McAfee OFFICE 3.1 Especificaciones Pagina 3

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 2
Contents
Preface ........................................................................................... 6
About This Guide ..................................................................................... 6
Audience ................................................................................................. 6
Conventions ............................................................................................ 7
Related Documentation ............................................................................. 7
Acknowledgements .................................................................................. 7
Contacting Technical Support .................................................................... 7
Introduction ................................................................................... 8
Why Endpoint Encryption for Files and Folders? ........................................... 8
Design Philosophy .................................................................................... 8
The Endpoint Encryption Server Side Components ...................................... 12
Install and Deployment ............................................................................ 14
Endpoint Encryption for Files and Folders Client Software ............ 16
Endpoint Encryption for Files and Folders client ........................................... 16
General information about the client .......................................................... 16
Limitations in Endpoint Encryption for Files and Folders ............................... 18
Deploying Endpoint Encryption for Files and Folders .................... 20
Endpoint Encryption for Files and Folders Policy Settings ............. 21
About Endpoint Encryption for Files and Folders Policies ............................... 21
Policy administration functions .................................................................. 21
Policy configuration settings ..................................................................... 23
Encryption keys ............................................................................ 50
About Encryption keys ............................................................................. 50
Encryption key administration functions ..................................................... 50
Create an Encryption Key ......................................................................... 50
Encryption key configuration settings ........................................................ 52
Properties for an Encryption Key ............................................................... 55
Assigning and Updating Policies ................................................... 57
Assigning policies .................................................................................... 57
Updating policies ..................................................................................... 58
Creating an Install Package .......................................................... 59
About Install Packages ............................................................................. 59
Creating an Install Set ............................................................................. 59
Creating the Install set ............................................................................ 61
Installing Endpoint Encryption for Files and Folders client ............................. 62
Upgrading Endpoint Encryption for Files and Folders .................................... 63
Updating Endpoint Encryption for Files and Folders policies .......................... 65
Uninstalling Endpoint Encryption for Files and Folders .................................. 66
Installing Endpoint Encryption Manager ..................................................... 67
Uninstalling Endpoint Encryption Manager .................................................. 67
Endpoint Encryption for Files and Folders client ........................... 68
System tray icon ..................................................................................... 68
Local user key management options .......................................................... 72
Context menu options (right-click options) ................................................. 74
Identifying encrypted files and folders ....................................................... 82
Accessing encrypted files ......................................................................... 83
The .cekey file ........................................................................................ 84
Some client characteristics ....................................................................... 84
Vista de pagina 2
1 2 3 4 5 6 7 8 ... 134 135

Comentarios a estos manuales

Sin comentarios