Agilent E6640A EXM Wireless Test Set Security Features and Document of Volatility Agilent Technologies
Notices © Agilent Technologies, Inc. 2014 Manual Part Number No part of this manual may be reproduced in any form or by any means (including electronic storage and retrieval or translation into a foreign language) without prior agreement and written consent from Agilent Technologies, Inc. as governed by United States and international copyright laws. E6640-90005 Trademark Acknowledgements Microsoft® is a U.S. registered trademark of Microsoft Corporation. Windows® and MS Windows® are U.S.
Warranty This Agilent technologies instrument product is warranted against defects in material and workmanship for a period of one year from the date of shipment. During the warranty period, Agilent Technologies will, at its option, either repair or replace products that prove to be defective. For warranty service or repair, this product must be returned to a service facility designated by Agilent Technologies.
Contents 1 Table of Contents 2. Contacting Agilent Sales and Service Offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3. Products Covered by this Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4. Security Terms and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 5.
Contents 6
Contacting Agilent Sales and Service Offices 2 Contacting Agilent Sales and Service Offices Assistance with test and measurement needs, and information to help you find a local Agilent office, is available via the internet at, http://www.agilent.com/find/assist. If you do not have internet access, please contact your designated Agilent representative. NOTE In any correspondence or telephone conversation, refer to the instrument by its model number and full serial number.
Contacting Agilent Sales and Service Offices 8
Products Covered by this Document 3 Products Covered by this Document Product Name Model Numbers EXM Wireless Test Set E6640A This document describes instrument memory types and security features. It provides a statement regarding the volatility of all memory types, and specifies the steps required to declassify an instrument through memory clearing, sanitization, or removal. For additional information, go to: http://www.agilent.
Products Covered by this Document 10
Security Terms and Definitions 4 Security Terms and Definitions Term Definition Clearing As defined in Section 8-301a of DoD 5220.22-M, “National Industrial Security Program Operating Manual (NISPOM)”, clearing is the process of eradicating the data on media before reusing the media so that the data can no longer be retrieved using the standard interfaces on the instrument. Clearing is typically used when the instrument is to remain in an environment with an acceptable level of protection.
Security Terms and Definitions 12
Instrument Memory & Document of Volatility 5 Instrument Memory & Document of Volatility This chapter summarizes all memory types in the instrument. The descriptions are divided between: 1. Memory in the Controller, 2. Memory in the Frequency Reference. 3. Memory in the TRX.
Instrument Memory & Document of Volatility Memory in the Controller Memory in the Controller This section contains information on the memory components used in the controller. The table provides details of the size of each memory component, its type, how it is used, its location, volatility, and the sanitization procedure. NOTE The instrument contains no user-accessible non-volatile memory, except for the SSD listed as the second item in the table below.
Instrument Memory & Document of Volatility Memory in the Frequency Reference Memory in the Frequency Reference This section contains information on the memory components used in the M9300A PXIe Frequency Reference. The table provides details of the size of each memory component, its type, how it is used, its location, volatility, and the sanitization procedure.
Instrument Memory & Document of Volatility Memory in the TRX Memory in the TRX This section contains information on the memory components available in your instrument. The table provides details of the size of each memory component, its type, how it is used, its location, volatility, and the sanitization procedure. 1. Config.
Instrument Memory & Document of Volatility Memory in the TRX 8. DRAM Purpose/Contents Location in Instrument and Remarks Sanitization Procedure Volatile (Y/N)? Memory Component, Type and Size Summary of TRX instrument memory User Modifiable (Y/N)? Table 5-3 Yes Yes Signal data captured WDIF Cycle power. Yes Yes Signal data for playback BBG Cycle power. 4 GB DDR2 8.
Instrument Memory & Document of Volatility Memory in the TRX 18
Memory Clearing, Sanitization and/or Removal Procedures 6 Memory Clearing, Sanitization and/or Removal Procedures This section explains how to clear, sanitize, and remove memory from your instrument, for all types of non-volatile memory that can be written to during normal instrument operation.
Memory Clearing, Sanitization and/or Removal Procedures Instrument Sanitization Procedures Instrument Sanitization Procedures Removable Hard Drive Data Destruction Several commercially available software programs exist to completely destroy all data on a data storage device such as the removable hard drive. DoD 5220.22-M is a software based data sanitization method for total data destruction. The DoD 5220.22-M sanitization method was originally defined by the U.S.
Memory Clearing, Sanitization and/or Removal Procedures Instrument Sanitization Procedures Figure 6-1 Removing the hard drive 1. Turn the PXIe chassis power off. 2. Remove the controller from the PXIe chassis. 3. Position the controller, top side up, on the workbench. Loosen the thumb screws. 4. Unseat the removable hard drive from the connector and remove it from the slot. 5. Store the hard drive in the original antistatic packaging when not in use to avoid damage.
Memory Clearing, Sanitization and/or Removal Procedures Other Memories Other Memories Other memory devices in the E6640A are described in: • “Memory in the Frequency Reference” on page 15 • “Memory in the TRX” on page 16 As these memory devices do not include user-accessible non-volatile memory, no sanitization procedure is required for any memory component except the removable hard drive.
User and Remote Interface Security Measures SCPI/GPIB Control of Interfaces 7 User and Remote Interface Security Measures This chapter discusses options that are available to you to control and configure remote access to the instrument, including: • SCPI/GPIB Control of Interfaces • Operating System Security Features • USB Interfaces. This topic includes information about how to set the instrument’s USB ports to read-only.
User and Remote Interface Security Measures Determining the Test Set’s Operating System • You can install standard third-party antivirus and spyware detection software designed for use with Windows XP or Windows 7, as appropriate for your test set’s operting system. If your instrument uses a network (or internet) connection, this may be advisable. CAUTION Running any third-party program while making measurements may adversely affect the instrument’s performance.
User and Remote Interface Security Measures USB Interfaces If you want to understand details of how this AutoPlay setting affects the Windows Registry, see the “Windows XP” on page 25. Windows XP You can change the Autorun configuration by editing the value of one of two Windows Registry keys. The Windows Registry is a database that stores critical configuration information for the instrument’s operating system. CAUTION Exercise extreme caution whenever you edit the Windows Registry.
User and Remote Interface Security Measures USB Interfaces Figure 7-1 Autorun Flag Definitions for NoDriveTypeAutoRun Registry entry As shown in Figure 7-1 above, the default Windows XP (post-SP2) and Windows 7 value for this entry is 0x91 (under the entry HKCU\...\NoDriveTypeAutoRun). This setting disables Autorun for Unknown and Network drives, but enables Autorun for Removable, Fixed, CD/DVD or RAM drives.
User and Remote Interface Security Measures USB Interfaces Figure 7-2 Windows XP Run Dialog b. For Windows 7, click the Windows Start button at the bottom left of the screen. Type regedit into the Search programs and files box, as shown in Figure 7-3 below, then press Enter. Figure 7-3 Windows 7 Search Box 2. The Registry Editor window appears. Using the tree view control on the left of the window, navigate to the per-machine (HKLM) key: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.
User and Remote Interface Security Measures USB Interfaces Microsoft AutoRun Patch The information in ths section applies only to Windows XP. If your test set has a Windows 7 operating system, you do not require this patch. NOTE There is a defect in Windows XP that compromises the ability to disable Autorun. This defect has been fixed by a patch from Microsoft, as described in the Microsoft Knowledge Base Article ID: 967715. This patch is included in the test set as shipped from the factory.
User and Remote Interface Security Measures USB Interfaces b. For Windows 7, click the Windows Start button, then select Shut down > Log off from the Windows Start menu, as shown in Figure 7-5 below. Figure 7-5 Windows 7 Log off Control 3. After you have logged on to the instrument as the Administrator, restart the Agilent XSA application. 4. When the XSA application has fully initialized (that is, when the main results view and softkey menu are visible), press the System front-panel key. 5.
User and Remote Interface Security Measures USB Interfaces 30
Procedure for Declassifying a Faulty Instrument 8 Procedure for Declassifying a Faulty Instrument Even if the instrument is not able to power on, it may be declassified by removing the disk drive from the instrument, using the appropriate procedure as described in “Hard Drive Removal” on page 20.
Procedure for Declassifying a Faulty Instrument 32
References A: References 1. DoD 5220.22-M, “National Industrial Security Program Operating Manual (NISPOM)” United States Department of Defense. Revised February 28, 2006. May be downloaded in Acrobat (PDF) format from: http://www.dss.mil/isp/fac_clear/download_nispom.html 2. ODAA Process Guide for C&A of Classified Systems under NISPOM Defense Security Service. DSS-cleared industries may request a copy of this document via email, by following the instructions at: http://www.dss.mil/isp/odaa/request.
References This information is subject to change without notice. © Agilent Technologies, Inc.