McAfee OFFICE 3.1 Especificaciones Pagina 12

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 11
Introduction
12 |
installed, the user that logs on will be forced to retrieve the proper policy assigned to
him/her in the central database.
If Administrators change the device policy in the Endpoint Encryption Manger, all
machines using that policy will apply it when they next check for updates, i.e.
authentication performed when online.
The Endpoint Encryption for Files and Folders software queries the directory for any
updates to its policy, and if needed downloads and applies them. Typical updates could
be new rules about what should be encrypted, new passwords or policy information for
users, and also updates and rule changes to the way data can be accessed. In this
way, transparent synchronization of the enterprise becomes possible.
Permission to access or manage policies is controlled through the Endpoint Encryption
Manger administration rights.
The Endpoint Encryption Server Side Components
Endpoint Encryption Manager
Figure1:EndpointEncryptionManagerinterface
The most important component of the Endpoint Encryption solutions is Endpoint
Encryption Manger, the administration interface. This utility allows privileged users to
manage the enterprise from any workstation that can establish a TCP/IP link or file link
to the Object Directory. Typical procedures that the Endpoint Encryption Manger
handles are:
Defining Administrators and Users
Vista de pagina 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 134 135

Comentarios a estos manuales

Sin comentarios