Software installation, Obtaining copies of ukla and krmc – Kanguru Common Criteria Evaluated v1.21 User Manual

Page 15

Advertising
background image

15

4. Software Installation

The evaluation covers a fresh installation of the management software and the initial configuration of the

devices listed in section 2.3 Hardware Requirements on page 9.

4.1 Obtaining copies of UKLA and KRMC

Both UKLA and KRMC are only available after they have been purchased. There are two ways that you

can obtain the UKLA and KRMC installer package:

• Physically provided on a CD

• A digital copy can be downloaded from the Kanguru Solutions’ support site

Unless you specify otherwise when placing your UKLA or KRMC order, a UKLA and/or KRMC

installation disc will be shipped to you.

Verifying the installation CD

Installation CD’s are packaged at secure Kanguru facilities and shipped via industry standard supply

chain organizations (UPS, FedEx, etc). All shipped CD’s are sealed when packaged and protected with

a tamper evident seal. If the seal is broken or has been tampered with, customers MUST refuse delivery

of the package.

Digital Download

To obtain access to digitally download the UKLA/KRMC installation package, please send an e-mail

request to

[email protected]

with your order information. Once your order information has

been confirmed, you will receive an e-mail notifying you that access to the UKLA/KRMC installer

download has been granted.

These files are only accessible to registered users who have been granted access to the Kanguru UKLA

and KRMC web portal:

• UKLA download:

https://kanguru.zendesk.com/entries/74698328

KRMC download:

https://kanguru.zendesk.com/entries/74056153

Important! The user MUST check the authenticity of the downloaded installers to ensure that the files

have not been corrupted or tampered with. The user can use file hashing to verify that the file they

downloaded is genuine. For instructions and details on verifying the file hash, please refer to Chapter

11. Verifying Your Files Using SHA256 Checksum on page 29.

Software Installation

Advertising