McAfee OFFICE 3.1 Especificaciones Pagina 83

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 82
Endpoint Encryption for Files and Folders client
| 83
Accessing encrypted files
Figure44:EndpointEncryptionforFilesandFoldersauthentication
To access encrypted information, users simply open the files as they would normally.
If the files are encrypted, users will be presented with a Endpoint Encryption for Files
and Folders authentication screen as above.
If the user has a correct personal ID and password, and the users account has been
assigned to the key used to protect the files then they will be able to access them.
The first time encrypted data is accessed Endpoint Encryption for Files and Folders
communicates over TCP/IP with a Endpoint Encryption Server, and downloads a copy
of the encryption key used to protect the data. Encryption keys may be cached locally,
so a connection to the Endpoint Encryption Server is not required when the key is
needed again. Other keys can only be used online, and a connection to the Endpoint
Encryption Server is needed each time a key is required.
You can find out more about Keys in the About Encryption keys chapter of this
guide.
To summarize the access restrictions for encrypted data:
1. The user must have valid Endpoint Encryption for Files and Folders credentials.
2. The user’s Endpoint Encryption account must be allocated to the key used to
encrypt the data.
3. The key must be cached locally, or a connection must be possible to the Endpoint
Encryption Server.
NOTE:WithEndpointEncryptionforFilesandFoldersitisimportanttorememberthatthefilesarenot
encryptedwithauseridandpassword,theyareencryptedwithacentrallycontrolledkey,orauserlocally
generatedkey.Accesstothedataisonlypossibleiftheus
ercansuc
cessfullyauthenticatetoaccessthekey.
Vista de pagina 82
1 2 ... 78 79 80 81 82 83 84 85 86 87 88 ... 134 135

Comentarios a estos manuales

Sin comentarios