Download presentation
Presentation is loading. Please wait.
1
PC-DRM User Guide for Global Distribution
Global One POSCO PC-DRM User Guide for Global Distribution Contents DRM Overview How to Install and Uninstall DRM How to Use Security Documents User Self-Diagnosis and Treatment Appendix. FAQ Oct. 27, 2015
2
1. DRM Overview
3
[Fig. 1.1.1 File Icons of General Document and Security Document]
1. DRM Overview (1) Introduction to DRM The system automatically encrypts the files in My Document of PC when they are saved, and restricts the right to access to the created security document to prevent the use of unauthorized persons. Therefore, it is able to prevent leakage of critical information. What is a security document? Comparison of file icons between security document and general document It represents a document that is encrypted by DRM and is under the control of the security policy set forth by security document administrator. The file icon of a security document is different from that of a general document. A security document has the image of a green lock added in the file icon of a general document . DRM Concept [Fig File Icons of General Document and Security Document] Authorized user Allowed to use the document in accordance with permitted access rights Unauthorized user Never allowed to use the document Encrypted Document Distribution and use of encrypted document Outside user Never allowed to use the document even in case of the leakage by accident or by purpose
4
1. DRM Overview DRM support conditions are presented as follows:
(2) DRM Support Environment DRM support conditions are presented as follows: Support OS Windows 7, 8, 8.1 : 32bit, 64bit Support Application Programs Type Program Support Version O A Group Microsoft Office - Word / Excel / PowerPoint 2007, 2010, 2013 HWP 2007, 2010 Hancom Office(HanShow & HanCell) 2010 SE, 2014 Acrobat Reader 9, X, XI , DC Acrobat Standard, Professional 9, X, XI Microsoft WordPad, Notepad Windows Default Mspaint, Windows Image Viewer
5
2. How to Install and Uninstall DRM
6
2. How to Install & Uninstall DRM
(1) Fasoo DRM Installation Install Fasoo DRM Client in the following procedure. Close all running document programs before installation. Installation Procedure & Method 4. DRM Client is automatically distributed and installed. After complete installation, the message about document icon setting change pops up. Click OK. 5. Go to Start > All Programs > Fasoo.com. Check that Fasoo.com Folder is created after complete installation. 1. Download Fasoo DRM installation program at the below URL. 2. Execute the downloaded file. 3. Live Update User Authentication: Enter your EP Login account [Fig Explorer Restart Message] [Fig Live Update Login Window] [Fig Fasoo DRM Installation Check]
7
[Fig. 2.2.1 Control Panel - Add or Remove Programs]
2. How to Install & Uninstall DRM (2) Fasoo DRM Uninstallation In Control Panel – Programs and Features, uninstall Fasoo DRM Client as shown in the below procedure. Uninstallation Procedure and Method ※ Before uninstallation, close all running document programs. Ask a DRM administrator uninstallation. After the DRM administrator grants you the right of removal, you can uninstall the program. Go to Start > Control Panel. Then, remove the following two programs in order. - Fasoo DRM Client for POSCO Global - Fasoo Live Update Agent for POSCO_Global_Server * It is impossible to uninstall before the right or removal is provided. 1. 시작 – 제어판에서 아래 두 가지 프로그램을 제거 합니다. Fasoo DRM Client for LGDISPLAY Fasoo Live Update Agent v2 for LGDisplay Server 파수에서 2를 삭제하기 위한 전제 조건으로 2를 수정해 주면 위와 같은 사용자 가이드로 끝!! 위 방식으로 절대 안 된다 하면 어쩔 수 없이 EA팀 및 보안팀과 협의하여 삭제 제한 정책으로 진행~ 그 방식은 아래 두가지 다 사용 운영자용 Daily Key 방식 1:1 Mapping Key : 사용자 삭제 요청키 > 삭제 인증키 방식 삭제 제공 데일리키 프로그램 사용 요령 및 1선 제공 필요. [Fig Control Panel - Add or Remove Programs]
8
3. How to Use Security Documents
9
3. How to Use Security Documents
(1) Online Login After DRM Client program is installed, user authentication is required. At the time of EP Lite login, DRM login is automatically made, and before EP Lite login, it is possible to login DRM manually. How to login manually 1. When a document tries to be saved, Login window pops up. 2. Enter your EP Lite account. 3. Normal DRM login status [Fig Login Completion] [Fig Manual Login Window]
10
3. How to Use Security Documents
(2) Offline Login When using a security document in the condition of failure of access to network, use Manual Login Window to log in DRM. In the case, only if you successfully logged in DRM online at least once, you can make possible offline login. How to make offline login 1. When a security document tries to be opened or saved, Login Window pops up. 2.Enter you EP Lite account (the latest account with which you successfully logged in at the time of online login) 3. Normal offline login status [Fig Login Completion] [Fig Manual Login Window]
11
3. How to Use Security Documents
(3) Encrypt A general document can be encrypted to a security document. How to encrypt 1. Right-click a general document file icon. 2. Click Secured Document > Convert to Secured document 3. When the ‘Browse For Folder’ dialog box pops up, select a location to save an encryption document and click OK. [Fig Select a location to save a security document] [Fig Create a security document]
12
3. How to Use Security Documents
(3) Encrypt Hot to encrypt (cont’d) 4. If the same file name exists, Alert Dialog Box pops up. If your replace the existing file, click Yes, otherwise click No. (If ‘No’ is selected, encryption process ends.) 6. The created security document has the green lock icon. [Fig Security Document Icon] [Fig Replace with a created security document file] 5. Check that the created security document is in the location. [Fig Message about completion of security document creation ]
13
3. How to Use Security Documents
(4) Check access rights of security document Users can have different access rights depending on security documents. Therefore, each user needs to check their access rights of the security document to use. How to check access rights 1. Right-click the file icon of security document. 2. Click Secured Document > Properties in Menu 3. You can user access rights on the ‘General’ tab in the Properties’ Dialog Box. In the ‘Permissions’ checkboxes, the selected rights only can be used. [Fig View the properties of security document] [Fig Security Document Properties – General Tab]
14
3. How to Use Security Documents
(5) Check access rights of security document The below table describes each access right type in the Properties Dialog Box. Types of Access Rights Type Description. View It is possible to open the security document. Edit It is possible to open, edit, and save the security document. Screen Capture It is possible to open the security document and capture its screen image. Decrypt It is possible to release the security document and convert it into a general document. Print It is possible to open and print out the security document. Change Permissions It is possible to change the access rights of the security document.
15
[Fig. 3.6.1 Security Document Properties – Document Class Tab]
3. How to Use Security Documents (6) Check the policy on each class of security documents You can check details about rights by document security class set up by company security policy. How to check details about document Class 1. Right-click the icon of the security document file. 2. Click Secured Document > Properties in Menu 3. Click Document Class tab. 4. Select Dropdown List to check the access rights of each user or each department in each Document Class. [Reference] The properties are not about the screen to present the level of a relevant document, but about the screen to display document levels in accordance with company security policy. To see the level of a relevant document, check Document Class on ‘General’ tab . (See 3-(4) ) [Fig Security Document Properties – Document Class Tab]
16
[Fig. 3.7.1 Alert message about no ‘View’ right]
3. How to Use Security Documents (7) Open Security Document To open a security document, you need to have the ‘View’ right to the security document. ※ PC DRM POLICY : Document allowing access right If you don’t have the ‘View’ right, If you try to open a security document without the View’ right to the document, the below message pops up. [Fig Alert message about no ‘View’ right]
17
3. How to Use Security Documents
(8) Edit Security Document If you want to edit a security document, you should have ‘edit’ permission for it. A user, who has edit permission, can open and edit the document and save it as an encrypted one again. ※ PC DRM POLICY : Text editing rights are allowed Copying and pasting a security document by a user without ‘edit’ permission. Copying and pasting a security document by a user with ‘edit’ permission. .If you do not have edit permission, the edit menu in the application program is disabled as follows. If you try to copy a part of the document, the following pop-up message is shown and copying is not allowed. Case 1. Pasting from a general document into a security document If you have ‘edit’ or ‘decryption’ permission, you can paste a part of a general document into a security document. Case 2. Pasting from a security document into a general document Even though you have ‘edit’ permission for a security document, you cannot paste a part of it into a general document. For pasting a part of a security document into a general one, you should have ‘decryption’ permission, by which you can convert a security document into a general one. It is possible to change and edit General Document Security Document It is impossible to change and edit Security Document General Document, Web It is possible to change and edit (in this case, the ‘Edit’ right is required) Security Document Security Document [Figure Application program menu in the case of not having ‘edit’ permission] Case 3. Pasting from a security document into a security one You can do this only when you have edit permission for both of them. [Figure Pop-up message in the case of not having ‘edit’ permission]
18
3. How to Use Security Documents
(9) Print out Security Document To print out a security document, you need to have the ‘Print’ right. ※ PC DRM POLICY : Print rights are allowed If you don’t have the ‘Print’ right, Print out on a virtual printer If there is no ‘Print’ right to a relevant document, the below alert message pops up. Not only to restrict the print function of an application program, but to prevent leakage of a security document, it is possible to restrict print-out on a virtual printer. Even if you have the ‘Print’ right, you can print out a document on a virtual printer. - FintPrint - Microsoft XPS Document Writer - Microsoft OneNote, etc. [Fig Alert message about no ‘Print’ right] [Fig Alert message about print-out on virtual printer]
19
[Fig. 3.10.1 An example of screen-capture of security document]
3. How to Use Security Documents (10) Screen-Capture Security Document You can not capture the security document screen. ※ PC DRM POLICY : Screen capture rights are allowed The cases of screen capture - Screen –capture with short-cut keys (Print Screen, Alt + Print Screen) - Screen-capture with the use of a commercial capture program - Screen-capture through the connection with virtual machine and remote desktop (Terminal Service) [Fig An example of screen-capture of security document]
20
[Fig. 3.11.2 The case of no ‘Decrypt’ right]
3. How to Use Security Documents (11) Decrypt If you have the ‘Decrypt’ right, you can convert a security document into a general document. ※ PC DRM POLICY : Decoder rights are allowed of Security personnel. How to release encryption 1. Right-click the icon of a security document file. 2. Click Secured Document> Decrypt in Menu [Reference] If you don’t have the ‘Decrypt’ right, it is impossible to convert a security document into a general document, and the below dialog box pops up. [Fig The case of no ‘Decrypt’ right] [Fig Decrypt]
21
[Fig. 3.12.1 Check the properties of security document]
3. How to Use Security Documents (12) Check Security Document Properties You can check the properties of a security document. How to check the properties of a security document 1. Right-click the icon of a security document file. 2. Click Secured Document> Properties in Menu. Type Description Document Name The file name of the security document Date of Creation Date and time of security document creation Owned By Name The name (ID) of the person who converted general document to the security document Department The department of the owner Domain Code An ID to identify the security document source, which is used for management. Created By Name The name of the writer of the security document The department of the security document writer Document Class A security level of the security document (separate level by corporate body) [Fig Check the properties of security document]
22
3. How to Use Security Documents
(12) Check Security Document Properties If you don’t have the ‘View’ right, you are not able to check the properties of a security document. How to check the properties of a security document (cont’d) 1. Right-click the icon of the security document file. 2. Click Secured Document> Properties in Menu. [Fig Check the properties of security document(if you have no ‘View’ right)]
23
4. User Self-Diagnosis & Treatment
24
4. User Self-Diagnosis & Treatment
(1) Diagnose Client State A user is able to diagnose the state of DRM Client directly. How to diagnose the state of DRM Client Right-click the lock icon in System Tray Click DRM Self Monitoring. Check DRM state 4. User Self-Diagnosis & Treatment Type Description Problem-Solving DRM Service State Whether DRM client works well DRM Emergency Recovery => See 4-(2) SSO State Whether to log in DRM well DRM Log in => See 3-(1) DRM Server Communication State Whether to connect with DRM Server well Connect to intranet Others Whether there are problems, such as an error of opening a document Update DRM Policy => See 4-(3) [Fig DRM Self Monitoring Tray Icon Menu] [Fig Check DRM Info. Screen]
25
[Fig. 4.2.1 DRM Recovery Menu]
4. User Self-Diagnosis & Treatment (2) DRM Recovery A user is able to return DRM Client to its initial installation state directly. DRM Recovery Execute [Start → All Programs → Fasoo.com → DRM Client –POSCO Global → DRM Recovery]. [Fig DRM Recovery Menu]
26
4. User Self-Diagnosis & Treatment
(3) Update Policy The access rights of security documents are defined by the policy which is set forth by DRM administrator. The policy changed in DRM Server is regularly downloaded into user PC. To apply the changed policy immediately, you can update the policy manually. How to update policy with the use of Start Menu How to update policy with the use of System Tray Icon 1. Click Start > All Programs > Fasoo.com > DRM Client – POSCO Global > Update FSN Policy. 1. Right-click the lock icon of System Tray. [Fig Update Policy Tray Icon Menu] [Fig Update Policy in Start Menu] 2. Click Update Policy 3. Once the policy is updated completely, click OK on the dialog box. 2. Once the policy is updated completely, click OK on the dialog box. [Fig Message about the completion of policy update]
27
Appendix. FAQ [Common Matters]
If you have a problem to open a file, check the Application Support List to see if the default application is in the list. - With the below tips, you can change the default program. ※ How to change : Right-click on a file → Open with→ Choose the program you want to use to open this file → Select the checkbox of ‘ Always use the selected program to open this kind of file → click ‘OK’ Q. When trying to open an encrypted image file, I am not able to see the image well. A. The encrypted image file is always opened with Paintbrush or Windows Photo Viewer only (it is not opened with other viewers). Q. When trying to open a PDF document file, I found the message saying “unable to open ‘filename.pdf’ which is neither supported nor damaged”. A. PDF files are supported by Acrobat Reader 9.x / X(10.x) / XI(11.x) versions. Q. When trying to open a security document file, I found the message saying “the module for security is neither found nor installed.” A. Execute Start → All Programs → Fasoo.com → DRM Client –POSCO Global→ DRM Emergency Recovery to reinstall. Or, execute Control Panel → Programs and Features → Fasoo DRM Client for POSCO Global → Recovery to reinstall.
28
Appendix. FAQ Q. When trying to open a security document file, I found the alert window saying “you have no ‘View/Edit ‘ right.”, “You have no ‘Print’ right.”. A. Download the latest policy as shown in the below and try it again. Execute Start → All Programs → Fasoo.com → DRM Client –POSCO Global→ Update FSN Policy, or click “Update Policy” in DRM Tray Menu Q. When I opened a security document, I found that the characters are abnormal or broken. A. If you try to install or already installed DRM Client, execute Start → All Programs → Fasoo.com → DRM Client –POSCO Global → DRM Recovery to reinstall.
29
Appendix. FAQ Q. It is impossible to copy and paste the contents of a security document into a new document. A. If the document is not owned by you, you are not allowed to copy and paste the contents of the security document into a general document. You can copy and paste the contents of the security file owned by you. Q. I am not able to use the functions of Move or Copy a sheet in Excel, which is available in general documents. A. The function is not allowed for encrypted Excel documents. If you need the Move or Copy function, keep pressing ‘Ctrl' key in the file and Drag & Drop” the sheet. - To move or copy a sheet to a different file, open two Excel files in one Excel window as shown in the below, and move or copy.
30
Appendix. FAQ Q. I need to capture the screen of my security document.
- In security policy, it is impossible to capture the screen. To capture the screen, release its encryption and convert the document into a general document. - Contact the administrator who has the right of ‘Release Encryption’. Q. I want to decrypt a DRM document. - Apply for EP Lite Document Taking-out in order to send the original copy to an outsider. - Or, contact the administrator who has the right of ‘Decrypt’. Q. How can I know if DRM Client is running? - If you save any document, an icon with yellow lock is created on Windows Taskbar on the right bottom, which means the client is running.
31
Appendix. FAQ Q. How can I use an encrypted document in other application programs than DRM related application programs? A. Encrypted documents can be used only with the application programs support by DRM. It is impossible to use encrypted documents with other application programs. Q. I can’t see DRM Tray Icon (Yellow Lock). A. In the cases of EP login, document saving, or DRM security document opening, log in manually. Then you can see the icon.
32
End Of Document
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.