McAfee OFFICE 3.1 Especificaciones Pagina 42

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 41
Endpoint Encryption for Files and Folders Policy Settings
42 |
Automatic key loading/unloading
Enable inactivity timeout
If a user has successfully authenticated to a Endpoint Encryption for Files and Folders
key, there is no need to again authenticate when the key is needed next. As long as
the key is active (performing encryption/decryption), it will be available to the
Endpoint Encryption for Files and Folders Driver. However, when a key is inactive it
will be closed after the amount of time specified by this parameter. The user will then
need to authenticate again when the key is needed. The default value is enabled at 60
minutes; this can be disabled and the time can be changed. If disabled, it will render
an indefinite timeout, i.e. once authenticated the keys will remain loaded throughout
that entire Windows session.
Unload keys when screen saver is started or screen is locked - Marking this option will
result in all keys being closed when the screen saver starts or when the workstation is
locked (e.g. with Ctrl-Alt-Del). When the user returns from the inactivation, an
authentication is required to access the Endpoint Encryption for Files and Folders keys.
The default value is disabled.
Load ALL keys available to a user at logon
Marking this option will result in that all keys that the user can access are loaded
simultaneously once the user has done a first successful Endpoint Encryption for Files
and Folders logon. Thus, subsequent authentications to other keys are not required.
Leaving this option unmarked will require the user to authenticate once to every key
assigned to the user (when requested).
NOTE:WhendoingaWindowslogoff,alltheencryptionkeysareautomaticallyclosed.Thus,foreachnew
Windowslogon,aEndpointEncryptionforFilesandFoldersauthenticationisrequiredinordertoaccess
encryptionkeys.
User Local Keys
With the options in this section, it is possible to allow the user to create their own
encryption keys and manage them locally. As a safety mechanism, the Endpoint
Encryption Recovery schema applies also to user locally generated keys. No local
encryption key can ever be generated without being recoverable with the Endpoint
Encryption Recovery system.
The user local keys are protected with a separate password or a user digital certificate.
NOTE:ThepasswordforlocaluserkeysissubjecttotheEndpointEncryptionpasswordqualityrestrictions
thatareappliedtotheuser,e.g.minimumlength.SeetheEndpointEncryptionManagerAdministration
Guide‐>Passwordtemplatefordetails.
Vista de pagina 41
1 2 ... 37 38 39 40 41 42 43 44 45 46 47 ... 134 135

Comentarios a estos manuales

Sin comentarios