McAfee OFFICE 3.1 Especificaciones Pagina 14

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 13
Introduction
14 |
Typical information stored in the Object Directory includes:
User Configuration and Policy Configuration information
Client and administration file lists
Encryption key and recovery information
Audit trails
Secure Server Key information
Connector Manager
Endpoint Encryption’s directory used to keep track of security information is designed
so that synchronization of details between Endpoint Encryption and other systems is
possible. The Connector Manager is a customizable module which enables data from
systems such as X500 directories (commonly used in PKI infrastructures) to propagate
to the Endpoint Encryption Object Directory. Using this mechanism, it is possible to
replicate details such as a user’s account status between Endpoint Encryption for Files
and Folders and other directories. Current connector options include LDAP, Active
Directory, Novell, and NT Domains. For information on these components, see the
Endpoint Encryption Manager Administration Guide or contact your Endpoint
Encryption representative.
Endpoint Encryption for Files and Folders client files
All the files that encompass the entire Endpoint Encryption product framework reside
within the database.
At first, they are written from the installation CD to the disk of the system where the
central system shall reside. Once the database is created, the files on disk are
imported to the database and assigned proper attributes and indexing. The files are
imported into File Groups, where each group has a dedicated purpose, e.g. EEFF31:
Endpoint Encryption for Files and Folders for PC client files.
By opening the System tab in the Endpoint Encryption Manager and then expanding
the Endpoint Encryption File Groups, the existing file groups are listed. By double-
clicking any group, the files within the group are listed in a separate window. Actions
such as Update may then be performed at any of the files by right-clicking it and
select the desired action.
Install and Deployment
Endpoint Encryption for Files and Folders is installed on users’ computers by running
small deploy sets (also known as install sets) created by the Endpoint Encryption
Vista de pagina 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 134 135

Comentarios a estos manuales

Sin comentarios