0% found this document useful (0 votes)
118 views32 pages

Intel® Anti-Theft Service: User Guide

Uploaded by

Riko Andia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views32 pages

Intel® Anti-Theft Service: User Guide

Uploaded by

Riko Andia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Intel® Anti-Theft Service

user guide

Version 1.5
Contents
Chapter 1: Quickstart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Quickstart Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Quickstart Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 2: Introducing the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Service Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
More About the Built-in Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Setting up Intel® Anti-Theft Service for Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 3: Registering the Laptop into the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Step 1 – Setting up Your Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Step 2 – Verifying Your Email Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Step 3 – Configuring Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Step 4 – Downloading and Installing the Laptop-based Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter 4: Using the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Locking Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Requesting Lock Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Triggering the Lock/Theft Protection Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Updating the Timer Based Lock Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Setting the Lock Device Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Checking Status through the Notification Area Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Right-Clicking the Notification Area Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Using the Help Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Viewing Tooltips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 5: Using Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Opening Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Creating an Encrypted Container . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Closing Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Recovering Secure Data Vault Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Chapter 6: Recovering Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Unlocking from the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Entering the Unlock Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2 Contents
Retrieving the Unlock Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Recovering the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Chapter 7: Suspending or Cancelling Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Suspending Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Unsubscribing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Chapter 8: Contacting Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Support Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Chapter 9: FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Account Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Theft Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Unlock Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Appendix
Installing Java* Runtime Environment v6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

3 Contents
Chapter 1:
Quickstart
If you understand the technology and you are comfortable with the features of this Service, follow this quickstart
to set up and configure the Intel® Anti-Theft Service (referred to throughout as “the Service”). If you’d prefer more
explanation with full details of the procedure, skip this section and go to the section “Introducing the Service.”

Quickstart Requirements
To enable the Service, you need:

• A valid email address


• An Internet connection
• A laptop equipped with Intel® Anti-Theft
Technology
Some of the capable models are listed here:
ATservice.intel.com

Quickstart Procedure
There are two basic steps to getting started:

1. Registering your laptop into the Service To register your laptop into the Service:
2. Creating a Secure Data Vault container 1. Go to ATservice.intel.com.
2. Click New users, register now.
Note: In certain locations, the Secure Data 3. Enter the information to set up your account.
Vault feature is currently not available.
4. Enter the six-digit code in the email that was sent by the
Service.
5. Enter the information to configure your laptop.
6. Follow the instructions to complete the installation process.

warning: Your laptop is not protected until you enroll it into the
Service.

4 Quickstart
To create a Secure Data Vault container:
1. Click Windows Start.
2. Click Secure Data Vault.
3. Create a new Secure Data Vault password
and container.
4. Move files into the container and the program
will automatically encrypt the files.
To contact Intel Anti-Theft Service for additional
questions:

Visit ATservice.intel.com. Click Contact Us.

5 Quickstart
Chapter 2:
Introducing the Service
Congratulations
Your selection of the Intel® Anti-Theft Service is a positive step toward guarding against theft and ensuring your
personal privacy. This user guide explains how to take advantage of the built-in hardware features, software options,
and service benefits.

Service Features
The Service lets you: If your laptop is lost or stolen,
it can be automatically disabled
• Lock down your laptop if it is lost or stolen so
and only you can turn it back on.
that no one can use it
• Create an encrypted folder (known as
Secure Data Vault) on your laptop where
private files can be stored
It’s like having a full-time security guard inside your laptop. When
Note: In certain locations, the Secure Data suspicious activities are detected, the technology automatically
Vault feature is currently not available.
locks down your laptop.

If your laptop is lost or stolen, it can be automatically disabled and


These features can’t be used until you’ve only you can turn it back on.
registered your laptop, so be sure to complete
the registration process promptly. Laptop lockdown can occur in two ways:
1. Your laptop is lost or stolen, and you notify the Service.
Your laptop will lock down the next time it synchronizes with
Note: Encryption converts data into a code
to prevent unauthorized access.
the Service—no matter where it is. Your laptop automatically
synchronizes with the Service whenever your laptop connects
to the Internet.
More About the Built-in Protection
2. You don’t connect your laptop to the Internet for a
Your laptop includes built-in hardware specified number of days (as set in the Service options).
components, designed by Intel, that work with For example, if your laptop is lost and the timer expires after
software and the Service to provide multiple several days without server synchronization across the
levels of protection. Intel® Anti-Theft Technology, Internet, the laptop goes into lockdown mode.
available in all UltrabookTM devices and on select
laptops featuring the 2nd generation Intel® Note: We recommend that you complete the registration
CoreTM processor family, strengthens security by process as soon as possible so that the powerful anti-theft
performing operations in protected areas in the capabilities in your new laptop will be activated and ready for
laptop’s hardware. Hardware-enabled protection use.

enhances protection.

6 Introducing the Service


You’ll enjoy a greater degree of security and Setting up Intel® Anti-Theft Service for Your
freedom with these strong laptop protection Laptop
features in place, and you’ll reduce the risk of
You can control how the Service features work on your laptop
identity theft or having private information
by setting certain options. Spend some time becoming familiar
revealed.
with these options by reading the descriptions in this guide. This
Secure Data Vault will help you understand how to configure the Service to your
personal preferences.
Secure Data Vault is technology that creates a
protected region on the hard disk drive of your
laptop where you can securely store sensitive
information. This region is identified by its own
assigned drive letter on your system, and it can
be accessed only by supplying the password
that you create. All data contained in Secure
Data Vault is encrypted, so it cannot be read by
anyone other than you.

This feature automatically installs during the


initial setup of the Service.

7 Introducing the Service


Chapter 3:
Registering the Laptop into the Service
To register into the Intel® Anti-Theft Service, you need:
• An Internet connection and a valid email address
• A laptop that includes Intel® Anti-Theft Technology (when you enroll be sure to use the laptop that will be
registered into the service, rather than any other laptop)
To begin the activation process:
1. Log in to ATService.intel.com.
The Welcome screen appears, described in the
following section.

Step 1 – Setting up Your Account


To register and enroll your laptop into the
Service:
1. From the Welcome page, click New users,
register now.
The Account Set Up screen appears.
Note: The email address is used to complete the account
2. If you have an Activation Code, enter it
setup.
exactly as it appears on the Activation Card
inside the Intel® Anti-Theft Service Package.
5. Enter the characters shown in the graphics box near the
3. Enter the Email Address you want to use for
bottom of the left column. This box helps confirm that a
communications with the Service.
person, not a computer program, is creating the account.
4. Create a login password. Use numbers and
6. Select two security questions to answer from the options at
a mix of uppercase and lowercase letters—at
the top of the right column. Your answers are used to confirm
least 8 characters in length—to make the
your identity during subsequent visits to this site. Choose
password harder to break.
questions that you readily know the answers to (so that you
Note: The subscription activation site
can easily remember the answers).
relies on Java*. Refer to the Appendix if
you need details on how to set up Java for Note: The visual indicator below the password box indicates
your laptop. This Appendix also provides the relative strength of the password that you’re creating. A
information on browser compatibility longer password using mnemonics rather than recognizable
and testing your laptop for service words is stronger.
compatibility.

8 Registering the Laptop into the Service


7. Click the I Agree to Terms and Conditions
link to read the legal details that apply to this
account. If acceptable, select the check box to
confirm your acceptance.
8. Click Next to complete setting up your
account.

Step 2 – Verifying Your Email


Address
The Service account server sends an email
message to the email address you provided in

Note: If you stop the registration process


after initially setting up your account,
3. Enter a phone number or email address or both. The maximum
you can restart it by logging in with your
email address and password. message length is 50 characters, and only ASCII characters
(i.e., 0 to 9, a to z, A to Z) are allowed. Any information that
order to validate the address. you enter here will be visible to someone who has stolen
your laptop.
Open the email message sent to your registered
4. Click Next to apply the settings on this page to your laptop’s
email address. Enter the six-digit code from the
lockdown function.
email and click Next to verify your email address.

Step 3 – Configuring Your Laptop


This step configures your laptop for the lockdown
function.

Note: You can change your email address


by clicking Change my Email Address.

1. Select a nickname for the laptop that will


make it easy to identify (for example, “Joe’s
computer” or “Dad’s computer”).
2. Create an Unlock Password of at least eight
numbers. This will be the password used to
reactivate your laptop following a lockdown
event (for example, if the laptop is lost and
then returned to you).

9 Registering the Laptop into the Service


Step 4 – Downloading and Installing Registering Multiple Laptops
the Laptop-based Software You may register up to 10 different laptops on your account as
1. To start the download process, click Next. long as you have an activation code for each laptop and the laptop
is enabled to support Intel Anti-Theft Technology.
2. A pop-up box shows the target folder for the
installation in the Select Destination Folder To register a new laptop:
dialog. You can select a different folder using
1. Log in to the service with the laptop that will be registered
the change button. Click Next when you have
into the service.
decided on the folder.
2. Click Enroll New Device.
3. When the Service has finished the
installation, it displays a summary screen that 3. Configure the new laptop.
lists important information that applies to 4. Download and install the software onto the new laptop.
your account. We recommend that you print
this screen and keep it in a safe location.
It includes password details, the original
Activation Code (if applicable), your unlock
password, and other details that are essential
for using the features of the Service.

10 Registering the Laptop into the Service


Chapter 4:
Using the Service
Whether you have one laptop or several enrolled
in the Service, it is always easy to log on, check
the current status of your enrolled laptops, make
changes to passwords, view recent activities, and
change the settings that apply to lockdown.

Locking Your Laptop


On a regular basis, when you turn on a laptop
that is enrolled in the subscription service,
that laptop automatically communicates or
synchronizes with the Service server while it
is connected to the Internet. This connection tip: To strengthen the security protection, configure your
confirms that all is well and that no lockdown laptop so that the WLAN connection can be completed
requests have been received (by phone or Web). before Microsoft Windows* starts. This allows the contact
If the lock or theft protection mode for the laptop with the Service server to be made (and any recent changes
to the settings to be implemented).
is activated, one cannot go farther than the initial
screen where the Unlock Password is required.
(See Chapter 6, Recovering your Laptop.) Triggering the Lock/Theft Protection Mode

Requesting Lock Laptop Mode Locking Your Laptop Automatically

1. Login to your account and select the desired The laptop goes into a lockdown state if there has been no
laptop from the drop-down menu. communication to the Service server within a number of days
(as specified by the Timer Based Lock setting). You can set the
2. Click Set Lock Now.
number of days allowed before this action takes place by going to
The Lock Laptop dialog box appears. the Settings page.
3. Click the red Lock PC button.
For example, if your laptop is lost during travel on an airline and
The lock request will be delivered to your is sent to lost and found, after the set number of days passes
laptop the next time it synchronizes with the without a network connection, it will lock down. If you set the
server. lockdown value at 4 days, if the laptop is powered up on day 5, it
If you want to lock immediately (so you can will be in lockdown mode.
see how the laptop behaves and view the lock
screen), a pop-up box appears to show how to
lock the laptop immediately.

After your laptop has shut down, see chapter 6,


Recovering your Laptop to unlock your laptop.

11 Using the Service


Updating the Timer Based Lock If you would like the message to be updated immediately, a
Setting pop-up box appears to show how to synchronize the laptop
immediately.
1. Login to your account and select the desired
laptop from the drop-down menu. Checking Status through the Notification Area
2. Change the Timer Based Lock setting. You can Icon
also disable it. When the laptop-based software for the Service has been
3. Click Save to update the Timer Based Lock. installed on your laptop, an icon appears in the Windows
The updated Timer Based Lock setting will notification area (at the far right of the taskbar). This icon
be delivered to the laptop the next time it changes to reflect current status and to provide security- related
synchronizes with the server. notifications. The table on the following page describes the range
If you would like the settings to take effect of notifications and the icons in use.
immediately, a pop-up box appears to show how
to synchronize the laptop immediately.

warning: Disabling Timer Based Lock will reduce


your protection. This action enables an unauthorized
person to remove Intel Anti-Theft Service software
from your device, thus preventing you from locking it
down in the event of a theft.

Setting the Lock Device Message


When the laptop is locked down, the screen
shows the Lock Device Message.

1. Login to your account and select the desired


laptop from the drop-down menu.
2. Change the Lock Device Message in the box
provided.
3. Click Save to update the Lock Device
Message. The updated message will be
delivered to the laptop the next time it
synchronizes with the server.

Note: You can also lock down your laptop


by phone. Refer to the section “Getting
Phone-based Support” for details.

12 Using the Service


Icon Icon state Notification Action
Red Indicates that less than 24 hours remain Log on to the Internet
before server contact is needed. within the 24-hour
window to avoid having
the system lock.
Pop-up balloon Appears once each hour, counting down the Log on to the Internet
time before the laptop automatically locks up. within the time specified
When less than 45 minutes remain, the balloon to avoid having the
pops up every 15 minutes. system lock.
Gray Indicates the Service is currently suspended. No action needed.

Missing icon If no icon is visible in the system tray, the Re-enroll if service is
laptop has been unsubscribed from the needed.
Service.
Default icon Indicates the Service is enabled and monitoring No action needed.
conditions.

Note: The notification area icon may not be visible. Press the UP ARROW key to view the visible icons.

Right-Clicking the Notification Area • Software Update Settings. Lets you select the manner in
Icon which updates are handled. Options include Install Updates
Automatically, Notify Me When an Update is Available,
If you right-click the notification area icon for the
and Don’t Automatically Check for Updates. The command
client application, you can access a menu that
Check Now when selected immediately performs the check
controls these options:
for updates.
• Open Secure Data Vault (if closed) or Close
• Show EULA. Displays the End User License Agreement.
Secure Data Vault (if open). Provides access
to password-protected encrypted containers • Server Synchronization Status. Indicates the current details
that you have created with the Secure Data related to the server synchronization operations.
Vault feature. • About. Provides information about the Service client
• Synchronize Settings with Server. Forces application.
synchronization with the Service server to • Exit. The Service client application exits and the icon
check status and update settings. disappears from the tray. The client and system tray icon are
again available the next time the laptop boots.

13 Using the Service


Using the Help Menu
You can obtain help when logged in to the
Service by clicking the Help button near the
top of the main screen. The Help window that
appears offers answers to common questions
and provides concise procedures for tasks such
as creating a user account and enrolling a new
laptop.

Viewing Tooltips
Many of the options displayed in the Service
screens use tooltips to provide a quick description
of a field or featue. To view tooltips, let the
cursor hover over an item for two or three
seconds and, if a tip is available, a pop-up
description will appear.

14 Using the Service


Chapter 5:
Using Secure Data Vault
With Secure Data Vault, you can create a protected area on your hard disk that is password-protected and encrypted.
Secure Data Vault offers additional protection for any private or sensitive information stored on your laptop.

Note: In certain locations, the Secure Data Vault


feature is currently not available.

To use Secure Data Vault, you create an encrypted container,


which appears as a drive on your laptop mapped to a letter that
you assign to it (for example, drive E). When you start Secure Data
Vault for the first time, you will need to create a password and the
encrypted data can be accessed only if the password is supplied.

Opening Secure Data Vault Note: We strongly recommend that you regularly
When Secure Data Vault is open, you can create back up the files in your Secure Data Vault using your
containers and copy files into them. When the favorite backup utility. You can also back up the entire
encrypted container, but the container is typically large and
vault is closed, the files are encrypted and
could require a significant amount of time and space for the
cannot be viewed unless the correct password is back-up process. Information in this backup will have the
provided. same encryption and password protection as the encrypted
container that you created on your hard disk. If your laptop
To open Secure Data Vault: is stolen or lost, you can recover the information from the
1. Locate the application for Secure Data Vault backup using the data recovery tool.

on your Start menu and click its icon. If you


have not already created a password to 3. In the Login to Secure Data Vault dialog box, type the
access Secure Data Vault, the program will password, and then click Login.
ask you to create one at this time. 4. In the window that appears,
2. Enter the password you want to use and select the name of the
confirm this entry in the next field. Click OK container that you want to
to continue. open.
5. Click the Open icon to make
the container, associated
with the drive letter you
assigned, available for use. If
you haven’t yet created any
containers, the next section
explains how to do so.

15 Using Secure Data Vault


Creating an Encrypted Container
You can create as many containers as you want
within Secure Data Vault.

To create a new encrypted container:


1. Select the application for Secure Data Vault
from the Start menu on your laptop.
2. From the main window, select New.
The Create New Encrypted Container dialog
box appears.
1. In the Assign drive letter field, specify the letter drive you
3. Create a name for the new container and
want to use.
designate a folder in which to store it. By
default, the encrypted container is stored in 2. Click Create to name and create the encrypted container. The
your My Documents folder on drive C. Use drive that you assigned to the container and the status will be
the Browse button to select a different folder shown in the window for Secure Data Vault.
anywhere on your system. While the status of the container is Open, you can move files
4. Specify a size for the container in the in and out of it as you would with any disk drive—using the
Size entry field. Make sure that you leave Microsoft Windows* tools that are most convenient. Files are
adequate space on your disk drive for other encrypted from the time they are moved into the vault.
applications and normal operations. 1. Click the Close icon to return the vault to password protection.

Note: If you choose to back up the entire 2. Click the Logout icon to close the application.
container, the size of the container will Logout button closes all containers and then logout from SDV.
determine the time and space that the
This can be useful if you have several containers opened.
backup will take. To expedite backup
time and to save space, you can back up
your files instead of the entire container. Note: You can include the path for each Secure Data Vault
A large container typically requires a encrypted container in your regular backup operations,
significant amount of time and space to but the entire container will be backed up. This should
backup. be the path where Secure Data Vault was originally
created (for example: C:\User\Administrator\Documents\
SDVContainers). The data contained in the backup will also
be encrypted, and it can be recovered using the recovery
procedure described in the following section.

16 Using Secure Data Vault


2. Log in to the Service, select the desired laptop from the drop-
down menu, and then click the Secure Data Vault tab.
3. Click the Recover Container button to download the data
recovery tool for Secure Data Vault.

Closing Secure Data Vault


To close Secure Data Vault:
1. Once you’re done using Secure Data Vault 4. When the download is complete, double-click the tool to open
and you’ve finished copying files in or out of it. If you’ve restored the container files to My Documents, the
containers, select any open containers that recovery program will automatically recognize and register
you’d like to close from the displayed list. them.

2. Click the Close icon to close and lock the 5. Open any of the displayed containers and copy the recovered
selected container. content to any appropriate location on your hard drive or other
media.
3. Click the Logout icon to exit from the
application for Secure Data Vault. If your replacement laptop includes Intel® Anti-Theft Technology
capabilities and you have service time remaining, you can
Recovering Secure Data Vault optionally enroll the laptop in the Service at this time.
Information
To restore Secure Data Vault on your laptop following hard
If your laptop is lost, stolen, or suffers a hard disk
disk replacement:
drive failure, you can recover the data stored in
your Secure Data Vault if you have a backup file 1. Complete the installation of the new hard disk drive or
available. operating system upgrade.
2. Restore the data backup of an encrypted container made
To restore Secure Data Vault on a replacement
by Secure Data Vault to the My Documents folder on your
laptop:
laptop.
1. On your replacement laptop, restore the data
3. Log in to the Service, select the desired laptop from the drop-
backup of the Secure Data Vault encrypted
down menu, and click Recover Container to download and
container to the My Documents folder.
install the container.

17 Using Secure Data Vault


4. When the software has been installed, open Secure Data Vault
the Secure Data Vault application. Your
If you lose or forget the password to Secure Data Vault, you can
encrypted container files that have been
retrieve it as long as your Service subscription is active.
copied to the My Documents folder are
visible and ready to access. To retrieve the password for Secure Data Vault:
If your laptop has been repaired, had changes 1. Log in to the Service and then click the Secure Data Vault tab
to its motherboard, or had the BIOS re-flashed for the selected laptop (on which Secure Data Vault is stored).
(causing the laptop to become un-enrolled), the
2. Click Retrieve Password. A message containing a link is sent
system may be returned in a suspended state.
to your current email address.
When you resume the Service, we recommend
3. Open the email message, and then click the link provided.
that you change your password.
4. Answer the security questions on the screen that appears.
To restore Secure Data Vault on your laptop The program then lets you view the current password.
after a repair:
1. Restore the data backup of the container Note: If your subscription is not active, your Secure Data
made by Secure Data Vault to the My Vault is in read-only mode and you cannot recover your
password. For more details, refer to Chapter 7: Suspending
Documents folder on your laptop.
or Cancelling Service.
2. Log in to the Service, and then select the
Secure Data Vault tab for the selected
laptop. Note: You can change the password for Secure Data Vault
by selecting the Change Password check box at the time you
3. Click Recover Container to download the log in to Secure Data Vault. The program will provide a second
data recovery tool for Secure Data Vault. field to confirm the newly entered password. The next time
4. When the download is complete, double-click the client application synchronizes with the Service, this new
password will be stored on the server. You can then retrieve it
the tool to open it. If you’ve restored the
whenever necessary using the preceding procedure.
container files to the My Documents folder,
the recovery program will automatically
recognize and register them.
5. Open any of the displayed containers
and copy the recovered content to any
appropriate location on your hard drive or
other media.

Note: The Export/Import functionality


can also be used for recovery purposes, to
backup and restore a particular container.
This is a simpler backup/recovery
procedure.

18 Using Secure Data Vault


Chapter 6:
Recovering Your Laptop
If your laptop is lost or stolen, it can be locked
in one of three ways:
• By logging into the Service and using the Set
Lock Now laptop command
• By the laptop failing to connect with the
Service for the set number of days in the
Timer Based Lock
• By issuing a Lock laptop command by phone
using Customer Support

Unlocking from the Web


If your locked laptop is recovered, you can return
it to normal operation by first setting the laptop
to unlock on the Web and then entering the
Unlock Password on the locked laptop.

To unlock the laptop on the Web:


1. Log in to the Service with another laptop, and
then click the name of the selected laptop.
The values that apply to that laptop are
shown in the user interface.
2. Click the Set Unlock Now button.
3. Click Unlock PC to set the laptop to unlock.
The next time the specified laptop communicates
with the Service, it will be unlocked for your use.
The laptop will communicate when it powers up
or on regular intervals.

19 Recovering your Laptop


Entering the Unlock Password Retrieving the Unlock Password
To enter the Unlock Password: If you forget the Unlock Password, you can retrieve it from the
Service.
1. Turn on your laptop. If the laptop has been
locked, a screen will appear from the BIOS To retrieve the Unlock Password for an enrolled laptop:
that requests the recovery passphrase, such
1. Log in to the Service, and then click the name of the selected
as the one shown below:
laptop.
2. Type: 1 (to use a passphrase).
2. Click Retrieve Password. A message with a link is sent to your
3. Enter the passphrase (your Unlock Password). registered email address.
If the password is correct, the laptop
3. Click the link and then answer the security questions. The
completes the startup process.
Service displays your Unlock Password.
4. Click OK to return to the previous screen.

Recovering the Service


In certain situations, your subscription to the Service may be
current, but you may not be able to access it because of disk-
drive corruption, a hard disk change, or other system changes. To
continue using the Service, you will need to log in and reinstall the
necessary software.

To recover the Service:


1. Log in to the Service, and then click the name of the selected
laptop.
2. Click Reinstall Device Software

20 Recovering your Laptop


Chapter 7:
Suspending or Cancelling Service
Depending on circumstances, you may want to temporarily suspend the Service. For example, if you take your laptop
in for service, you don’t want it to lock while being repaired. In such cases, you can use the Suspend feature to
temporarily discontinue service and then use Resume when you return to re-activate the anti-theft coverage.

Suspending Service To resume service:

To suspend service: 1. Log in to the Service, and then click the name of the laptop for
which you want service resumed.
1. Log in to the Service, and then click the name
of the laptop that you want to suspend. 2. Click the Suspend button.

2. Click the Suspend tab. 3. Click the Resume button in the pop-up box.

3. Click the Suspend button in the pop-up box to The Service is resumed and the timers for the automatic lockdown
verify. settings that you have specified begin counting once more after
the laptop has synchronized with the Service.
The Service suspension takes place the
next time the laptop synchronizes with the If you want the Service to be resumed immediately, a pop-up box
Service. appears to show how to synchronize the laptop.

If you want the Service to be suspended Note: While suspended, your laptop does not respond to
immediately, a pop-up box appears to show how automatic lockdowns or lock requests. As an alternative to
to synchronize the laptop. suspending services, you can disable the Timer Based Lock.

To operate from Suspend Mode:


1. Starting from Shutdown or Hibernate mode,
the laptop will show the following:
2. Type n, and then press Enter.
The laptop will resume normal operation.

21 Suspending or Cancelling Service


Unsubscribing
You can cancel your subscription at any time.
Unsubscribing turns off the theft protection
features for your laptop.

To unsubscribe from the Service:


1. Log in to the Service, and then click the name
of the selected laptop.
2. Click the Suspend/Unsubscribe button.
The following dialog box appears.

If you want the Service to be unsubscribed immediately, a pop-up


box appears to show how to synchronize the laptop.

If you unsubscribe, files that you have stored in Secure Data


Vault will still be protected, but without hardware security. We
recommend that you move your secure data out of Secure
Data Vault to another location before you unsubscribe.
3. To cancel the subscription service, click
Unsubscribe/Uninstall and then answer
the security questions that appear.
4. Confirm this change in the dialog box that
appears.
If you have an Activation Code, you can re-
activate the Service subscription by supplying
the original Activation Code within the time limit
of your original subscription period. Otherwise, if
you have a trial service or no activation code, you
may not re-activate the Service.

22 Suspending or Cancelling Service


Chapter 8:
Contacting Customer Support
Support Options Note: If you receive support from the retailer from whom
If you need answers to questions not covered you purchased the laptop, that retailer will have its own
in this user guide, or you would like to configure privacy guidelines
your laptop (such as locking your laptop) with the
help of an agent, visit the ATservice.intel.com site
and click Support/Contact Us. With the options
provided you can:

1. Email questions about the Service or provide


feedback
2. Chat with a live agent (during certain hours)
3. Call Customer Support. Individual phone
numbers for each country or region are listed
on the site, ATservice.intel.com.

To talk to a service representative:


1. Call the phone number for your country or
region. A full list of current numbers appears
on the ATservice.intel.com site. Click Support/
Contact Us to find the appropriate number.
2. Explain the nature of your request to the
service representative.

23 Contacting Customer Support


Chapter 9: Note: If you have multiple laptops, you must first select
the correct laptop to continue. Several other functions are

FAQ available by phone, including Lock, laptop Status, Retrieve


Login Password, and Talk to Agent. Follow the voice prompts
to access the services that you need.
What is Intel® Anti-Theft Service?
The Service helps consumers protect their laptop Does the Service include recovery of a lost or stolen laptop?
and data from theft. This Service uses Intel® Anti- The Service does not provide recovery of lost or stolen laptops.
Theft Technology (Intel® AT) as a foundation and Guaranteed laptop recovery is not feasible, so the Service
provides added security built into the chipset. focuses on deterring theft and then disabling stolen laptops and
Additionally, this service lets you use an optional protecting their data. Your customized lock message may make it
feature called Secure Data Vault on your laptop possible for someone to return your laptop.
where private files can be encrypted and stored.
Account Settings
Note: In certain locations, the Secure Data
Vault feature is currently not available.
Why do I have to create an account and enroll my laptop?
You must create an account to use the Service to control security,
validate your identity, and assist in performing lock and unlock
What is Intel Anti-Theft Technology?
procedures. The activation code is used to create an account.
Intel AT locks down your laptop if it’s lost or
stolen and helps secure sensitive information Who can see my account information?
stored on the laptop’s hard drive. Only the valid account holder and customer support
Intel AT has these benefits: representatives for the Service can view account information.
Users must log in to the Service Web site to view information
• Built-in protection for added peace of about any laptops that have been enrolled in the Service.
mind: This technology is built into Intel’s chips Additional information about the current account settings appears
so reformatting or replacing the hard drive in the Account Settings window on the Web site, which can be
will not defeat the lock. accessed by answering the authentication questions (based on
• Easy to disable the laptop locally or the information supplied initially by the user).
remotely when lost: Lock down your laptop
if it is lost or stolen. A locked laptop cannot be How is my account information used?
used by a thief, but can be easily unlocked by Account information—such as your email address—is used by the
its owner. Service to notify you of relevant information about your enrolled
• Laptop theft deterrence: The Intel AT sticker laptop.
warns thieves that the laptop has added
How is my email address used?
protection. This can help in deterring theft.
Your email address is the basic means for communication with
How is privacy protected for the enrollment the Service. Messages are generated to the address you provide
and account information? to confirm and validate certain operations, such as resetting your
All user information is stored in encrypted form account password, retrieving a password, providing warnings
on the Service server. about missed synchronizations with the server, issuing service
expiration notices, and so on.

24 Frequently Asked Questions


How can I change my email address? How do I choose a strong Login Password?
To change your email address, log in to the A strong login password consists of:
Service, select Manage Account, and answer the
• At least 8 characters
authentication questions to gain access. You can
change your email address on the screen that • One or more numerals
appears. • An uppercase and lowercase character
• A special character
What is the Login Password?
• The password does not start with a question mark (?)
The Login Password controls access to your
or exclamation mark (!), or 3 repeating characters at the
Service account. You must supply this password
beginning
each time you visit the Web site.
When you first create your Login Password, a graphic gauge below
How do I change my Login Password? the password entry box dynamically shows the strength of the
To change your login password, log in to the password as you add characters.
Service, select Manage Account, and answer
What are Authentication Questions?
the authentication questions to gain access.
You can make the changes in the window that Authentication questions are combinations of questions and
appears. You can also reset the password using answers that you define as a user when you register. They
the Forgot Password option on the home page provide extra security whenever you are accessing or changing
of the Web site. The Service sends a message sensitive information within your account. We recommend that
to your registered email address. When you you memorize the answers to the questions and keep them
receive the message, follow the link contained in secret to maintain the security of your account.
it to complete the password reset process. You
I already have an account. Can I add a new laptop to it?
will need to answer authentication questions to
confirm the reset. Any current subscriber with a valid account can add up to 10
laptops as long as an activation code is available for each enrolled
How are my Login Password and Unlock laptop. To add a laptop to your account, log in to your account, and
Password different? use the Enroll laptop button on the Service home page.
The Login Password gives you access to log in to
Theft Policy Settings
the Service. The Unlock Password is used only in
situations where your laptop is locked down and What does the term Timer Based Lock mean?
you want to unlock it (for example, if the Timer
Each day that a laptop does not communicate with the Service
Based Lock is triggered after the set number of
server counts as one day toward automatic lockdown, based on
days, which locks down the laptop). An additional
the Timer Based Lock value that has been set. For example, if the
password that applies to Secure Data Vault is also
timer value is set to 10 days and your laptop doesn’t communicate
kept available for retrieval on the site.
with the server on the Internet for 6 days, the notification area
icon will notify you that 4 days until automatic lock remain. You
can use your Unlock Password if your laptop is locked down
inadvertently.

25 Frequently Asked Questions


What does Locked Laptop Message mean? Does Secure Data Vault protect all the data on my laptop?
If the laptop has been locked down and someone No. Secure Data Vault protects only the files that are copied to it.
tries to start it, the BIOS displays the Locked
How does it prevent others from seeing my data?
Laptop Message that you specified when
enrolling your laptop. The encrypted data stored in Secure Data Vault can be
accessed and decrypted only by supplying a password. Only an
What is Unlock Password? authenticated user can access the files stored in the vault.
Use the Unlock Password to gain access to a
What kind of files or data should I store here?
laptop that has been locked down. This password
is set during the laptop enrollment process. Secure Data Vault can be used to store any kind of files or
documents that you want to protect from unauthorized viewing.
How do I change my Unlock Password? This might include bank or credit card information, passwords
To change the Unlock Password, log in to the for other accounts, personal information that might be used for
Service, and then click the Change button to identity theft, or anything you want to encrypt.
enter a new password.
Unlock Password
I forgot my Unlock Password. How can I
How do I lock a lost or stolen laptop?
retrieve it?
To lock a lost or stolen laptop, log in to the Service, select the
To retrieve your Unlock Password, log in to the
name of the laptop that you want to lock and click the Set Lock
Service, and then click the Retrieve Password
Now button for the enrolled laptop. Then, click the Lock button.
button to enter a new password. The Service
Following the next synchronization with the server (if someone
generates an email message containing a link.
tries to start up the laptop), the laptop will be locked by the
Click the link to complete the process, which
Service. You can also call customer support to lock a laptop.
includes answering authentication questions to
validate your identity. The Unlock Password is How do I unlock a laptop?
displayed for two minutes.
Then log in to the Service from a different device, select the name
You can also recover your Unlock Password of the laptop that you want to unlock, click the Set Unlock Now
by contacting the Interactive Voice Response button for the enrolled laptop, and click the Unlock button. Turn
support line. on the laptop and enter the Unlock Password on the BIOS screen
that appears. Following the next synchronization with the server,
Secure Data Vault the laptop will be unlocked by the Service.
What is Secure Data Vault?
Secure Data Vault is a data protection service
that lets you create an encrypted container on
your laptop’s hard drive where sensitive files can
be protected and stored.

Note: In certain locations, the Secure Data


Vault feature is currently not available.

26 Frequently Asked Questions


How do I suspend or resume the Service?
To suspend service, log in to the Service, and
then select the name of the laptop that you
want to suspend. Click the Suspend/Unsubscribe
button and then click the Suspend button again
to verify. While suspended, your laptop does not
respond to automatic lockdowns or lock requests.
Note that you will need to answer the security
questions to suspend service.

To resume service, log in to the Service, and then


select the name of the laptop for which you want
to resume service. Click the Suspend button, and
then click the Resume button.

How do I view the history for an enrolled


laptop?
To view the Service history for a laptop, log in
to the Service, select an enrolled laptop, and
the last five events related to this laptop will be
displayed. To see more events, select the number
of events in the drop-down menu.

How do I unsubscribe a laptop from the


Service?
Log in to the Service, and then click the name
of the selected laptop. Click the Suspend/
Unsubscribe button. Click the Unsubscribe/
Uninstall

button in the dialog box that appears. The next


time the server synchronizes with the laptop, the
laptop subscription will be terminated. Note that
you will need to answer the security questions to
unsubscribe from the Service.

27 Frequently Asked Questions


Appendix
Installing Java* Runtime Checking Browser Compatibility
Environment v6 The Service works with the following browser:
The Service requires that Java* Run Time • Microsoft Internet Explorer Version 8 and 9
Environment (JRE) version 6 be installed for Web
• Chrome
pages to be viewed properly. If JRE v6 is not
installed you may see a blank screen when trying • Firefox
to access a page or the following dialog box may • Safari
appear in your browser window.

In most cases, Java will already be installed and


enabled for your browser, but if you receive
a message that Java is needed to continue,
complete the installation in the following manner.

To install JRE v6 in Internet Explorer*


1. 1Click the Windows Start button, and then
click Internet Explorer. The browser window
appears.
2. Access the Java.com Web site.
3. Click the Free Java Download button. The
File Download – Security Warning appears.
4. Click Run to continue. The installer provides
more details about the software.
5. Click Run to confirm. The Welcome to Java
dialog box appears.
6. Click Install to proceed with the installation.
A progress bar tracks the downloading and
installation of the software.
7. After the installation has finished, restart the
computer to enroll in Intel® Anti-Theft Service.
With Java installed, you should have full access to
all pages on the Service site.

28 Appendix
Glossary
Account Password. When you first create your Secure Data Vault password. The password you create when
Service account, you assign a password to control you make a Secure Data Vault using the laptop-based software
access to it through the Service Web site. Protect installed on your laptop. This password, which controls access to
this password carefully because it is the primary the encrypted data, is also stored on the server of the Service so
means of locking and unlocking your laptop and that you can log in and access it, if needed.
setting the options that apply to your account.
Server Synchronization. A scheduled communication exchange
BIOS (Basic Input/Output System). A program between the laptop and the Service that compares settings,
stored within your laptop that controls startup evaluates current conditions, and determines whether the laptop
operations and configures the laptop for use by should be locked for security reasons.
the operating system. If your laptop is locked
Unlock Password. A password that you create through the
down by the Service, the complete startup
Service that must be supplied to access a laptop that has been
operation can’t proceed unless the Unlock laptop
locked down for protection. This password should be carefully
password is provided, preventing a thief from
stored in a place where it can’t be stolen and where it is
loading the operating system to access the files
available if the laptop is locked. If you lose it, your laptop may be
on your laptop.
unrecoverable.
Encryption. A process by which a code or cipher
is used to conceal data for security purposes
in a computer. The encrypted data becomes
unreadable unless a key is supplied to access it
(which can be tied to a password or other means
of authenticating a user’s identity).

Encrypted Container. A protected area on your


hard disk drive that you create using Secure Data
Vault. To your laptop, the area looks like a normal
drive with a drive letter but the information
within it is encrypted and protected by a
password.

Intel® Anti-Theft Technology. Security features


built into select 2nd generation Intel® Core™
processor family products that can protect
sensitive data by blocking the boot process at
startup.

Secure Data Vault. Technology that creates a


protected area on a computer that can be used
to store personal information in an encrypted
format.

29 Glossary
30
31
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.
EXCEPT AS PROVIDED IN INTEL’S END USER LICENSE AGREEMENT FOR SUCH PRODUCTS, INTEL ASSUMES NO
LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/
OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR
PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY
RIGHT.
UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR
ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL
INJURY OR DEATH MAY OCCUR.
The products described in this document may contain design defects or errors known as errata which may cause the product to
deviate from published specifications. Current characterized errata are available on request.
No system can provide absolute security under all conditions. Intel® AT requires an enabled chipset, BIOS, firmware, software, and
a subscription with a capable Service Provider such as Intel® Anti-Theft Service. Consult your system manufacturer for availability
and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more
information, visit http://www.intel.com/go/anti-theft.
If your system is enrolled in the Intel® Anti-Theft Service (the “Service”), you must regularly connect your enrolled computer system
to the Internet so that it can synchronize with the Service’s system server. Lack of regular synchronization with the Service’s system
server can lead to your enrolled computer system being locked down which will require you to use your unlock password to unlock
your computer system.
Copyright © 2012 Intel Corporation. All rights reserved. Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054,
USA. Intel, the Intel logo, the Intel Anti-Theft Technology logo, Intel Core, and Ultrabook are trademarks of Intel Corporation in the
U.S. and other countries. *Other names and brands may be claimed as the property of others. These materials are provided through
ATservice.intel.com as a service to its customers and may be used for informational purposes only. Intel® Anti-Theft Service is a
service provided by Intel Corporation and/or its subsidiaries. 0212/JKO/MESH
32

You might also like