PC until the user moves out of the Active Zone. When the authorized user moves out of the Active Zone, XyLoc automatically blanks the screen, locks the keyboard and disables the mouse. The PC is instantly secured and remains so until an authorized user moves back inside the Active Zone. Background tasks, such as printing and downloading, however, may continue while the PC is securely locked. Hardware Architecture Both the Lock and the Key incorporate two embedded controllers, which allow the operating firmware to be updated in the field so new features can be added. The Lock can receive firmware updates via the USB port. This firmware is stored in flash memory and is used to control the operation of the system. The communications controller controls the Lock-to-host communications, and is permanently programmed. The Lock also incorporates an EEPROM that stores operational parameters, such as channel allocations. The Key has a similar architecture and can receive firmware updates via a proprietary programming cable attached to a PC. Radio Frequency (RF) System XyLoc operates in the 900 MHz frequency band the same radio frequencies used by cordless telephones and other common wireless devices. Its power output is lower than cordless phones and far less than that of the cellular phones many people use every day. XyLoc is as safe to operate as any common household communication device, such as a cordless phone or baby monitor. The operating frequency is set at the factory and cannot be changed out of the certified band by the end user. The power output level is also set at the factory and cannot be changed by the end user. The XyLoc RF link uses a combination of spatial spectral reuse and time-division multiple access (TDMA). This combination of techniques improves the integrity of the RF link and insures that other radio devices will not interfere with XyLocs proper operation. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 60 of 62 Spectral Reuse Like a cellular phone system, a large XyLoc installation can effectively reuse spectrum across a facility by intentionally limiting the range of individual XyLocs. This allows Keys in different parts of a building to operate using the same frequencies at exactly the same time. Time Division Multiple Access (TDMA) Keys that are within range of each other can also reuse the same channel allocation by the use of time-division multiple access. This allows several hundred Keys to coexist within a 50-
foot radius. As the Keys move through the building, they adaptively find new time slots to avoid interference with other Keys in that area. Technical Specifications Detailed Technical Specifications are available by contacting Ensure Technologies Technical Support at support@ensuretech.com or by phone at 1-888-233-2611. Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 61 of 62 Revision History Revision Date 0.01 04-15-2004 Created Description 0.02 0.03 0.04 0.05 0.06 0.07 0.08 Author RS RS RS RS RS RS RS 09-14-2004 Removed support for Windows ME 01-26-2005 Updated 02-21-2005 Added removal instructions 05-09-2005 Removed XyCrypt 07-18-2005 Added changes to installer and Kiosk account that were done in XyLoc version 8.2.4 04-25-2006 Added support for PINs in a Unique account and added more detail on XPe support XX-XX-
2008 Update drawings, contact information, removed Windows ME, 98 and NT4 references Ensure Technologies Users Guide for XyLoc Client ver 8.x.x Drawing#: 510-0100-003 Drawing Rev: 0.08 Rev Date: 04-25-2006 Page 62 of 62
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2009-11-10 | 905 ~ 905 | DXX - Part 15 Low Power Communication Device Transmitter | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2009-11-10
|
||||
1 | Applicant's complete, legal business name |
Ensure Technologies Inc
|
||||
1 | FCC Registration Number (FRN) |
0017990490
|
||||
1 | Physical Address |
135 South Prospect, Suite 100
|
||||
1 |
Ypsilanti, Michigan 48198
|
|||||
1 |
United States
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
H******@atcb.com
|
||||
1 | TCB Scope |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
NW5
|
||||
1 | Equipment Product Code |
XC20
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
T**** T******
|
||||
1 | Telephone Number |
73454********
|
||||
1 | Fax Number |
73454********
|
||||
1 |
t******@ensuretech.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
University of Michgan EECS
|
||||
1 | Name |
V**** L********
|
||||
1 | Physical Address |
1301 Beal Ave.
|
||||
1 |
Ann Arbor, Michigan 48109
|
|||||
1 |
United States
|
|||||
1 | Telephone Number |
734-4********
|
||||
1 | Fax Number |
734-4********
|
||||
1 |
l******@umich.edu
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DXX - Part 15 Low Power Communication Device Transmitter | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | XyLoc Key | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
University of Michigan
|
||||
1 | Name |
V**** L******
|
||||
1 | Telephone Number |
734-6********
|
||||
1 | Fax Number |
734-6********
|
||||
1 |
l******@umich.edu
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 905.00000000 | 905.00000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC