User's Manual

End-User Reference Guide
1
Welcome
Welcome to the OmniAccess 3500 Nonstop Laptop Guardian Release 1.6 End-User
Reference Guide. This guide will introduce you to the many functions of the
OmniAccess 3500 Nonstop Laptop Guardian (NLG) card and its operation.
For instructions on how to install or upgrade your card and the client software, see the
OmniAccess 3500 Nonstop Laptop Guardian Release 1.6 Card Quick Start Guide. It is
recommended to have the Windows XP Service Pack 3 (SP3) patch installed for
Windows XP on your laptop.
Overview of OmniAccess 3500 NLG Card Features
The OmniAccess 3500 NLG card keeps your laptop within the security perimeter of
your company’s network and provides the same user experience at all times,
irrespective of where you are.
The card supports the following functions:
Secure connectivity to your company’s network irrespective of your laptop’s
location and without requiring user intervention.
Single sign-on – Just use your domain authentication credentials for secure
remote access to the enterprise network.
Automatic switchovers to the next best network interface if the company’s
network can no longer be reached using the existing interface.
Easy manual switching of network interface serving the connection to your
company’s network when the laptop senses a surrounding access network with
better performance.
Option to use the OmniAccess 3500 NLG card as a smart card. You just need to
enter a PIN (instead of domain credentials) to securely access your company’s
network.
Integrated Personal Firewall to protect your laptop from attackers and to restrict
the set of applications that are allowed to access the network.
Encrypted volume for storage of sensitive data in your laptop’s hard disk.
Configuration and management of the encrypted volume are fully transparent to
you (no passwords to enter and maintain). The OmniAccess 3500 NLG Release 1.6
supports volume encryption for Truecrypt versions 4.3a, 5.1a, and 6.0a.
Protection of the data stored in your laptop in case it is lost or stolen. Your IT
administrator can remotely lock the laptop or destroy the keys that are required
for decryption of the encrypted volume contents.
Integration of common patch management applications (Microsoft SMS, PatchLink
Update).
The same laptop can be shared by multiple users if so configured by the IT
administrator.
Interoperation with full hard disk encryption solutions.