Registration with Windows
The following procedure describes how to register the CTE Agent after installation is complete.
Use the register_host
utility to create certificate requests, exchange certificates between the CipherTrust Manager and the host, to enable ransomware detection, and to register CTE on the CipherTrust Manager. After the host is registered, if you selected to enable file system encryption, you can configure CTE, apply GuardPoints, or perform database backups. If you selected ransomware protection, you can apply the protection to volumes. Run the register_host
utility in text mode on a terminal window.
Caution
The default host registration timeout is 10 minutes. If the host is unable to reach the CipherTrust Manager within the allotted period because of an extremely slow network connection, set the REGISTER_HOST_TIMEOUT
environment variable to extend the registration timeout. The variable value is an integer expressed in seconds. You might also have to extend the default TCP timeout.
-
Log on to the host as a Windows user with administrative privileges.
-
Launch the CTE Registration Wizard using one of the following methods:
-
In the system tray, right click the CipherTrust Lock icon and select Register Host.
-
Run
C:\Program Files\Vormetric\DataSecurityExpert\agent\shared\bin\register_host.exe -vmd -silent
.
-
-
Reboot the system. CTE automatically displays the registration wizard if CTE is not already registered.
-
In the Register Host dialog box, verify the host's machine name and click Next.
-
On the Gathering agent information page, select one or both of the following options and click Next.
-
File System: Allows you to protect and encrypt CTE files with policies
-
Ransomware Protection: Protects volumes from ransomware
-
-
On the Gathering Key Manager information page, enter the FQDN or IP address of the primary CipherTrust Manager.
The default communication port is 443. If you want to specify a different communication port, enter it with the primary key manager host name in the format:
: . For example:10.3.200.141:8445When you are done, click Next. CTE communicates with the selected CipherTrust Manager to validate what features have been licensed and are available to the CTE Agent.
-
On the Gathering host name information page:
- On the Gathering registration information page, enter the following:
-
Restart the client to complete the installation process on the client.
-
After the host has rebooted, you can verify the installation by checking CTE processes:
-
In the system tray of the protected host, right-click the CipherTrust Lock icon.
-
Select Status. Review the information in the Status window to confirm that the correct CTE version is installed and registered.
-
If you are using CipherTrust Manager version 2.2 or later, you can now use CipherTrust Manager to administer CTE on the client.
If you are using CipherTrust Manager version 2.1 or earlier, change the client password using the manual password creation method. This password allows users to access encrypted data if the client is ever disconnected from the CipherTrust Manager. For details on changing the password, see the CipherTrust Manager documentation.
-
-