McAfee OFFICE 3.1 Especificaciones Pagina 10

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 9
Introduction
10 |
A key feature of Endpoint Encryption for Files and Folders is the principle of
containment, or persistent encryption, as it is also known. This means that the
encrypted folder or file always will retain its encryption, irrespective of how it is edited,
moved or copied.
The file remains encrypted and secure regardless of where or how it is moved. This
applies to files moved to other folders, or, USB memory sticks, floppy disks or a
network share.
Files and folders are decrypted manually by the user. The user right-clicks on the
encrypted file or folder and selects the appropriate menu option. It is worth noting
that policies can restrict this option. Likewise, policies can enforce decryption if
necessary.
NOTE:FilesmovedtoPDAswilllosetheirencryption.Theuserispresentedawarningifmovingencrypted
filestomedianotsupportedbyEndpointEncryptionforFilesandFolders.FilesmovedfromthePDAtoan
encrypteddirectoryatthePCwillcertainlybeenc
rypted
A user’s access to various encryption keys is defined by Endpoint Encryption
Administrators, and delivered to the Endpoint Encryption for Files and Folders client
via the Endpoint Encryption Server. The user must authenticate to Endpoint Encryption
for Files and Folders before getting access to the key and eventually, the file. The
authentication is performed with the Endpoint Encryption logon dialog. If
authentication fails the user will be unable to read the encrypted files.
Once a user has accessed an encryption key, it can optionally be stored securely
(encrypted) on the user’s PC for future use (this is called the local key cache). Other
keys may only be available direct from the Endpoint Encryption Server - this can
prevent encrypted data from being used outside the corporate environment.
Endpoint Encryption for Files and Folders encrypts folders and files transparently at the
original location of the file or folder. User interaction is minimal and the user perceives
the working environment as normal.
Policy entries define folders where all files will automatically be encrypted. This allows
directories, e.g. those containing Temp files to be encrypted also. This assures that all
temporary files created will be encrypted.
Files can also be encrypted based on a policy of their file type, e.g. a policy may state
that all Microsoft Word® document files (*.doc, *.rtf, etc) should be encrypted. The
user is never involved in applying policies. All policy enforcement is automatic and
beyond user control.
Finally, the user’s ability to do any operations with the Endpoint Encryption for Files
and Folders client can be policy controlled, for example, the ability to encrypt
additional folders by right-clicking, or create decrypted copies of files.
Vista de pagina 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 ... 134 135

Comentarios a estos manuales

Sin comentarios