McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Guía de usuario Pagina 48

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 51
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 47
EEPC makes this task easy. An administrator can log on to McAfee ePO and, in just a few clicks, be
able to produce a report showing that the missing computer was encrypted.
Log on to ePolicy Orchestrator as an administrator.
Locate the system in the System Tree.
In ePolicy Orchestrator 4.5, view system properties and drill-down to encryption properties.
In ePolicy Orchestrator 4.6, drill-down to encryption properties.
Check the encryption status under the Disks tab.
Finding the user's system in ePolicy Orchestrator
The encryption status is stored as a property of the system, not the user. To confirm that a missing
computer is encrypted, you must find the system in ePolicy Orchestrator and view its properties. You
can use the queries and reports to know the encryption status of the system.
7
Use ePolicy Orchestrator to report client status
Report encryption status from McAfee ePO
48
McAfee Endpoint Encryption for PC 6.2 Software Best Practices Guide
Vista de pagina 47
1 2 ... 43 44 45 46 47 48 49 50 51

Comentarios a estos manuales

Sin comentarios