Did this issue show itself when they tested the outsourced solution on your
first lot of guinea-pig users? or has it just shown up since a full
migration?

I'm still disinclined to believe that the PGP product is simply
"incompatible". Have they managed to prove this beyond a reasonable doubt
yet?

On 3 October 2011 14:01, David Lum <[email protected]> wrote:

> " Other than outsourced Exchange, what else has changed?"
> Nothing. At. All.
>
> We've followed their recommendations and given some uses new machines with
> SSD drives, i5 processors, etc, no change. I have been forwarding your guys'
> comments to our team that's working this, so I really appreciate your guys'
> input!
>
> From PGP's documentation - wrappage (
> http://www.google.com/url?sa=t&source=web&cd=2&ved=0CDMQFjAB&url=http%3A%2F%2Fdownload.pgp.com%2Fpdfs%2Fwhitepapers%2FHWDEW_WP.pdf&ei=F7GJTtq3LqriiAL39cmkDA&usg=AFQjCNEmg2M8ZQVBWdVogIxSLCwCok7m7w
> )
>
> " A boot sequence executes during the startup process of Microsoft®
> Windows, Apple Mac OS X, or Linux® operating systems. The boot system is the
> initial set of operations that the computer performs when it is switched on.
> A boot loader (or a bootstrap loader) is a short computer program that loads
> the main operating system for the computer. The boot loader first looks at a
> boot record or partition table, which is the logical area “zero” (or
> starting point) of the disk drive. Whole disk encryption modifies the zero
> point area of the drive.
>
> File System Basics
> During the boot process, the system initializes file systems.
> When a user requests access to a file (i.e., creates, opens, or deletes a
> file), the request is sent to the operating system input/output (I/O)
> manager, which forwards the request to the file system manager. The file
> system manager processes data in blocks.
>
> Life with Encryption: Business as Usual
> Most whole disk encryption software operates in conjunction with the file
> system architecture. It filters I/O operations for one or more file systems
> or file system volumes. When a drive is encrypted with whole disk encryption
> for the first time, it converts unencrypted drive blocks into encrypted
> blocks one at a time (Figure 2).
>
> Decrypted data is never available on the disk.
> When a user access a file, PGP Whole Disk Encryption decrypts the data in
> memory before it is presented for viewing. If the user makes any changes to
> the file, the data is encrypted in memory and written back to the relevant
> disk drive blocks just as it would be without encryption. Because PGP Whole
> Disk Encryption operates in conjunction with the file system, there is no
> additional wear and tear or performance impact beyond normal disk operation.
> As far as the user is concerned, it’s business as usual, and the underlying
> mechanism of encryption/decryption is completely transparent."
>
> Not quite as detailed as what Michael sent about Bitlocker
>
> -----Original Message-----
> From: Ken Schaefer [mailto:[email protected]]
> Sent: Saturday, October 01, 2011 6:55 AM
> To: NT System Admin Issues
> Subject: RE: Outsourcing Exchange
>
> This is all rubbish.
>
> If PGP works a  file system filter driver (Microsoft's API for AV etc for
> hooking into disk read/writes) then either PGP is corrupting the files
> (unlikely since you never had this problem before), or some other FSF driver
> is causing the problem (again unlikely, since you've never had this problem
> before), or something else is causing the problem. Other than outsourced
> Exchange, what else has changed?
>
> Cheers
> Ken
>
> -----Original Message-----
> From: David Lum [mailto:[email protected]]
> Sent: Saturday, 1 October 2011 2:45 AM
> To: NT System Admin Issues
> Subject: RE: Outsourcing Exchange
>
> We have talked about Bitlocker, but there's no guarantee that will be any
> better. Heck our Exchange provider didn't know PGP was an issue, and 'll bet
> PGP is more prevalent than Bitlocker.
>
> We're being steered to Win7/Office 2010/Remove PGP as all being needed to
> help resolve these issues. At 500 employees at least 450 are on XP / Office
> 2007 and 300+ have PGP on them. The Win7/2010 end state is desirable, it's
> the compressed timeframe that isn't.
>
> Dave
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <
> http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>



-- 
"On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
the machine wrong figures, will the right answers come out?' I am not able
rightly to apprehend the kind of confusion of ideas that could provoke such
a question."

****** IMPORTANT INFORMATION/DISCLAIMER *****

This document should be read only by those persons to whom it is addressed.
If you have received this message it was obviously addressed to you and
therefore you can read it, even it we didn't mean to send it to you.
However, if the contents of this email make no sense whatsoever then you
probably were not the intended recipient, or, alternatively, you are a
mindless cretin; either way, you should immediately kill yourself and
destroy your computer (not necessarily in that order). Once you have taken
this action, please contact us.. no, sorry, you can't use your computer,
because you just destroyed it, and possibly also committed suicide
afterwards, but I am starting to digress...... *

* The originator of this email is not liable for the transmission of the
information contained in this communication. Or are they? Either way it's a
pretty dull legal query and frankly one I'm not going to dwell on. But
should you have nothing better to do, please feel free to ruminate on it,
and please pass on any concrete conclusions should you find them. However,
if you pass them on via email, be sure to include a disclaimer regarding
liability for transmission.
*

* In the event that the originator did not send this email to you, then
please return it to us and attach a scanned-in picture of your mother's
brother's wife wearing nothing but a kangaroo suit, and we will immediately
refund you exactly half of what you paid for the can of Whiskas you bought
when you went to Pets** ** At Home yesterday. *

* We take no responsibility for non-receipt of this email because we are
running Exchange 5.5 and everyone knows how glitchy that can be. In the
event that you do get this message then please note that we take no
responsibility for that either. Nor will we accept any liability, tacit or
implied, for any damage you may or may not incur as a result of receiving,
or not, as the case may be, from time to time, notwithstanding all
liabilities implied or otherwise, ummm, hell, where was I...umm, no matter
what happens, it is NOT, and NEVER WILL BE, OUR FAULT! *

* The comments and opinions expressed herein are my own and NOT those of my
employer, who, if he knew I was sending emails and surfing the seamier side
of the Internet, would cut off my manhood and feed it to me for afternoon
tea. *

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to