Intel® Anti-Theft Service: User Guide
Intel® Anti-Theft Service: User Guide
user guide
Version 1.5
Contents
Chapter 1: Quickstart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Quickstart Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Quickstart Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 2: Introducing the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Service Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
More About the Built-in Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Setting up Intel® Anti-Theft Service for Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 3: Registering the Laptop into the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Step 1 – Setting up Your Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Step 2 – Verifying Your Email Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Step 3 – Configuring Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Step 4 – Downloading and Installing the Laptop-based Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter 4: Using the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Locking Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Requesting Lock Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Triggering the Lock/Theft Protection Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Updating the Timer Based Lock Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Setting the Lock Device Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Checking Status through the Notification Area Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Right-Clicking the Notification Area Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Using the Help Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Viewing Tooltips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 5: Using Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Opening Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Creating an Encrypted Container . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Closing Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Recovering Secure Data Vault Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Chapter 6: Recovering Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Unlocking from the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Entering the Unlock Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2 Contents
Retrieving the Unlock Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Recovering the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Chapter 7: Suspending or Cancelling Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Suspending Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Unsubscribing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Chapter 8: Contacting Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Support Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Chapter 9: FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Account Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Theft Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Secure Data Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Unlock Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Appendix
Installing Java* Runtime Environment v6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3 Contents
Chapter 1:
Quickstart
If you understand the technology and you are comfortable with the features of this Service, follow this quickstart
to set up and configure the Intel® Anti-Theft Service (referred to throughout as “the Service”). If you’d prefer more
explanation with full details of the procedure, skip this section and go to the section “Introducing the Service.”
Quickstart Requirements
To enable the Service, you need:
Quickstart Procedure
There are two basic steps to getting started:
1. Registering your laptop into the Service To register your laptop into the Service:
2. Creating a Secure Data Vault container 1. Go to ATservice.intel.com.
2. Click New users, register now.
Note: In certain locations, the Secure Data 3. Enter the information to set up your account.
Vault feature is currently not available.
4. Enter the six-digit code in the email that was sent by the
Service.
5. Enter the information to configure your laptop.
6. Follow the instructions to complete the installation process.
warning: Your laptop is not protected until you enroll it into the
Service.
4 Quickstart
To create a Secure Data Vault container:
1. Click Windows Start.
2. Click Secure Data Vault.
3. Create a new Secure Data Vault password
and container.
4. Move files into the container and the program
will automatically encrypt the files.
To contact Intel Anti-Theft Service for additional
questions:
5 Quickstart
Chapter 2:
Introducing the Service
Congratulations
Your selection of the Intel® Anti-Theft Service is a positive step toward guarding against theft and ensuring your
personal privacy. This user guide explains how to take advantage of the built-in hardware features, software options,
and service benefits.
Service Features
The Service lets you: If your laptop is lost or stolen,
it can be automatically disabled
• Lock down your laptop if it is lost or stolen so
and only you can turn it back on.
that no one can use it
• Create an encrypted folder (known as
Secure Data Vault) on your laptop where
private files can be stored
It’s like having a full-time security guard inside your laptop. When
Note: In certain locations, the Secure Data suspicious activities are detected, the technology automatically
Vault feature is currently not available.
locks down your laptop.
enhances protection.
1. Login to your account and select the desired The laptop goes into a lockdown state if there has been no
laptop from the drop-down menu. communication to the Service server within a number of days
(as specified by the Timer Based Lock setting). You can set the
2. Click Set Lock Now.
number of days allowed before this action takes place by going to
The Lock Laptop dialog box appears. the Settings page.
3. Click the red Lock PC button.
For example, if your laptop is lost during travel on an airline and
The lock request will be delivered to your is sent to lost and found, after the set number of days passes
laptop the next time it synchronizes with the without a network connection, it will lock down. If you set the
server. lockdown value at 4 days, if the laptop is powered up on day 5, it
If you want to lock immediately (so you can will be in lockdown mode.
see how the laptop behaves and view the lock
screen), a pop-up box appears to show how to
lock the laptop immediately.
Missing icon If no icon is visible in the system tray, the Re-enroll if service is
laptop has been unsubscribed from the needed.
Service.
Default icon Indicates the Service is enabled and monitoring No action needed.
conditions.
Note: The notification area icon may not be visible. Press the UP ARROW key to view the visible icons.
Right-Clicking the Notification Area • Software Update Settings. Lets you select the manner in
Icon which updates are handled. Options include Install Updates
Automatically, Notify Me When an Update is Available,
If you right-click the notification area icon for the
and Don’t Automatically Check for Updates. The command
client application, you can access a menu that
Check Now when selected immediately performs the check
controls these options:
for updates.
• Open Secure Data Vault (if closed) or Close
• Show EULA. Displays the End User License Agreement.
Secure Data Vault (if open). Provides access
to password-protected encrypted containers • Server Synchronization Status. Indicates the current details
that you have created with the Secure Data related to the server synchronization operations.
Vault feature. • About. Provides information about the Service client
• Synchronize Settings with Server. Forces application.
synchronization with the Service server to • Exit. The Service client application exits and the icon
check status and update settings. disappears from the tray. The client and system tray icon are
again available the next time the laptop boots.
Viewing Tooltips
Many of the options displayed in the Service
screens use tooltips to provide a quick description
of a field or featue. To view tooltips, let the
cursor hover over an item for two or three
seconds and, if a tip is available, a pop-up
description will appear.
Opening Secure Data Vault Note: We strongly recommend that you regularly
When Secure Data Vault is open, you can create back up the files in your Secure Data Vault using your
containers and copy files into them. When the favorite backup utility. You can also back up the entire
encrypted container, but the container is typically large and
vault is closed, the files are encrypted and
could require a significant amount of time and space for the
cannot be viewed unless the correct password is back-up process. Information in this backup will have the
provided. same encryption and password protection as the encrypted
container that you created on your hard disk. If your laptop
To open Secure Data Vault: is stolen or lost, you can recover the information from the
1. Locate the application for Secure Data Vault backup using the data recovery tool.
Note: If you choose to back up the entire 2. Click the Logout icon to close the application.
container, the size of the container will Logout button closes all containers and then logout from SDV.
determine the time and space that the
This can be useful if you have several containers opened.
backup will take. To expedite backup
time and to save space, you can back up
your files instead of the entire container. Note: You can include the path for each Secure Data Vault
A large container typically requires a encrypted container in your regular backup operations,
significant amount of time and space to but the entire container will be backed up. This should
backup. be the path where Secure Data Vault was originally
created (for example: C:\User\Administrator\Documents\
SDVContainers). The data contained in the backup will also
be encrypted, and it can be recovered using the recovery
procedure described in the following section.
2. Click the Close icon to close and lock the 5. Open any of the displayed containers and copy the recovered
selected container. content to any appropriate location on your hard drive or other
media.
3. Click the Logout icon to exit from the
application for Secure Data Vault. If your replacement laptop includes Intel® Anti-Theft Technology
capabilities and you have service time remaining, you can
Recovering Secure Data Vault optionally enroll the laptop in the Service at this time.
Information
To restore Secure Data Vault on your laptop following hard
If your laptop is lost, stolen, or suffers a hard disk
disk replacement:
drive failure, you can recover the data stored in
your Secure Data Vault if you have a backup file 1. Complete the installation of the new hard disk drive or
available. operating system upgrade.
2. Restore the data backup of an encrypted container made
To restore Secure Data Vault on a replacement
by Secure Data Vault to the My Documents folder on your
laptop:
laptop.
1. On your replacement laptop, restore the data
3. Log in to the Service, select the desired laptop from the drop-
backup of the Secure Data Vault encrypted
down menu, and click Recover Container to download and
container to the My Documents folder.
install the container.
To suspend service: 1. Log in to the Service, and then click the name of the laptop for
which you want service resumed.
1. Log in to the Service, and then click the name
of the laptop that you want to suspend. 2. Click the Suspend button.
2. Click the Suspend tab. 3. Click the Resume button in the pop-up box.
3. Click the Suspend button in the pop-up box to The Service is resumed and the timers for the automatic lockdown
verify. settings that you have specified begin counting once more after
the laptop has synchronized with the Service.
The Service suspension takes place the
next time the laptop synchronizes with the If you want the Service to be resumed immediately, a pop-up box
Service. appears to show how to synchronize the laptop.
If you want the Service to be suspended Note: While suspended, your laptop does not respond to
immediately, a pop-up box appears to show how automatic lockdowns or lock requests. As an alternative to
to synchronize the laptop. suspending services, you can disable the Timer Based Lock.
28 Appendix
Glossary
Account Password. When you first create your Secure Data Vault password. The password you create when
Service account, you assign a password to control you make a Secure Data Vault using the laptop-based software
access to it through the Service Web site. Protect installed on your laptop. This password, which controls access to
this password carefully because it is the primary the encrypted data, is also stored on the server of the Service so
means of locking and unlocking your laptop and that you can log in and access it, if needed.
setting the options that apply to your account.
Server Synchronization. A scheduled communication exchange
BIOS (Basic Input/Output System). A program between the laptop and the Service that compares settings,
stored within your laptop that controls startup evaluates current conditions, and determines whether the laptop
operations and configures the laptop for use by should be locked for security reasons.
the operating system. If your laptop is locked
Unlock Password. A password that you create through the
down by the Service, the complete startup
Service that must be supplied to access a laptop that has been
operation can’t proceed unless the Unlock laptop
locked down for protection. This password should be carefully
password is provided, preventing a thief from
stored in a place where it can’t be stolen and where it is
loading the operating system to access the files
available if the laptop is locked. If you lose it, your laptop may be
on your laptop.
unrecoverable.
Encryption. A process by which a code or cipher
is used to conceal data for security purposes
in a computer. The encrypted data becomes
unreadable unless a key is supplied to access it
(which can be tied to a password or other means
of authenticating a user’s identity).
29 Glossary
30
31
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.
EXCEPT AS PROVIDED IN INTEL’S END USER LICENSE AGREEMENT FOR SUCH PRODUCTS, INTEL ASSUMES NO
LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/
OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR
PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY
RIGHT.
UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR
ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL
INJURY OR DEATH MAY OCCUR.
The products described in this document may contain design defects or errors known as errata which may cause the product to
deviate from published specifications. Current characterized errata are available on request.
No system can provide absolute security under all conditions. Intel® AT requires an enabled chipset, BIOS, firmware, software, and
a subscription with a capable Service Provider such as Intel® Anti-Theft Service. Consult your system manufacturer for availability
and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more
information, visit http://www.intel.com/go/anti-theft.
If your system is enrolled in the Intel® Anti-Theft Service (the “Service”), you must regularly connect your enrolled computer system
to the Internet so that it can synchronize with the Service’s system server. Lack of regular synchronization with the Service’s system
server can lead to your enrolled computer system being locked down which will require you to use your unlock password to unlock
your computer system.
Copyright © 2012 Intel Corporation. All rights reserved. Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054,
USA. Intel, the Intel logo, the Intel Anti-Theft Technology logo, Intel Core, and Ultrabook are trademarks of Intel Corporation in the
U.S. and other countries. *Other names and brands may be claimed as the property of others. These materials are provided through
ATservice.intel.com as a service to its customers and may be used for informational purposes only. Intel® Anti-Theft Service is a
service provided by Intel Corporation and/or its subsidiaries. 0212/JKO/MESH
32