asset management (theft deterrent)* training foils · yes or no to “do you want the theft...

102
1 Intel-powered Classmate PC Asset Management (Theft Deterrent)* Training Foils Version 1.8.0 *Other names and brands may be claimed as the property of others.

Upload: others

Post on 14-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

1

Intel-powered Classmate PC

Asset Management (Theft Deterrent)*Training Foils

Version 1.8.0

*Other names and brands may be claimed as the property of others.

Page 2: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

2

INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.

UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR.

Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information.

The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request.

Contact your local Intel Sales Office or your distributor to obtain the latest specifications and before placing your product order.

Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation in the United States and other countries.

Copyright © 2010, Intel Corporation. All rights reserved.

*Other brands and names are the property of their respective owners.

Legal Information

Page 3: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

3

Revision Table

Document Revision Revision History Date

1.0 Initial released. WW31 ’07

1.7.0 Update for quarterly release WW16 ’10

1.8.0 Update for Operation System support WW41 ’10

Page 4: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

4

Agenda

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Page 5: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

5

Pre-Training

Introduction

The theft deterrent software discourages thieves from taking a classmate PC from a student or school. If a thief attempts to steal a classmate PC, this software will disable all functions and the PC will stop working, thus making the act of taking the PC not worth the risk to the thief.

In this presentation, server refers to the Intel® Theft Control Server for classmate PCs, and agent refers to the Intel® Theft Control Agent for classmate PCs.

Page 6: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

6

Pre-Training

Goal:

This training explains how to install and use the Intel® Theft Control Server for classmate PCs and the Intel® Theft Control Agent for classmate PCs within a Local Area Network using classmate PCs as clients. This training includes how to deploy the theft deterrent software beyond both the server and the client, as well as how to check if the installation works.

Target Audience:

This training is intended for Intel Technical Marketing Engineers, Intel Technical Support, customers with technical knowledge, post sales technical support, and anyone else interested in the theft deterrent software for the classmate PC.

Note: The operators participating in this guide should be familiar with both Microsoft

Windows* OS installation on a regular PC and network settings on both a PC and a router.

*Other names and brands may be claimed as the property of others.

Page 7: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

7

Pre-Training

Term Meaning

CA Certificate Authority: a trusted organization that issues a public key certificate.

JKS Java* Key Store: a format for a public key certificate store used in JAVA.

Shared Secret A secret key used in the classmate PC system.

Agent In this document, we sometimes call the Intel-powered classmate PC version 1.0 or the second generation Intel-powered classmate PC as the Agent from a network perspective.

XML Extensible Markup Language: a data format.

Unlock Code A type of boot certificate in the form of a 10-digit number to unlock the device when the official boot certificate has expired.

Device owner ID The device owner ID.

Hardware ID Device hardware ID which is created at system provisioning stage and uses the system MAC address.

Expiration date The date after which the device can no longer be used.

Bootable times The number of times the device is allowed to boot before the certificate expires.

BC Boot Certificate.

Terminology

*Other names and brands may be claimed as the property of others.

Page 8: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

8

Pre-Training

Term Meaning

IP address Internet Protocol address.

Gateway IP address Gateway Internet Protocol address.

Proxy URL The URL of Proxy server.

DNS Server IP address The Internet Protocol address of Domain Name Server.

WINS Server IP address The Internet Protocol address of WINS server.

Common boot certificate A type of boot certificate with a default expiration date and number of boots until expiration.

One-time boot certificate A type of boot certificate in which the expiration date and number of boots until expiration can be set by an IT administrator. When the agent downloads the certificate, the setting is invalidated.

Permanent boot certificate A type of boot certificate in which the expiration date is set to 2099-01-01 and the number of boots until expiration is set to 999999.

TPM Trusted Platform Module.

Terminology (Continued)

Page 9: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

9

Pre-TrainingHardware Requirements (for hands-on training)

Hardware Server (Recommended) Server (Basic)

CPU Intel® Pentium® 4 Processor 2.8 GHz Intel Pentium 4 Processor 2.4 GHz

Memory 2 GB 1 GB

Hard disk 160 GB SCSI 160 GB SCSI or 160 GB IDE

CD-ROM CD-ROM 8X CD-ROM

Ethernet NIC 1000 Mbps 100 Mbps

Server:

Client:• One Intel-powered classmate PC with Winbond* TPM

Other Requirements:• Wired/Wireless Router (Linksys* WRT54G, for example)

• LAN cables

• USB flash disk

*Other names and brands may be claimed as the property of others.

Page 10: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

10

Pre-TrainingSoftware requirements (for post-training hands-on operation)

Server: • Microsoft Windows* Server 2003 (SP1), Windows* 7 Professional or

Microsoft Windows* XP Pro (SP2) OS• Intel® Theft Control Server for classmate PCs Installation Package

Client:• Microsoft Windows* XP Pro or Windows* 7 Professional/Home

Basic/Starter• Intel® Theft Control Agent for classmate PCs Installation Package

*Other names and brands may be claimed as the property of others.

Note: The applications are available in IBP.

To access the portal, use the following URL: Businessportal.intel.com

Page 11: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

11

Agenda

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Page 12: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

12

Installation

Network Installation

Server Installation

Client Installation

Page 13: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

13

1. Right-click the wireless network connection icon in the system tray area and then click View Available Wireless Networks.

InstallationAgent Network-Wireless

Note: This illustration is an example only.

Page 14: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

14

2. The “Wireless Network Connection” dialog will appear. Click Refresh network list in network tasks to search for wireless networks.

InstallationAgent Network-Wireless

Note: This illustration is an example only.

Page 15: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

15

3. Double click a wireless network.

InstallationAgent Network-Wireless

Note: This illustration is an example only.

Page 16: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

16

4. When the computer has been successfully connected to the network, you will see the word “Connected” shown in the network selection.

InstallationAgent Network-Wireless

Note: This illustration is an example only.

Page 17: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

17

Repeat the network connection settings for the server. Use the same

network.

InstallationServer Network-Wireless

Page 18: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

18

If the client has to be connected to the server by LAN cables, use one

LAN cable to connect the server to port 1 of the router and another

LAN cable to connect the client to port 2 of the router. No critical

setting is required because the server and the client will automatically

connect to the same network in this way.

InstallationServer Network-LAN Cable

Page 19: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

19

Installation

Network Installation

Server Installation

Client Installation

Page 20: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

20

Do the following before installing the Intel® Theft Control Server for classmate PCs:

• For Windows* XP, open ports “443” and “80” in the Windows OS firewall so that the agent can connect with the server.

• Uninstall Apache Tomcat* 6.0, if installed. If it is not uninstalled, you will see the error shown in Tomcat* error (shown on the next slide).

• If port 443 is already in use, resolve the conflict before installing the server. See the backup material for instructions on how to do this. If it is resolved, you will see the error shown in 443 port error (shown on the next slide).

• If there is old version (lower than 0.9.7) of LIBEAY32.dll or SSLEAY32.dll in system path, you must resolve this deficiency first before installing the server. Again, refer to the backup material for instructions on how to do this. If it is resolved, you will see the error shown in DLL error (shown on the next slide).

• Verify that the Server and Agent are in the same Time Zone and that the system time of the Server is not later than that of the agent.

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 21: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

21

These illustrations show the three possible error messages described on

the previous page:

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 22: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

22

InstallationServer

1. Click setup.exe in the server Installation Package. Choose setup language and click OK.

2. Click Next.

Page 23: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

23

3. Choose I accept the terms in the license agreement then click Next.

InstallationServer

4. Click Next.

Page 24: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

24

5. Choose setup type:

a. Default (install J2SDK* V1.4.2_08, Tomcat* V5.0.30, PostgreSQL* V8.2, and Intel® Theft Control Server for classmate PCs in the default location which is written in “\Tools\CMPC Configuration File\CMPCConfig.ini”).

b. Custom (you can change the installation location of J2SDK, Tomcat, PostgreSQL, and the server software in the next step).

Click Next.

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 25: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

25

6. If you selected custom in Step 4, Click Browse... to choose the installation location of J2SDK*, Tomcat*, and PostgreSQL* components. Click Next.

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 26: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

26

7.The deployment packet checks to determine if PostgreSQL* and MySQL* databases are installed on the Server PC. Do one of the following:

a. If there is the same or higher version of PostgreSQL, and MySQL is not installed, then go to step 7.b.

b. If there is the same or higher version of PostgreSQL, and there is an existing MySQL database, choose Yes or No to “Do you want Theft Deterrent data to be migrated automatically?” If you choose Yes, then input the password of the existed MySQL database. After the migration is finished, go to step 7.b. If you choose No, then go directly to step 7.b.

InstallationServer

(Continued)

*Other names and brands may be claimed as the property of others.

Page 27: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

27

7. (Continued)

c. If there is a lower version of PostgreSQL*, choose Yes or No to “Do you

want the Theft Deterrent data to be migrated automatically?” If Yes, then input

the password of the existed PostgreSQL database. When finished with the

migration, go to step 7.a. If you choose No, go directly to step 7.a.

d. If there are no PostgreSQL or MySQL* databases, then go to step 7.a.

e. If there is no PostgreSQL database, but there is a MySQL database, choose

Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the existed PostgreSQL database. When finished with the migration, go to step 7.a. If you choose No, go to step 7.a.

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 28: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

28

Database check if there is a lower version of PostgreSQL* or nothing installed on the server:

Have PostgreSQL?

PostgreSQL

Version?

Have

MySQL*?

Install PostgreSQL 8.2

Migrate

PostgreSQL?

Migrate

MySQL?

Yes

No

Low

Yes

Yes

No

No

Yes

No

*Other names and brands may be claimed as the property of others.

Page 29: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

29

Database check if there is the same or higher version of PostgreSQL* database on the server:

Have PostgreSQL?

PostgreSQL

Version?

Have

MySQL*?

Migrate

MySQL?

Yes

Yes

Yes

No

No

Do Not install PostgreSQL 8.2

Same or

higher

*Other names and brands may be claimed as the property of others.

Page 30: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

30

Set PostgreSQL 8.2 Password

8. Install components.

a. Install PostgreSQL* 8.2. You can use the default root account password

which is written in “\Tools\CMPC Configuration File\CMPCConfig.ini”. You

can also set a new password for the database. Click Next.

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 31: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

31

8. Install components (continued).

b. Install J2SDK*, Tomcat*, PostgreSQL*, and the server software. Click

Next. This step may take a few minutes.

Installing J2SDK*, Tomcat*, PostgreSQL*, and theft deterrent software components

InstallationServer

*Other names and brands may be claimed as the property of others.

Page 32: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

32

9. Set the server Admin password.

Note: The password must not be less than 6 characters, it must contain at least one lowercase letter,

one uppercase letter, and one special character (for example, ! @ # , $ %). Some special letters are

considered illegal, for example the question mark (?), backslash (\), and single quote (‘).

Set the Server Admin Password

InstallationServer

Page 33: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

33

10.Set the IP address.

InstallationServer

Page 34: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

34

The server IP address must be set static.

The server IP Address can be blank when server machine has only one network card.

If the server has more than one network card, the installation program will remind you to input a valid static IP address.

Note 1

Note 2

Note 3

InstallationServer

10. Set the IP address (continued).

Page 35: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

35

11. Wait for the Setup program to install the server software.

InstallationServer

12. Click Finish to finish the installation.

Page 36: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

36

Checkpoint 1: How To check to determine if the three third-party software applications have been installed and are working correctly?

How to check if the third party software has already been installed?

After the server has been deployed, you can check the three third-party software applications through "Add or Remove Programs" in the Windows* Control Panel. Their names are “Java* 2 Runtime Environment, SE v1.4.2_08”, “Apache Tomcat* 5.0” and “PostgreSQL* 8.2”.

How To CheckServer

*Other names and brands may be claimed as the property of others.

Page 37: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

37

How to check if the Tomcat* web server works?

Step 1: Choose Start Menu All Programs Apache Tomcat* 5.0

Monitor Tomcat. There should be a Check Tomcat client icon in system tray. Double-click it; you will see the form shown at the right. It’s working if the Service Status is shown as “Started.”

Step 2: Open a web browser and input http://localhost. You should be able to access the Tomcat default page.

How To CheckServer

*Other names and brands may be claimed as the property of others.

Page 38: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

38

How to check if the PostgreSQL* database working?

Select Start Menu All Programs PostgreSQL 8.2 pgAdmin III. Double click the “PostgreSQL Database Server 8.2 (localhost:5432)”, then enter the

database password which you set when you installed the server. (The default PostgreSQL root password is "Intel1234"). It’s working if you can connect to

the database successfully.

How To CheckServer

*Other names and brands may be claimed as the property of others.

Page 39: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

39

How To Recover From a Failure

a) If you see any error messages while installing the server, refer to the Theft Deterrent Software for Intel-powered classmate PCs Deployment Guide.

b) If the Tomcat* web server is not started, select Start Menu All Programs Apache Tomcat 5.0 Monitor Tomcat, then click Start manually in the

“Apache Tomcat Properties”.

How To CheckServer

*Other names and brands may be claimed as the property of others.

Page 40: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

40

How To Check the PostgreSQL Database

To check the PostgreSQL* Service to see if it has started, go to Control Panel Performance and Maintenance Administrative Tools Services.

Manually right-click and start the PostgreSQL Service if it has not already started.

How To CheckServer

*Other names and brands may be claimed as the property of others.

Page 41: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

41

Checkpoint 2: How To check if the Intel® Theft Control Server for classmate PCs has already been installed and works?

Open a web browser and go to the server main page: http://localhost/tdserver. Log into the admin account.

How To Recover From a Failure:

• If you cannot access the server main web page, verify that the Tomcat* web server has been started, if not, start it and try again.

• If you can access the server main web page, but cannot log-in, verify that the PostgreSQL* Service has been started. If it is not started, start it and try again.

How To CheckServer

*Other names and brands may be claimed as the property of others.

Page 42: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

42

Installation

Network Installation

Server Installation

Agent Installation

Page 43: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

43

Pre-Installation

Before starting the Intel® Theft Control Agent for classmate PCs

installation, make sure that the classmate PC can boot to Windows* XP

OS, that all drivers have been installed, and that there are no “!”

indications in the device management listing, especially for the TPM

device.

InstallationAgent

*Other names and brands may be claimed as the property of others.

Page 44: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

44

1. Click setup.exe in Agent Installation Package. Choose setup language and click OK.

InstallationAgent

2. Click Next.

Page 45: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

45

3. Select I accept the terms in the license agreement and then clickNext.

InstallationAgent

4. In the configure file (“\Tools\CMPC Configuration File\CMPCConfig.ini”), the default directory is [C:\Program Files\Intel\Theft Deterrent Agent\]. Click Next.

Page 46: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

46

5. Click Next. This step may take a few minutes.

InstallationAgent

6. Wait a moment and click Finish to finish the installation.

Page 47: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

47

7. Click Yes to restart the computer or No if you plan to restart later.

InstallationAgent

8. After restarting the computer, the agent will start up automatically when the OS starts up. The program will be minimized, displaying an icon in the Windows* OS taskbar.

Page 48: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

48

Checkpoint 3: How To Check the TPM Module

Connect the agent with the server, then move the mouse over the agent’s icon in the system tray. Check the popup tooltips:

• If HWID in the tooltip equals the wired or wireless NIC Mac address, the TPM is working, otherwise it is not working.

• If the Expiration Date is between 2000 and 2099 and the format is “MM/DD/YYYY”, then the TPM is working, otherwise it is not working.

• If the Remain Boots is an abnormal value that exceeds the normal scope (for example 10000, depending on the individual machine), then the TPM isn’t working properly. If it is in the normal range then the TPM is working properly.

How To CheckAgent

Page 49: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

49

Checkpoint 3: How To Check the TPM Module (continued)

How To Recover From a Failure• Go to Control Panel System Hardware Device Manager System

devices Winbond Trusted Platform Module 1.2. If the driver is disabled or shows an abnormal status, restart the computer or “disable/enable” the driver.

• Go to Control Panel Administrative Tool Services NTRU TSS v1.2.1.25 TCS. If the service is stopped or shows an abnormal status, restart the computer or “stop/start” the service.

How To CheckAgent

Page 50: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

50

Checkpoint 4: How To Check if the Agent Has Already Been Installed and Works Correctly?

Manually download and parse a new Boot Certificate. The expiration status will be changed.

How To CheckAgent

How To Recover from a Failure:

• Check that the TPM module in working normally.

• Check that the TSS Service is running in the classmate PC.

• Check that the network of the classmate PC is working properly. You can check the network by accessing the server main web page from a classmate PC.

• Check that the CA certificate has been installed successfully when the agent

downloads the Auto Provision Package.

Page 51: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

51

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Agenda

Page 52: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

52

How To DeployServer and Agent

Prerequisites:

• Install the server and agent software.

• Configure the network.

Page 53: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

53

How To DeployServer and Agent

1. Open a web browser and log-on to the server at “http://localhost/tdserver”, make sure to input the correct user name and password. (You set both of these in Server Installation Step 8.)

Page 54: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

54

2. Check that the Server Broadcast Control is On (the default status is ON). (Choose Server Left Navigation Bar Service Management.)

How To DeployServer and Agent

Page 55: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

55

How To DeployServer and Agent

Agent side

3. Check the Settings. The agent will use the server IP address shown below (right). Double-click the tray icon or right-click the tray icon then choose Settings.

Page 56: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

56

4. The agent will register itself as a temp account on the server. After the

admin logs-in, the window shown below will display. Click Click here to

go to next page.

Note: Only “Admin” users can see this temp account page.

How To DeployServer and Agent

Page 57: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

57

How To DeployServer and Agent

5. Approve the temp account.

Note: Only “Admin” users have the privilege to approve the temp account.

Page 58: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

58

How To DeployServer and Agent

6. The agent will download the certification authority (CA) automatically.

Click Yes to accept this CA.

Page 59: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

59

Note: If the downloaded CA can’t take effect in the classmate PC, follow the steps illustrated below to manually import the CA.

How To DeployServer and Agent

Page 60: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

60

How To DeployServer and Agent

7. The agent will download the “auto provision package,” and then request

that the user reboot. Click Reboot now to reboot the classmate PC or

wait and it will reboot automatically in 30 seconds.

Note: After rebooting the OS, move the mouse over the agent icon in the taskbar.

The deployment was successful if it shows the information below.

Page 61: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

61

How To DeployServer and Agent

8. The agent will then download the “shared secret,” and request the user

to reboot again. Click Reboot now to reboot the classmate PC, or wait

and it will reboot automatically in 30 seconds.

Note: After rebooting the OS, move the mouse over the agent icon in the taskbar. The deployment was successful if it shows the information below.

Page 62: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

62

How To DeployServer and Agent

The agent has now been deployed successfully. This agent can

now be used to download a Boot Certificate from the server.

Page 63: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

63

Agenda

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Page 64: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

64

How To UseServer

1. Device Management: The features are shown below.

Page 65: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

65

How To UseServer

Device Management:

Delete a device

Add a new account Click the hardware ID to edit

Page 66: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

66

How To UseServer

2. Provision Management: The features are shown below.

Page 67: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

67

How To Use Server

Provision Management: Common Boot Certificate settings. You can set the

expiration duration and average boot times per day for all agents.

Note:The Boot certificate expiration duration can’t be less than 15 days, and the total boot times can’t be

less than 100.

Page 68: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

68

Provision Management: One-time Boot Certificate settings. You can

set a one-time or permanent Boot Certificate for a special device.

How To UseServer

Set one-time or permanent BCAdvance search

Page 69: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

69

How To UseServer

3. Unlock Code Retrieval: You can generate the unlock code for the

locked agent.

Generate unlock code

Page 70: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

70

How To UseServer

4. Data Management: The features are shown below.

Import data

Export data

Import server credential files

Export server credential files

Data Management

Page 71: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

71

How To Use Server

Data Management: Here you can backup the server data or import server data.

Import backup account data

Export account data for backup

Import server credential files for

backup

Export backup server credential

files

Note: When importing server credential files, do the followings:

• Unzip the server credential files, then import anyone of them. The remaining files will be imported

automatically.

• Manually restart Tomcat* service or restart the OS after importing the files.

*Other names and brands may be claimed as the property of others.

Page 72: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

72

How To Use Server

5. Security Management: The features are shown below.

Page 73: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

73

Security Management: Shared Secret Settings.

How To Use Server

Update shared secret Export shared secret Advanced search

Page 74: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

74

How To Use Server

Security Management: Public Key Settings.

Update public key for all devices

Export public key for backup

Page 75: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

75

How To UseServer

Security Management: Intel Provision Package. (Refer to the next page to see how to use

the Intel provision package.)

Import Intel provision package

Page 76: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

76

Scenario:

If the server has updated the public key and any of the classmate PCs have been locked, because their boot-time expired without having a new public key downloaded, then how can the Administrator unlock these classmate PCs?

In this scenario, it can only be resolved by using Intel provision package (the procedure

is described in the following steps).

How To Use Server

Page 77: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

77

1. Power on the locked classmate PC and get the S/N number at locked screen.

How To Use Server

Page 78: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

78

2. Get the updated Pub_Key file from the server which can be found in the C:/CMPC directory if the server was installed on the C: drive.

How To UseServer

Page 79: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

79

3. Send the S/N number and pub_key file to your Intel representatives who will give you an Intel signed package named tcopp.bin.

4. Copy the tcopp.bin file to a USB disk.

5. Insert the USB disk to the classmate PC

6. Reboot the classmate PC.

Note: Limitation for using a USB disk:

• Must be formatted by Windows* XP OS built-in format tool.

• FAT16 supports sizes up to 2 GB (Intel recommends using a size < 2 GB).

• FAT32 supports sizes up to 8 GB.

How To Use Server

*Other names and brands may be claimed as the property of others.

Page 80: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

80

6. In the locked screen, press the Ctrl+Insert hotkey to read the USB disk. The screen shown below will display if the USB disk can be read successfully. The classmate PC will reboot automatically.

The classmate PC has been unlocked successfully after the reboot.

How To UseServer

Page 81: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

81

6. Taskbar Icon: The color of the taskbar icon changes to indicate a

different status.

How To Use Agent

“Normal” status.

“Warning” status indicates this PC has less than 2 days or less than 5 boot times until it’s BC expires. The Agent will download common boot certificate automatically.

“Not activated” status indicates this PC account has not been approved at the server.

“Cannot connect with server” status indicates this PC cannot connect with server.

“Cannot connect with server” status indicates this PC cannot connect with server and the account has not been approved.

Page 82: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

82

7. Taskbar Icon: Right-click on the Agent’s taskbar icon to open the menu

shown below.

Log onto server

Settings

Help

About

How To Use Agent

Page 83: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

83

8. Taskbar Icon: device account

Right-click the taskbar icon and then select Log onto Server. Follow the steps shown

below:

Click Login to continue.

For the first log-in, set the password, student name, and birthday.

How To UseAgent

Page 84: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

84

Log onto Server: After the first log-in, input the password and click Login.

Input password

How To UseAgent

Page 85: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

85

Log onto Server: Enter the Profile Settings under My Account.

Profile Setting

How To UseAgent

Click Save to save the new settings.

Page 86: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

86

Log onto Server: Unlock Code Retrieval.

Notes:• When the classmate PC has been locked, you can use your own account to log into the

sever by another classmate PC, and generate the unlock code.

• When the classmate PC has been set to stolen status in the server database, the unlock

code generated by the student account can’t unlock the classmate PC.

How To UseAgent

Page 87: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

87

9. Taskbar Icon: Right-click the taskbar icon and then select Settings. The window

shown below will display.

You can import the server IP address manually

How To UseAgent

Page 88: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

88

If you want to use the Proxy Server, check Use Proxy Server.

You can import the Proxy Server info manually here.

Notes:

• If you have set the Proxy Server in Microsoft Internet Explorer* and have

never used the Theft Deterrent Proxy Server before, the Theft Deterrent

Proxy Server Address will automatically be filled with what is in the IE

setting.

• If the Theft Deterrent Proxy Server has been used before, the Theft

Deterrent Proxy Server Address will be filled with the last used address.

How To UseAgent

*Other names and brands may be claimed as the property of others.

Page 89: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

89

How To UseAgent

10. Taskbar Icon: Right-click the taskbar icon then choose Help. The help page

for the agent will open.

Page 90: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

90

How To UseAgent

11. Taskbar Icon: Right-click the taskbar icon then select About. The About window

for the agent will open.

Page 91: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

91

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Agenda

Page 92: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

92

1. In the Control Panel, find the “Intel classmate PC Theft Deterrent Server ”

and click Remove.

UninstallServer

2. Click Yes to begin the uninstall.

3. The uninstall is finished when the progress indicator dialog closes.

Page 93: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

93

1. In the Control Panel, find the “Intel classmate PC Theft Deterrent Agent ”

and click Remove.

UninstallAgent

2. Click Yes to begin the uninstall.

3. The uninstall is finished when the progress indicator dialog closes.

Page 94: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

94

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Agenda

Page 95: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

95

Q & A

Page 96: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

96

• Pre-Training

• Installation

• How To Deploy

• How To Use

• Uninstall

• Q & A

• Backup

Agenda

Page 97: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

97

To change the default port of the server, if port 80 or 443 has been used by another

application, do the following:

On the server side:

1. Find server.xml file in Tomcat* working folder. If you installed Tomcat* in

C:\Program Files\Tomcat, server.xml file is in C:\Program Files\Tomcat\conf.

2. Change server.xml file as shown below.

For example, if you choose to use 8080 as HTTP port and 8443 as HTTPS port for server, then

change the text shown below.

(Continued)

BackupPort Changing

*Other names and brands may be claimed as the property of others.

Page 98: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

98

3. Restart Tomcat*.

On the agent side:

1. Wait for the server broadcast. When the Intel-powered classmate PC receives the

server broadcast, the server IP address will fill in the edit box of the Agent UI.

2. Modify the configuration file “AgentConfig.ini.” Change the value of “ServerAddress.”

For example, if you have received broadcast from 192.1.1.1, and the HTTP port is

8080, then change the value from ServerAddress="192.1.1.1" to

ServerAddress="192.1.1.1:8080." The temp account will then be registered in the

server.

3. After the admin accepts the device account, the agent will download the auto

provision package and display a message box to reminder user to reboot. Select

Cancel, and then modify the configuration file named "AgentConfig.ini" if the HTTPS

port is 8443, then change the value from ServerAddress="192.1.1.1:8080" to

ServerAddress="192.1.1.1:8443", reboot device.

4. Download the boot certificate from the server.

BackupPort Changing

*Other names and brands may be claimed as the property of others.

Page 99: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

99

Notes:

• When the Admin logs into the server, use https://192.1.1.1:8443/tdserver

• When the student sets his password for the first time in the server, use

https://192.1.1.1:8443/tdserver/student/actication.jsp?HWID=************

• When the student logs into the server, use https://192.1.1.1:8443/tdserver/

student/student_login.jsp

BackupPort Changing

*Other names and brands may be claimed as the property of others.

Page 100: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

100

If there are old versions of LIBEAY32.dll or SSLEAY32.dll (older than version

0.9.7) in the system path, do the following:

1. Press Start and then click Run….

2. Enter cmd then click OK.

3. Input “path” command to list the

system paths.

BackupDLL Changing

Page 101: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

101

For example, you can double-click the icon of My Computer, click Search, and then select All

files and folders.

Input the file name (LIBEAY32.DLL) and select Look in: Local Disk (C:\); then press Search.

BackupDLL Changing

4. Search for the LIBEAY32.dll and SSLEAY32.dll files from these system paths.

Note: The system paths may include several folders. Search for the two files under every subfolder in

the system path.

Page 102: Asset Management (Theft Deterrent)* Training Foils · Yes or No to “Do you want the Theft Deterrent data to be migrated automatically?” If Yes, then input the password of the

102

If old versions of LIBEAY32.dll or SSLEAY32.dll (lower than 0.9.7) files are found in the system

path, do the following:

1. Rename the Libeay32.dll file to Libeay32.bak at “C:\windows\system32” (this must be included

in the system path). Rename SSLEAY32.dll to SSLEAY32.bak.

2. Install the theft deterrent software.

3. After the installation of theft deterrent software is complete, change the name back to the

original names on all the files you changed in the first two steps.

BackupDLL Changing