Specifications

Copyright © 2007 VMware, Inc. All rights reserved. 6
Pocket ACE Guide
Creating the ACE Master Policy
BeforeyoubegindefiningthepolicyforyourACEMaster,considerthetargetuserswhowillusethePocket
ACEinstances.Somefactorsincludehowsecureorrestrictivetheenvironmentshouldbe,howremoteusers
willgetassistanceifthereisanissue,andwhetheranyrestrictionsshouldbeplacedon
accessingperipherals.
ThefollowingexampleshowsapolicythatcanbeusedbyanACEadministratorwhoisdeploying
Pocket ACEenableddevicestousersasasecureremoteaccesssolution.Inthiscase,theuserswillbeaccessing
theenterprisenetworkusinganunmanagedPersonalComputerfromtheirhomeor
otherremotelocation.
UsethefollowingrequirementstodefinetheACEpolicy:
ProvideanACEinstanceforsecureremoteaccesstoenterpriseresources.
Distributeasecureremoteaccesssolutionwithpreinstalledapplicationsensuringsoftwarecompliance.
RestrictaccesstocommunicationbetweentheenterprisenetworkandtheACEvirtualdesktop.
RestrictaccesstowhocaninitializethePocketACEinstance.
PreventthePocketACEinstancefrombeingcopiedormovedwhendeployed.
EnsurethePocketACEregularlychecksforpolicyupdates.
Creating the Pocket ACE Policy
Tostartthepolicyeditor,rightclicktheACEmasteryoucreatedandselectPolicies.
Access Control
To configure access control
1 SelectAccessControl.
2UnderActivationselectPassword.
3UnderAuthenticationselectUserspecificpassword.
Byconfiguringtheactivationpolicytouseeitherapasswordoractivationkey,youcanprotectthePocketACE
instancewhileitisintransittotheuser.Theactivationpasswordorkeyisknownonlyto
thePocketACE
administratorandenduser.SettinganauthenticationpolicyensuresthataPocketACEinstancewillprompt
theuserforanewauthenticationpasswordafterthePocketACEhasbeeninitialized.Thispasswordisalways
usedtopoweronthePocketACEinstance,andisknownonlyby
theenduser.Iftheuserforgetsthe
authenticationpassword,itcanberesetbyanadministratorfromtheACEmanagementserver.
Expiration
SetanexpirationtimeperiodifyouwantthePocketACEinstancetoexpireafteracertainperiodoftime.
Copy Protection
UnderCopyProtection,selectDonotallowmovingorcopyingtheinstancefiles.
ConfiguringthecopyprotectionpolicyforthePocketACEinstancesallowsyoutominimizetheriskoflostor
stolenmediadevices.ThispreventsaPocketACEinstancethathasbeenmovedorcopiedfromrunning.
Resource Signing
UnderResourceSigning,selectVerifytheintegrityofallfilesintheACEresourcedirectory.
ConfiguringresourcesigningensurestheconfigurationandACEresourcesfilesthataccompanythePocket
ACEinstancehavenotbeenmodifiedorchanged.Ifsomeoneattemptstomodifyortamperwiththe
configurationfiles,thePocketACE
becomesunusable.BydefaultallPocketACEfilesareencrypted.