Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation...

34
Pointsec Protector Installation Guide Version 4.91, A February 2008

Transcript of Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation...

Page 1: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Pointsec Protector

Installation Guide

Version 4.91, AFebruary 2008

Page 2: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...
Page 3: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

© 2003-2008 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.

RESTRICTED RIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.

TRADEMARKS:

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SMP, SMP On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.kl

For third party notices, see “THIRD PARTY TRADEMARKS AND COPYRIGHTS” on page 25.

Page 4: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...
Page 5: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Table of Contents i

Contents

Preface Who should use this guide?................................................................................. 1About This Guide ............................................................................................... 1About Pointsec Protector .................................................................................... 1Related Documentation ...................................................................................... 2More Information ............................................................................................... 3Feedback .......................................................................................................... 3

Chapter 1 Installing Pointsec Protector Introduction ...................................................................................................... 5Installing Pointsec Protector Server...................................................................... 6

Before Installing ........................................................................................... 6If the Installation is Interrupted...................................................................... 6Installing Pointsec Protector Server................................................................. 6Accessing Pointsec Protector Server Administration Console............................ 17

Installing Pointsec Protector Client .................................................................... 17Network Deployment of Pointsec Protector Client ........................................... 17Available Program Features .......................................................................... 17Installing Pointsec Protector Client Manually ................................................. 19

Removing Pointsec Protector............................................................................. 24Removing Pointsec Protector Server .............................................................. 24Removing Pointsec Protector Client .............................................................. 24

Page 6: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

ii

Page 7: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

1

Preface PPreface

In This Chapter

Who should use this guide?Administrators at organizations that are installing and deploying Pointsec Protector should read this guide.

About This GuideThis guide describes how to manually install and remove Pointsec Protector Server and Client.

About Pointsec ProtectorPointsec Protector is a unique corporate solution that provides a policy-driven mechanism of securing an organization’s information and ensuring data integrity.

Who should use this guide? page 1

About This Guide page 1

About Pointsec Protector page 1

Related Documentation page 2

More Information page 3

Feedback page 3

Page 8: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Related Documentation

2

Related DocumentationThis release includes the following additional documentation:

Table 1-1 Pointsec Protector documentation

Document This document contains ...

Pointsec Protector Administrator’s Guide Information about• Using Pointsec Protector• Silent network deployment of Pointsec

Protector Client• Frequently asked questions.

Online help version of the Administrator’s Guide, accessible through the Pointsec Protector administration console.

Pointsec Protector Quick Start Guide Instructions for getting started.

Pointsec Protector Release Notes • System requirements for Pointsec Protector Server and Client.

• Current information about the product, such as:

• new features and functions in the current release,

• problems that have been fixed since the previous release, and

• any known issues about the current release.

Page 9: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

More Information

Preface 3

More InformationIf you require information on Check Point’s other security products or services, or if you should encounter any problems with Pointsec Protector, please visit our web site or call us.

FeedbackCheck Point is engaged in a continuous effort to improve its documentation. Please contact your technical sales representative if you have comments on this guide.

Table 1-2 Contact information

Technical Support Sales

Telephone: The Americas 972-444-6600 1-800-429-4391

International +972-3-6115100Web site http://support.checkpoint

.com

Our Support Center is a comprehensive self-service database designed to quickly and easily answer all of your technical installation, configuration and upgrade needs on Check Point products.

http://partners.us.checkpoint.com

Here you can search for a Check Point sales partner near you.

Page 10: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Feedback

4

Page 11: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

5

Chapter 1Installing Pointsec Protector

In This Chapter:

IntroductionThis chapter describes how to manually install the Pointsec Protector Server and Pointsec Protector Client.

The Pointsec Protector Server is the hub of the Pointsec Protector-protected environment and must be installed prior to the installation of any client software. In addition to Evaluation and Production Modes, a Demo Mode of server installation is available. In Demo Mode, the Pointsec Protector Server provides the look and feel of the software, with a pre-configured database supplying sample data. Protector Clients can still connect to the “Demo Server”, but it does not synchronize with Active Directory.

Introduction page 5

Installing Pointsec Protector Server page 6

Before Installing page 6

If the Installation is Interrupted page 6

Installing Pointsec Protector Server page 6

Accessing Pointsec Protector Server Administration Console page 17

Installing Pointsec Protector Client page 17

After Installing page 23

Removing Pointsec Protector page 24

Removing Pointsec Protector Server page 24

Removing Pointsec Protector Client page 24

Page 12: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

6

In contrast to when it is in Evaluation Mode, when Pointsec Protector is in Demo Mode it cannot be switched to Production (or Evaluation) Mode after installation. Full uninstallation of the demo is required before a more capable version of the product can be installed.

See “Installing Pointsec Protector Server” on page 6 for details on installing the Pointsec Protector Server in Demo Mode.

Installing Pointsec Protector ServerThis section explains step-by-step the installation of the Pointsec Protector Server.

Before InstallingPrior to installation it is important that you do the following:

• Choose a suitable workstation/server to act as the Pointsec Protector Server. This machine must be fully networked with TCP/IP networking installed and be accessible across the network by all client workstations.

• Acquire a valid registration key. This is necessary both in order to install Pointsec Protector Server for evaluation and as a licensed product. If you do not have a valid registration key, please contact your Pointsec Protector supplier.

If the Installation is InterruptedA Pointsec Protector Server installation can be cancelled at any time prior to the step in which a summary of the installation options selected is displayed. If the installation is stopped at any time before this, the software will not be installed and the PC will remain untouched.

Installing Pointsec Protector ServerTo install Pointsec Protector Server:

1. Log on to the workstation that will be installed with the Pointsec Protector Pro Server with local administration rights.

2. Insert the Pointsec Protector installation CD-ROM into the CD drive.

Tip - If the CD does not run automatically, double-click on Autorun.exe, located in the root directory of the CD.

Page 13: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

Chapter 1 Installing Pointsec Protector 7

The setup program will launch and display the following welcome screen:

Figure 1-1

3. Click Next to continue. The license agreement screen is displayed:Figure 1-2

4. Read the terms and conditions carefully. To continue with the installation, select the I accept the agreement radio button and click Next. The registration screen is displayed:

Page 14: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

8

Figure 1-3

5. In the Serial Number field, enter one of the following:

• For full installation A valid registration key. You can either enter your registration key manually in the Serial number field or click the Load from File button to import a licence (.lic) file

• For demo installation The word DEMO (many of the following configuration options will not apply)

6. Click Next to continue. The setup type screen is displayed:

Note - For further information about obtaining a valid registration key, contact a Pointsec Protector supplier.

Page 15: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

Chapter 1 Installing Pointsec Protector 9

Figure 1-4

7. Select the type of installation required:

• Complete Performs a complete installation of Pointsec Protector Server including the Server components, MSSQL database (MSDE) and the administration console.

• Custom Provides the option to select which components are required.

• Pointsec Protector Server Administration Console Installs just the administration console for remote administration of a Pointsec Protector Server.

If you select a Custom installation, the following screen is displayed:

Page 16: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

10

Figure 1-5

8. Select one or more of the following:

9. Click Next. The Select Program Folder dialog box opens:

Table 1-1 Installation options

Option Select this option to install the ...

Pointsec Protector Server Core components of the Pointsec Protector Server. This will install the Pointsec Protector Server service and required access components.

Pointsec Protector Server Administration Console

Necessary components required to manage the Pointsec Protector Server.

An MMC snapin is created on the local machine which allows full management of the server.

If Microsoft Management Console (MMC) is not installed, or if it is out of date, the Pointsec Protector Server installation program will automatically install the latest version.

Microsoft SQL Database Engine

Microsoft SQL Server 2000 Desktop Engine (MSDE 2000).

Pointsec Protector Server uses an MSSQL database to store all configuration and log information. If this option is selected, Pointsec Protector will automatically install the Microsoft SQL Server 2000 Desktop Engine (MSDE 2000). However, it may be desirable to install Pointsec Protector onto an existing Microsoft SQL infrastructure.

To install Pointsec Protector onto an existing Microsoft SQL database, deselect this option.

Page 17: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

Chapter 1 Installing Pointsec Protector 11

Figure 1-6

10. Select the folder on the start menu where you wish to create shortcuts for the Pointsec Protector Server Administration Console. Click Next.

If the Microsoft SQL Database Engine was not selected during a custom installation, the following dialog is displayed:

Figure 1-7

Page 18: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

12

11. Select one of the following:

12. Click Next to continue. The following dialog box opens:Figure 1-8

13. Select the required database access security level. Specify the remote computer name where MSSQL is installed and the user name and password, if required. Click Next to continue. The following dialog box opens:

Table 1-2 MSSQL Server Setup options

Option Select this option if...

Default (MSSQLSERVER) MSSQL Server, MSDE or MSSQL Express is already installed on the host operating system.

Connect to MSSQL Server on Another Computer

You wish to set up the Pointsec Protector application server to point to an SQL server on another computer.

Page 19: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

Chapter 1 Installing Pointsec Protector 13

Figure 1-9

14. Enter the following:

• A port number for the Pointsec Protector server.

The Pointsec Protector TCP/IP port number is used for communication between the server and clients (default 9738).

• A valid SMTP server name, if e-mail alerts from the Pointsec Protector Server are required. If so, also enter a valid user name and password that has access to the SMTP server.

The e-mail address used to send alerts and the message subject can be edited as required.

15. Click Next. If a Novell NDS network is detected, the Pointsec Protector Server will automatically integrate with the NDS network. If this is detected during the server installation, the setup program will prompt for a Novell administrator account. The following dialog box opens:

Note - This value must be recorded and used for all Pointsec Protector Client installations.

Page 20: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

14

Figure 1-10

16. Specify the network browser account and password in either Novell Netware login name format or full distinguished name format. Click Next to continue. The following dialog box opens:

Figure 1-11

Page 21: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

Chapter 1 Installing Pointsec Protector 15

17. Browse to a user account to be used for the Pointsec Protector Server service on the server machine. We recommend that a domain user account be selected.

18. Click Next to continue. A summary of the installation options is displayed:

Figure 1-12

19. Click Next to perform the installation. The Setup Status screen is displayed, showing the installation progress:

Note - The selected user account must have access to the domain(s) and have local administration rights on the machine where the server is installed.

Page 22: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Server

16

Figure 1-13

Once the installation has completed, the following dialog box opens:Figure 1-14

20. Click Finish to complete the installation.

Page 23: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Accessing Pointsec Protector Server Administration Console

Chapter 1 Installing Pointsec Protector 17

Accessing Pointsec Protector Server Administration Console

To open the Pointsec Protector Server Administration Console:

1. Select Start → Programs → Pointsec → Pointsec Protector Server → Administration Console.

For information about using Pointsec Protector Administration Console, see the Administrator’s Guide.

Installing Pointsec Protector ClientThis section contains brief information about network deployment of Pointsec Protector Client, and step-by-step instructions to the manual installation of Pointsec Protector Client.

Network Deployment of Pointsec Protector ClientThe preferred method for installing Pointsec Protector Client is silent network deployment. Because Pointsec Protector Client requires local administration rights to install, you will need to use a software deployment mechanism.

Further information about silently installing Pointsec Protector Client across a network, please see the Administration Console online help. Pointsec Protector Client supports both command line and MSI deployment.

Available Program FeaturesThis section describes the program features available when installing Pointsec Protector Client. If you choose the custom installation, you can select one or more of these features; if you choose the complete installation, all features will be installed.

Tip - To access the fully indexed on-line help for Pointsec Protector Administration Console, press F1 from within the console or select Help on any dialog.

Page 24: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Available Program Features

18

The following table explains the program features available:

Table 1-3 Available program features during client installation

Program feature Description

Removable Media Manager Pointsec Protector ensures that all removable media/IO devices are authorized before use is granted. Authorization can be centrally managed or users can authorize their own devices providing policy is met (see data authorization below).

A unique Pointsec Protector digital signature is written to a device to mark it as authorized. The digital signature is automatically updated during file modifications/transfers within the protected environment. If changes to the media are made outside of the organization, the device will require re-authorization before it can be used again within the protected environment.

The system ensures that all devices are scanned for viruses using a third-party Anti-Virus scanner of your choice. This prevents illegal importing of data and more importantly can prevent the unauthorized exporting of data. This system will also stop users gaining access to any unauthorized hot-swap and plug-and-play devices.

Program Security Guard Pointsec Protector provides profile-based file management. Users can be prevented from creating defined file types on the local workstation and network drives.

File types are specified by extension and can be used to prevent the introduction of unlicensed software (.exe, .com, .dll, etc.), potentially malicious file types (.vbs, .scr, etc.) or simply unwanted file types (.mpg, .mp3, .jpg, etc.).

Protection is provided from any external source including e-mail attachments and web downloads.

DataScan Pointsec Protector is supplied with a data authorization module, which is integrated within the media authorization process. Employing this module, users can be given the right to authorize their own media providing the device contains only permitted file types. The module can be configured to only allow the authorization of data only files. Any executable/active code will be rejected even if renamed or hidden.

Page 25: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Client Manually

Chapter 1 Installing Pointsec Protector 19

Installing Pointsec Protector Client ManuallyTo manually install Pointsec Protector Client:

1. Insert the Pointsec Protector installation CD-ROM into the CD drive.

2. Copy the client software folder (%\software\Pointsec Protector\Client) to a folder on the server or local disk.

3. From the Pointsec Protector Administration Console, configure and export the default.xml policy file over the existing file in the Pointsec Protector client folder as created in the previous step.

For further information see the Administration Console online help.

4. Log on to the workstation with local administration rights.

5. Run setup.exe from the client installation folder. The setup program launches and displays the welcome screen:

Figure 1-15

Click Next to continue. The license agreement is displayed:

Tip - If the CD does not run automatically, double-click on Autorun.exe, located in the root directory of the CD.

Note - If you are installing within a Novell NDS environment the serverkey.reg file must be created and copied to the client installation folder prior to installation. For further information about creating the key, see the Administration Console online help.

Page 26: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Client Manually

20

Figure 1-16

6. Read the terms and conditions carefully. To continue with the installation, select the I accept the agreement radio button and click Next. The Setup Type dialog box opens:

Figure 1-17

Page 27: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Client Manually

Chapter 1 Installing Pointsec Protector 21

7. Select the type of installation required:

8. Click Next. If you selected custom installation, the following dialog box opens:

Figure 1-18

9. Select the required components and click Next.

The next step is to enter information about the secure TCP/IP connection which Pointsec Protector uses for communication between client and server workstations:

Table 1-4 Installation options

Type of installation Select this option to ...

Complete Install all available program features.Custom Select which components are installed

(recommended).

To read more about these features, see “Available Program Features” on page 17.

Page 28: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Client Manually

22

Figure 1-19

10. Add the required server(s) by doing the following:

a. Enter the server name or IP address and TCP/IP port number (default 9738).

b. Click Add.

A test connection is performed to check that the server name is correct.

c. Repeat the steps to enter more servers.

If several servers have been added, select Connection Type:

11. Click Next to continue. A summary of the selected installation components is displayed:

Tip - The servers can be arranged using the Move Up and Move Down buttons.

Table 1-5 Connection type options

Connection type option Explanation

Sequential The client will connect to the first server in the list by default. If the server is unavailable, the second server in the list will be contacted and so on.

Random The client software will automatically share the load across all configured servers using random selection.

Page 29: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Installing Pointsec Protector Client Manually

Chapter 1 Installing Pointsec Protector 23

Figure 1-20

12. Click Next. A progress bar indicates the setup progress. When the installation is complete, the following dialog box opens:

Figure 1-21

13. Select whether you want to restart your computer now or later in order for Pointsec Protector to start protecting it, and click Finish to complete the installation.

After InstallingAfter installing Pointsec Protector Client and restarting the workstation, Pointsec Protector will automatically load and protect the workstation. User profiles are automatically downloaded when users log on.

Page 30: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

Removing Pointsec Protector

24

The presence of Pointsec Protector Client is displayed by the addition of a new icon in the system tray:

Figure 1-22

For information about the system tray menus, see the Client on-line help.

Removing Pointsec ProtectorThe following sections describe how to remove Pointsec Protector Server and Pointsec Protector Client.

Removing Pointsec Protector ServerTo remove Pointsec Protector Server:

1. Use Add/Remove programs from within the MS Windows control panel.

2. Select Pointsec Protector Server from the list of installed programs and click Change/Remove.

During removal, there is an option to delete the Pointsec Protector database. If a re-installation is planned, we recommend you do not delete the database.

Removing Pointsec Protector ClientTo remove Pointsec Protector Client:

1. Use Add/Remove programs from within the MS Windows control panel.

2. Select Pointsec Protector Client from the list of installed programs and click Change/Remove.

Page 31: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

25

THIRD PARTY TRADEMARKS AND COPYRIGHTS

Entrust is a registered trademark of Entrust Technologies, Inc. in the United States and other countries. Entrust’s logos and Entrust product and service names are also trademarks of Entrust Technologies, Inc. Entrust Technologies Limited is a wholly owned subsidiary of Entrust Technologies, Inc. FireWall-1 and SecuRemote incorporate certificate management technology from Entrust.

Verisign is a trademark of Verisign Inc.

The following statements refer to those portions of the software copyrighted by University of Michigan. Portions of the software copyright © 1992-1996 Regents of the University of Michigan. All rights reserved. Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due credit is given to the University of Michigan at Ann Arbor. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. This software is provided “as is” without express or implied warranty. Copyright © Sax Software (terminal emulation only).

The following statements refer to those portions of the software copyrighted by Carnegie Mellon University.

Copyright 1997 by Carnegie Mellon University. All Rights Reserved.

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

The following statements refer to those portions of the software copyrighted by The Open Group.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

The following statements refer to those portions of the software copyrighted by The OpenSSL Project. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The following statements refer to those portions of the software copyrighted by Eric Young. THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright © 1998 The Open Group.

The following statements refer to those portions of the software copyrighted by Jean-loup Gailly and Mark Adler Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.

2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.

3. This notice may not be removed or altered from any source distribution.

The following statements refer to those portions of the software copyrighted by the Gnu Public License. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.

The following statements refer to those portions of the software copyrighted by Thai Open Source Software Center Ltd and Clark Cooper Copyright (c) 2001, 2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR

Page 32: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

26

ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. GDChart is free for use in your applications and for chart generation. YOU MAY NOT re-distribute or represent the code as your own. Any re-distributions of the code MUST reference the author, and include any and all original documentation. Copyright. Bruce Verderaime. 1998, 1999, 2000, 2001. Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson ([email protected]). Portions relating to gdft.c copyright 2001, 2002 John Ellson ([email protected]). Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information. Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation. This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation. Although their code does not appear in gd 2.0.4, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0

The curl license

COPYRIGHT AND PERMISSION NOTICE

Copyright (c) 1996 - 2004, Daniel Stenberg, <[email protected]>.All rights reserved.

Permission to use, copy, modify, and distribute this software for any purpose

with or without fee is hereby granted, provided that the above copyright

notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.

The PHP License, version 3.0

Copyright (c) 1999 - 2004 The PHP Group. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected].

4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission from [email protected]. You may indicate that your software works in conjunction with PHP by saying "Foo for PHP" instead of calling it "PHP Foo" or "phpfoo"

5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

"This product includes PHP, freely available from <http://www.php.net/>".

THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Page 33: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

27

This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at [email protected].

For more information on the PHP Group and the PHP project, please see <http://www.php.net>. This product includes the Zend Engine, freely available at <http://www.zend.com>.

This product includes software written by Tim Hudson ([email protected]).

Copyright (c) 2003, Itai Tzur <[email protected]>

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistribution of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Neither the name of Itai Tzur nor the names of other contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Copyright © 2003, 2004 NextHop Technologies, Inc. All rights reserved.

Confidential Copyright Notice

Except as stated herein, none of the material provided as a part of this document may be copied, reproduced, distrib-uted, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not lim-ited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of NextHop Technologies, Inc. Permission is granted to display, copy, distribute and download the materials in this doc-ument for personal, non-commercial use only, provided you do not modify the materials and that you retain all copy-right and other proprietary notices contained in the materials unless otherwise stated. No material contained in this document may be "mirrored" on any server without written permission of NextHop. Any unauthorized use of any material contained in this document may violate copyright laws, trademark laws, the laws of privacy and publicity, and communications regulations and statutes. Permission terminates automatically if any of these terms or condi-tions are breached. Upon termination, any downloaded and printed materials must be immediately destroyed.

Trademark Notice

The trademarks, service marks, and logos (the "Trademarks") used and displayed in this document are registered and unregistered Trademarks of NextHop in the US and/or other countries. The names of actual companies and products mentioned herein may be Trademarks of their respective owners. Nothing in this document should be construed as granting, by implication, estoppel, or otherwise, any license or right to use any Trademark displayed in the document. The owners aggressively enforce their intellectual property rights to the fullest extent of the law. The Trademarks may not be used in any way, including in advertising or publicity pertaining to distribution of, or access to, materials in

this document, including use, without prior, written permission. Use of Trademarks as a "hot" link to any website is prohibited unless establishment of such a link is approved in advance in writing. Any questions concerning the use of these Trademarks should be referred to NextHop at U.S. +1 734 222 1600.

U.S. Government Restricted Rights

The material in document is provided with "RESTRICTED RIGHTS." Software and accompanying documentation are provided to the U.S. government ("Government") in a transaction subject to the Federal Acquisition Regulations with Restricted Rights. The Government's rights to use, modify, reproduce, release, perform, display or disclose are

restricted by paragraph (b)(3) of the Rights in Noncommercial Computer Software and Noncommercial Computer Soft-ware Documentation clause at DFAR 252.227-7014 (Jun 1995), and the other restrictions and terms in paragraph (g)(3)(i) of Rights in Data-General clause at FAR 52.227-14, Alternative III (Jun 87) and paragraph (c)(2) of the Commer-cial

Computer Software-Restricted Rights clause at FAR 52.227-19 (Jun 1987).

Page 34: Pointsec Protector Installation Guide - Check Point Software · Pointsec Protector Installation Guide Version 4.91, A ... Log on to the workstation that will be installed with ...

28

Use of the material in this document by the Government constitutes acknowledgment of NextHop's proprietary rights in them, or that of the original creator. The Contractor/Licensor is NextHop located at 1911 Landings Drive, Mountain View, California 94043. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in applicable laws and regulations.

Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty

THE MATERIAL IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. TO THE FULLEST EXTENT POSSIBLE PURSUANT TO THE APPLICABLE LAW, NEXTHOP DISCLAIMS ALL WARRANTIES,

EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON INFRINGEMENT OR OTHER VIOLATION OF RIGHTS. NEITHER NEXTHOP NOR ANY OTHER PROVIDER OR DEVELOPER OF MATERIAL CONTAINED IN THIS DOCUMENT WARRANTS OR MAKES ANY REPRESEN-TATIONS REGARDING THE USE, VALIDITY, ACCURACY, OR RELIABILITY OF, OR THE RESULTS OF THE USE OF, OR OTHERWISE RESPECTING, THE MATERIAL IN THIS DOCUMENT.

Limitation of Liability

UNDER NO CIRCUMSTANCES SHALL NEXTHOP BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT, ARISING OUT OF THE USE, OR THE INABILITY TO USE, THE MATERIAL IN THIS DOCUMENT, EVEN IF NEXTHOP OR A NEXTHOP AUTHORIZED REPRESENTATIVE HAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IF YOUR USE OF MATERIAL FROM THIS DOCUMENT RESULTS IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU ASSUME ANY COSTS THEREOF. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT FULLY APPLY TO YOU.

Copyright © ComponentOne, LLC 1991-2002. All Rights Reserved.

BIND: ISC Bind (Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC"))

Copyright 1997-2001, Theo de Raadt: the OpenBSD 2.9 Release

PCRE LICENCE

PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself.

Written by: Philip Hazel <[email protected]>

University of Cambridge Computing Service, Cambridge, England. Phone:

+44 1223 334714.

Copyright (c) 1997-2004 University of Cambridge All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

* Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.