HOW TO: Use PGP Instant Messenger Proxy in PGP Desktop 9.0.x for Macintosh

Article:HOWTO41902  |  Created: 2006-02-17  |  Updated: 2011-02-16  |  Article URL http://www.symantec.com/docs/HOWTO41902
Article Type
How To




This article describes how to use the instant messenger proxy with PGP Desktop 9.0.x for Macintosh


PGP Desktop 9.x automatically encrypts IM sessions if the following conditions are met: Both users in the IM session are running PGP Desktop 9.0 or greater. They also have the Encrypt Instant message setting enabled in the PGP Desktop preferences.

 

Note: File transfers over IM are encrypted. However, PGP Desktop does not encrypt audio and video connections.


 

Enable PGP Desktop to Encrypt Instant Messages

  1. Open PGP Desktop by clicking on the PGP Desktop icon in the system menu bar, then scroll down and click Open PGP Desktop. If the PGP Desktop icon is not visible in the system menu then start PGP Desktop by clicking on the application (default location is the Applications folder).
  2. In the menu click PGP, then scroll down and click Preferences.
  3. Click on the Messaging tab.
  4. Under PGP Messaging Service check the box beside Encrypt instant messages by clicking on it. (By default this box is already checked.)
  5. If desired, you can also change options by clicking on the Advanced button.
  6. Click the Instant Messaging tab and select the desired options for appearance and proxying.
  7. Click OK.
  8. Close the Preferences screen by clicking on the red x on the left corner of the screen.

How to Verify that the Instant Messaging Session is being Encrypted

  1. When you log in to your IM client, a notification message appears under the PGP Desktop icon in the menu bar.
  2. When a session is opened with another PGP Desktop user, the buddy icon for the user is replaced with a PGP icon.
  3. When you start an IM session, an entry will be entered in the PGP Desktop messaging log. To view the log, click on the PGP icon in the system menu and then click Show Log.

Legacy ID



78


Article URL http://www.symantec.com/docs/HOWTO41902


Terms of use for this information are found in Legal Notices