PGP keys servers contacts the recipients keys servers “if available” (if the server can’t locate a public key for the recipients) on, thus if you want to facilitate exchange secure emails with external parties you must name the server’s FQDN and this name must be reachable from outside. ![]() Specify the host name one important point is to note that your appliance MUST be named (), this is mandatory if you want to cooperate with other PGP key servers. In the IP address field, specify the IP address for the appliance: Once you start the VM with the ISO attached, follow the simple install wizard that will take you through the installation steps: To install Symantec Encryption Server, download the ISO image and create a virtual machine, the documentation and install guide mandate that the VM must be created with Kernel 2.6 x86, 4 GB memory for single instance and 8 GB for HA instances. There are several design and architectural decision elements that must be taken into consideration for several features to work we will explore them later. In this blog, we will install the Symantec Encryption Server v3.3, the latest version (at this time) of the product. Symantec Encryption Server can manage several different encryption products and solutions including: The Symantec Encryption Server binaries are certified to be installed as virtual and this is the recommended use from Symantec, and this is the method we will use in our environment. Additionally we will explore some cool features around virtual disks, disk encryption and secure email delivery. In this blog series, we will install together Symantec Encryption Server (previously known as PGP universal server) and configure it to work with Exchange 2010. You can also restrict the modes available in your organization, to do so, edit the consumer policy and change the available modes: To change the mode of the key being used, click on the reset key button and you will be taken through a page that will help you selecting the appropriate key mode. ![]() You must be very careful when selecting the key mode in your environment depending on the key mode, you will have or lose some features as per the below table:įor the first instance, SKM might be the ultimate answer, but you have to be aware that administrators have control over private keys, so this might be a security concern.
0 Comments
Leave a Reply. |