McAfee OFFICE 3.1 Especificaciones Pagina 71

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 70
Endpoint Encryption for Files and Folders client
| 71
For more information about setting up and configuring Endpoint Encryption Web
Recovery, please see the Endpoint Encryption Manager Administration Guide, chapter
about Web Recovery.
Show status
This entry opens a dialog presenting the ongoing activities in the Endpoint Encryption
for Files and Folders client. For example, if the client is active in encrypting the content
of a network folder, it will be displayed in the dialog along with an approximation for
how long it will last.
There are also two buttons available:
Diagnostics
This buttons automatically creates an e-mail with an XML attachment using the system
default e-mail application. The attachment contains (non-sensitive) system data for
support purposes. The better description of the machine needing support, the better
understanding the Endpoint Encryption support staff will get and thus the chance of a
quick resolution of the support issue is dramatically improved.
The e-mail with the XML attachment shall be sent to the Endpoint Encryption support
representative along with a description of the support issue.
Again, it is important to stress that no secret or sensitive system data is gathered, but
only system configuration data. Under no circumstances is sensitive information about
encryption keys included, nor are any encryption keys, or pieces of these, ever sent to
Endpoint Encryption. As you may verify by reviewing the XML file in a standard Web
browser, there is no data disclosure of files stored on the machine, again only system
configuration data is extracted.
Endpoint Encryption makes no further use of the data sent to us other than trying to
understand and reproduce the support issue. As soon as it can be done safely, the
information sent to us is destroyed.
Also, if there is information included in the text file that you find inappropriate, then
edit the file before sending it to your Endpoint Encryption support representative.
The default e-mail address may be changed by altering a registry value on the
machine where the Diagnostics operation is executed. See the Client Registry controls
s
e
ction for details.
Synchronize
Triggers a client synchronization with the Endpoint Encryption database. See the
following section for details.
Vista de pagina 70
1 2 ... 66 67 68 69 70 71 72 73 74 75 76 ... 134 135

Comentarios a estos manuales

Sin comentarios