Specifications
Copyright © 2007 VMware, Inc. All rights reserved. 6
Pocket ACE Guide
Creating the ACE Master Policy
BeforeyoubegindefiningthepolicyforyourACEMaster,considerthetargetuserswhowillusethePocket
ACEinstances.Somefactorsincludehowsecureorrestrictivetheenvironmentshouldbe,howremoteusers
willgetassistanceifthereisanissue,andwhetheranyrestrictionsshouldbeplacedon
accessingperipherals.
ThefollowingexampleshowsapolicythatcanbeusedbyanACEadministratorwhoisdeploying
Pocket ACE‐enableddevicestousersasasecureremoteaccesssolution.Inthiscase,theuserswillbeaccessing
theenterprisenetworkusinganunmanagedPersonalComputerfromtheirhomeor
otherremotelocation.
UsethefollowingrequirementstodefinetheACEpolicy:
ProvideanACEinstanceforsecureremoteaccesstoenterpriseresources.
Distributeasecureremoteaccesssolutionwithpreinstalledapplicationsensuringsoftwarecompliance.
RestrictaccesstocommunicationbetweentheenterprisenetworkandtheACEvirtualdesktop.
RestrictaccesstowhocaninitializethePocketACEinstance.
PreventthePocketACEinstancefrombeingcopiedormovedwhendeployed.
EnsurethePocketACEregularlychecksforpolicyupdates.
Creating the Pocket ACE Policy
Tostartthepolicyeditor,rightclicktheACEmasteryoucreatedandselectPolicies.
Access Control
To configure access control
1 SelectAccessControl.
2UnderActivationselectPassword.
3UnderAuthenticationselectUser‐specificpassword.
Byconfiguringtheactivationpolicytouseeitherapasswordoractivationkey,youcanprotectthePocketACE
instancewhileitisintransittotheuser.Theactivationpasswordorkeyisknownonlyto
thePocketACE
administratorandenduser.SettinganauthenticationpolicyensuresthataPocketACEinstancewillprompt
theuserforanewauthenticationpasswordafterthePocketACEhasbeeninitialized.Thispasswordisalways
usedtopoweronthePocketACEinstance,andisknownonlyby
theenduser.Iftheuserforgetsthe
authenticationpassword,itcanberesetbyanadministratorfromtheACEmanagementserver.
Expiration
SetanexpirationtimeperiodifyouwantthePocketACEinstancetoexpireafteracertainperiodoftime.
Copy Protection
UnderCopyProtection,selectDonotallowmovingorcopyingtheinstancefiles.
ConfiguringthecopyprotectionpolicyforthePocketACEinstancesallowsyoutominimizetheriskoflostor
stolenmediadevices.ThispreventsaPocketACEinstancethathasbeenmovedorcopiedfromrunning.
Resource Signing
UnderResourceSigning,selectVerifytheintegrityofallfilesintheACEresourcedirectory.
ConfiguringresourcesigningensurestheconfigurationandACEresourcesfilesthataccompanythePocket
ACEinstancehavenotbeenmodifiedorchanged.Ifsomeoneattemptstomodifyortamperwiththe
configurationfiles,thePocketACE
becomesunusable.BydefaultallPocketACEfilesareencrypted.