
Encryption keys
| 51
7. Select the algorithm to be used by the key. You may select algorithm from the
drop-down menu. The recommendation is to use the Endpoint Encryption FIPS
140-2 certified implementation of the AES algorithm with a key length of 256 bits.
8. When finished, select OK to create the encryption key.
Right-click options on an Encryption Keys Group
Open group
Opens a window displaying the content (keys) of the group.
Rename group
Changes the name of the Keys Group. This does not affect the association of the group
content to other objects.
Delete group
Deletes the selected Keys group. The group must be empty before it can be deleted.
You will be prompted if you want to permanently delete the group, otherwise it will be
placed in the Endpoint Encryption Deleted objects. See the Endpoint Encryption
Manager guide for additional details.
Set as default group
Set the selected Encryption Keys Group to the default group.
Reset all to group configuration
Resets the properties of the individual keys within the group to those of its group,
including the Users list for each key.
Create copy
Creates a copy of the Keys Group based on the selected one.
Properties
Opens the properties of the selected Keys Group. The content of this dialog is
described later in this document.
Right-click options on an individual encryption key
Add key
Creates a new key within the group.
Rename key
Changes the name of the selected encryption key. This does not affect the association
of the policy to other objects.
Comentarios a estos manuales