Sunteți pe pagina 1din 32

Global One POSCO

PC-DRM User Guide for Global Distribution

Contents
1. DRM Overview
2. How to Install and Uninstall DRM
3. How to Use Security Documents
4. User Self-Diagnosis and Treatment
Appendix. FAQ

Oct. 27, 2015

1
1. DRM Overview

2/46
1. DRM Overview (1) Introduction to DRM

The system automatically encrypts the files in My Document of PC when they are saved, and
restricts the right to access to the created security document to prevent the use of unauthorized
persons. Therefore, it is able to prevent leakage of critical information.
 What is a security document?  Comparison of file icons between security document
It represents a document that is encrypted by DRM and is
and general document
A security document has the image of a green lock added in
under the control of the security policy set forth by security
the file icon of a general document .
document administrator.
The file icon of a security document is different from that of a
general document.

 DRM Concept [Fig. 1.1.1 File Icons of General Document and Security Document]

Authorized user
Allowed to use the document in accordance with
permitted access rights

Unauthorized user
Never allowed to use the document
Encrypted Document
Distribution and use
of encrypted Outside user
document Never allowed to use the document even in case
of the leakage by accident or by purpose
1. DRM Overview (2) DRM Support Environment

DRM support conditions are presented as follows:

 Support OS
- Windows 7, 8, 8.1 : 32bit, 64bit

 Support Application Programs

Type Program Support Version


Microsoft Office
2007, 2010, 2013
- Word / Excel / PowerPoint
HWP 2007, 2010
O Hancom Office(HanShow & HanCell) 2010 SE, 2014
A
Acrobat Reader 9, X, XI , DC
Group
Acrobat Standard, Professional 9, X, XI
Microsoft WordPad, Notepad Windows Default
Mspaint, Windows Image Viewer Windows Default
2. How to Install and Uninstall
DRM

5/46
2. How to Install & Uninstall DRM (1) Fasoo DRM Installation

Install Fasoo DRM Client in the following procedure. Close all running document programs
before installation.

 Installation Procedure & Method 4. DRM Client is automatically distributed and installed. After
complete installation, the message about document icon
1. Download Fasoo DRM installation program at the below URL. setting change pops up. Click OK.
http://glfsn.posco.net:9090/fasoo/install.html

2. Execute the downloaded file.


3. Live Update User Authentication: Enter your EP Login
account

[Fig. 2.1.2 Explorer Restart Message]


5. Go to Start > All Programs > Fasoo.com. Check that
Fasoo.com Folder is created after complete installation.

[Fig. 2.1.1 Live Update Login Window]

[Fig. 2.2.2 Fasoo DRM Installation Check]


2. How to Install & Uninstall DRM (2) Fasoo DRM Uninstallation

In Control Panel – Programs and Features, uninstall Fasoo DRM Client as shown in the below
procedure.

 Uninstallation Procedure and Method


※ Before uninstallation, close all running document programs.
1. Ask a DRM administrator uninstallation.

2. After the DRM administrator grants you the right of


removal, you can uninstall the program.
Go to Start > Control Panel. Then, remove the following
two programs in order.
- Fasoo DRM Client for POSCO Global
- Fasoo Live Update Agent for POSCO_Global_Server

* It is impossible to uninstall before the right or removal is


provided.

[Fig. 2.2.1 Control Panel - Add or Remove Programs]


3. How to Use Security
Documents

8/46
3. How to Use Security Documents (1) Online Login

After DRM Client program is installed, user authentication is required.


At the time of EP Lite login, DRM login is automatically made, and before EP Lite login, it is
possible to login DRM manually.

 How to login manually


1. When a document tries to be saved, Login window pops 3. Normal DRM login status
up.
2. Enter your EP Lite account.

[Fig. 3.1.2 Login Completion]

[Fig. 3.1.1 Manual Login Window]


3. How to Use Security Documents (2) Offline Login

When using a security document in the condition of failure of access to network, use Manual Login
Window to log in DRM.
In the case, only if you successfully logged in DRM online at least once, you can make possible
offline login.
 How to make offline login
1. When a security document tries to be opened or saved, 3. Normal offline login status
Login Window pops up.
2.Enter you EP Lite account (the latest account with which
you successfully logged in at the time of online login)

[Fig. 3.1.2 Login Completion]

[Fig. 3.1.1 Manual Login Window]


3. How to Use Security Documents (3) Encrypt

A general document can be encrypted to a security document.

 How to encrypt
1. Right-click a general document file icon. 3. When the ‘Browse For Folder’ dialog box pops up, select a
2. Click Secured Document > Convert to Secured document location to save an encryption document and click OK.

[Fig. 3.3.2 Select a location to save a security document]


[Fig. 3.3.1 Create a security document]
3. How to Use Security Documents (3) Encrypt

 Hot to encrypt (cont’d)


4. If the same file name exists, Alert Dialog Box pops up. If 6. The created security document has the green lock icon.
your replace the existing file, click Yes, otherwise click No.
(If ‘No’ is selected, encryption process ends.)

[Fig. 3.3.5 Security Document Icon]

[Fig. 3.3.3 Replace with a created security document file]

5. Check that the created security document is in the location.

[Fig. 3.3.4 Message about completion of security document creation ]


3. How to Use Security Documents (4) Check access rights of security document

Users can have different access rights depending on security documents. Therefore, each user
needs to check their access rights of the security document to use.

 How to check access rights


1. Right-click the file icon of security document. 3. You can user access rights on the ‘General’ tab in the
2. Click Secured Document > Properties in Menu Properties’ Dialog Box.
In the ‘Permissions’ checkboxes, the selected rights only
can be used.

[Fig. 3.4.1 View the properties of security document]


[Fig. 3.4.2 Security Document Properties – General Tab]
3. How to Use Security Documents (5) Check access rights of security document

The below table describes each access right type in the Properties Dialog Box.

 Types of Access Rights

Type Description.

View It is possible to open the security document.

Edit It is possible to open, edit, and save the security document.

Screen Capture It is possible to open the security document and capture its screen image.

Decrypt It is possible to release the security document and convert it into a general document.

Print It is possible to open and print out the security document.

Change Permissions It is possible to change the access rights of the security document.
3. How to Use Security Documents
(6) Check the policy on each class of security documents
You can check details about rights by document security class set up by company security
policy.

 How to check details about document Class


1. Right-click the icon of the security document file.

2. Click Secured Document > Properties in Menu

3. Click Document Class tab.

4. Select Dropdown List to check the access rights of each user


or each department in each Document Class.

[Reference]
The properties are not about the screen to present the level of
a relevant document, but about the screen to display
document levels in accordance with company security policy.
To see the level of a relevant document, check Document
Class on ‘General’ tab . (See 3-(4) ) [Fig. 3.6.1 Security Document Properties – Document Class Tab]
3. How to Use Security Documents (7) Open Security Document

To open a security document, you need to have the ‘View’ right to the security document.
※ PC DRM POLICY : Document allowing access right

If you don’t have the ‘View’ right,


If you try to open a security document without the View’
right to the document, the below message pops up.

[Fig. 3.7.1 Alert message about no ‘View’ right]


3. How to Use Security Documents (8) Edit Security Document

If you want to edit a security document, you should have ‘edit’ permission for it. A user,
who has edit permission, can open and edit the document and save it as an encrypted one
again.
※ PC DRM POLICY : Text editing rights are allowed
 Copying and pasting a security document by  Copying and pasting a security document by
a user without ‘edit’ permission. a user with ‘edit’ permission.
.If you do not have edit permission, the edit menu in the Case 1. Pasting from a general document into a
application program is disabled as follows. If you try to security document
copy a part of the document, the following pop-up
message is shown and copying is not allowed. If you have ‘edit’ or ‘decryption’ permission, you can paste
a part of a general document into a security document.

Case 2. Pasting from a security document into a


general document
Even though you have ‘edit’ permission for a security
document, you cannot paste a part of it into a general
document. For pasting a part of a security document into
a general one, you should have ‘decryption’ permission,
[Figure 3.8.1 Application program menu in the case of not having ‘edit’ permission]
by which you can convert a security document into a
general one.

Case 3. Pasting from a security document into a


security one
You can do this only when you have edit permission for
both of them.
[Figure 3.8.2 Pop-up message in the case of not having ‘edit’ permission]
3. How to Use Security Documents (9) Print out Security Document

To print out a security document, you need to have the ‘Print’ right.
※ PC DRM POLICY : Print rights are allowed

 If you don’t have the ‘Print’ right,  Print out on a virtual printer
If there is no ‘Print’ right to a relevant document, the below Not only to restrict the print function of an application
alert message pops up. program, but to prevent leakage of a security document, it
is possible to restrict print-out on a virtual printer. Even if
you have the ‘Print’ right, you can print out a document on
a virtual printer.
- FintPrint
- Microsoft XPS Document Writer
- Microsoft OneNote, etc.

[Fig. 3.9.1 Alert message about no ‘Print’ right]

[Fig. 3.9.2 Alert message about print-out on virtual printer]


3. How to Use Security Documents (10) Screen-Capture Security Document

You can not capture the security document screen.


※ PC DRM POLICY : Screen capture rights are allowed

 The cases of screen capture


- Screen –capture with short-cut keys (Print Screen, Alt + Print Screen)
- Screen-capture with the use of a commercial capture program
- Screen-capture through the connection with virtual machine and remote desktop (Terminal Service)

[Fig. 3.10.1 An example of screen-capture of security document]


3. How to Use Security Documents (11) Decrypt

If you have the ‘Decrypt’ right, you can convert a security document into a general document.
※ PC DRM POLICY : Decoder rights are allowed of Security personnel.

 How to release encryption


1. Right-click the icon of a security document file. [Reference]
2. Click Secured Document> Decrypt in Menu If you don’t have the ‘Decrypt’ right, it is impossible to
convert a security document into a general document, and
the below dialog box pops up.

[Fig. 3.11.2 The case of no ‘Decrypt’ right]

[Fig. 3.11.1 Decrypt]


3. How to Use Security Documents (12) Check Security Document Properties

You can check the properties of a security document.

 How to check the properties of a security document


1. Right-click the icon of a security document file.
Type Description
2. Click Secured Document> Properties in Menu.
Document
The file name of the security document
Name

Date of
Date and time of security document creation
Creation

Owned By The name (ID) of the person who converted general


Name document to the security document

Department The department of the owner

Domain An ID to identify the security document source, which is


Code used for management.
Created By
The name of the writer of the security document
Name

Department The department of the security document writer

Document A security level of the security document (separate level


Class by corporate body)

[Fig. 3.12.1 Check the properties of security document]


3. How to Use Security Documents (12) Check Security Document Properties

If you don’t have the ‘View’ right, you are not able to check the properties of a security
document.

 How to check the properties of a security document (cont’d)


1. Right-click the icon of the security document file.
2. Click Secured Document> Properties in Menu.

[Fig. 3.12.2 Check the properties of security document(if you have no


‘View’ right)]
4. User Self-Diagnosis &
Treatment

23/46
4. User Self-Diagnosis & Treatment (1) Diagnose Client State

A user is able to diagnose the state of DRM Client directly.

 How to diagnose the state of DRM Client

1. Right-click the lock icon in System Tray 4. User Self-Diagnosis & Treatment
2. Click DRM Self Monitoring.

Type Description Problem-Solving

DRM Emergency
DRM Whether DRM client
Recovery
Service State works well
=> See 4-(2)

Whether to log in DRM DRM Log in


[Fig. 4.1.1 DRM Self Monitoring Tray Icon Menu] SSO State
well => See 3-(1)
3. Check DRM state

DRM Server
Whether to connect with
Communica Connect to intranet
DRM Server well
tion State

Whether there are


problems, such as an Update DRM Policy
Others
error of opening a => See 4-(3)
document

[Fig. 4.1.2 Check DRM Info. Screen]


4. User Self-Diagnosis & Treatment (2) DRM Recovery

A user is able to return DRM Client to its initial installation state directly.

 DRM Recovery

1. Execute [Start → All Programs → Fasoo.com → DRM


Client –POSCO Global → DRM Recovery].

[Fig. 4.2.1 DRM Recovery Menu]

25/46
4. User Self-Diagnosis & Treatment (3) Update Policy

The access rights of security documents are defined by the policy which is set forth by DRM
administrator. The policy changed in DRM Server is regularly downloaded into user PC. To
apply the changed policy immediately, you can update the policy manually.

 How to update policy with the use of Start Menu  How to update policy with the use of System Tray Icon
1. Click Start > All Programs > Fasoo.com > DRM Client – 1. Right-click the lock icon of System Tray.
POSCO Global > Update FSN Policy.

[Fig. 4.3.3 Update Policy Tray Icon Menu]


[Fig. 4.3.1 Update Policy in Start Menu] 2. Click Update Policy
3. Once the policy is updated completely, click OK on the
2. Once the policy is updated completely, click OK on the dialog box.
dialog box.

[Fig. 4.3.2 Message about the completion of policy update]


Appendix. FAQ
[Common Matters]
If you have a problem to open a file, check the Application Support List to see if the default application is in
the list.
- With the below tips, you can change the default program.
※ How to change
: Right-click on a file → Open with→ Choose the program you want to use to open this file
→ Select the checkbox of ‘ Always use the selected program to open this kind of file → click ‘OK’

Q. When trying to open an encrypted image file, I am not able to see the image well.
A. The encrypted image file is always opened with Paintbrush or Windows Photo Viewer only (it is not opened
with other viewers).

Q. When trying to open a PDF document file, I found the message saying “unable to open ‘filename.pdf’
which is neither supported nor damaged”.
A. PDF files are supported by Acrobat Reader 9.x / X(10.x) / XI(11.x) versions.

Q. When trying to open a security document file, I found the message saying “the module for security is
neither found nor installed.”
A. Execute Start → All Programs → Fasoo.com → DRM Client –POSCO Global→ DRM Emergency Recovery to
reinstall.
Or, execute Control Panel → Programs and Features → Fasoo DRM Client for POSCO Global → Recovery to
reinstall.
Appendix. FAQ
Q. When trying to open a security document file, I found the alert window saying “you have no ‘View/Edit ‘
right.”, “You have no ‘Print’ right.”.
A. Download the latest policy as shown in the below and try it again.
Execute Start → All Programs → Fasoo.com → DRM Client –POSCO Global→ Update FSN Policy, or
click “Update Policy” in DRM Tray Menu

Q. When I opened a security document, I found that the characters are abnormal or broken.
A. If you try to install or already installed DRM Client,
execute Start → All Programs → Fasoo.com → DRM Client –POSCO Global → DRM Recovery to reinstall.
Appendix. FAQ
Q. It is impossible to copy and paste the contents of a security document into a new document.
A. If the document is not owned by you, you are not allowed to copy and paste the contents of the security
document into a general document. You can copy and paste the contents of the security file owned by you.

Q. I am not able to use the functions of Move or Copy a sheet in Excel, which is available in general
documents.
A. The function is not allowed for encrypted Excel documents. If you need the Move or Copy function, keep
pressing ‘Ctrl' key in the file and Drag & Drop” the sheet.
- To move or copy a sheet to a different file, open two Excel files in one Excel window as shown in the below,
and move or copy.
Appendix. FAQ
Q. I need to capture the screen of my security document.
- In security policy, it is impossible to capture the screen. To capture the screen, release its encryption and
convert the document into a general document.
- Contact the administrator who has the right of ‘Release Encryption’.

Q. I want to decrypt a DRM document.


- Apply for EP Lite Document Taking-out in order to send the original copy to an outsider.
- Or, contact the administrator who has the right of ‘Decrypt’.

Q. How can I know if DRM Client is running?


- If you save any document, an icon with yellow lock is created on Windows Taskbar on the right bottom,
which means the client is running.
Appendix. FAQ
Q. How can I use an encrypted document in other application programs than DRM related application
programs?
A. Encrypted documents can be used only with the application programs support by DRM. It is impossible to
use encrypted documents with other application programs.
Q. I can’t see DRM Tray Icon (Yellow Lock).
A. In the cases of EP login, document saving, or DRM security document opening, log in manually. Then you
can see the icon.
End Of Document

32/46

S-ar putea să vă placă și