McAfee OFFICE 3.1 Manual de usuario

Busca en linea o descarga Manual de usuario para Software McAfee OFFICE 3.1. Endpoint Encryption for Files and Folders 3.1.3 User Guide Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 35
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
McAfee
®
Endpoint Encryption for Files
and Folders
UserGuide
Version3.1.2

Vista de pagina 0
1 2 3 4 5 6 ... 34 35

Indice de contenidos

Pagina 1 - UserGuide

McAfee® Endpoint Encryption for Files and Folders UserGuideVersion3.1.2

Pagina 2

Introduction 10 | background beyond your control. The reason for this is mainly to minimize the amount of extra work you need to do when working wit

Pagina 3 - Contents

Introduction | 11 policy from the central database. If there is no connection to the central database, you will work with the default policy as defin

Pagina 4 - Preface

The Context Menu Options (right-click menu options) 12 | The Context Menu Options (right-click menu options) This chapter deals with the options tha

Pagina 5 - Welcome

The Context Menu Options (right-click menu options) | 13 As is evident from the figures above, there is a slight difference between the context menus

Pagina 6 - Related Documentation

The Context Menu Options (right-click menu options) 14 | Decrypt… This option allows you to manually decrypt a file or folder. In some occasions, yo

Pagina 7

The Context Menu Options (right-click menu options) | 15 Figure5:EndpointEncryptionforFilesandFolders–SearchdialogSpecify the parameters f

Pagina 8

The Context Menu Options (right-click menu options) 16 | Figure6:Enteringencryptionpasswordforself‐extractingfileYou need to enter the spec

Pagina 9

The Context Menu Options (right-click menu options) | 17 Attach as Self-Extractor to E-mail… When selecting this option, the Self-Extractor is automa

Pagina 10 - Management

The Context Menu Options (right-click menu options) 18 | NOTE:Thedecisiontosendaparticulardocumentasanencryptedattachmentisdoneoutside

Pagina 11 - Introduction

The Context Menu Options (right-click menu options) | 19 Figure10:Opening(decrypting)aSelf‐ExtractorBy default, after typing the correct passw

Pagina 12

McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee repr

Pagina 13 - Encrypt…

The Context Menu Options (right-click menu options) 20 | Self-Extractors may be read on any computer running Windows 2000 and later. There is no nee

Pagina 14 - Decrypt…

The tray icon options | 21 The tray icon options This chapter deals with the options that are available from the Endpoint Encryption product tray ico

Pagina 15 - }.exe)…

The tray icon options 22 | Unload all keys Selecting this option effectively closes all encryption keys that are available to your system. This mean

Pagina 16

The tray icon options | 23 The explanation below assumes a verbal interaction with your helpdesk; the web recovery approach is very similar. 1. Call

Pagina 17

The tray icon options 24 | Figure17:Selectionofnewpasswordaftercompletedrecovery 8. Once you have selected a new password, click OK to pr

Pagina 18 - Reading a Self-Extractor

The tray icon options | 25 Synchronize This button triggers a client synchronization with the Endpoint Encryption central system. See next section fo

Pagina 19

Local key management 26 | Local key management This chapter deals with the different options related to user local encryption keys, i.e. encryption

Pagina 20

Local key management | 27 Create Local Key… This option starts a wizard that creates an encryption key. The encryption keys are stored in so-called “

Pagina 21 - The tray icon options

Local key management 28 | 4. Key name and timeout – Give the key an appropriate name and also select the inactivity timeout for the key from the dr

Pagina 22 - Endpoint Encryption Recovery

Local key management | 29 The Delete Local Key wizard The following steps constitute the Delete Local Key… wizard: 1. Welcome dialog – The opening d

Pagina 23

Contents Preface ... 4Using this guide ...

Pagina 24 - Show status

Local key management 30 | created in the central Endpoint Encryption database. When ready, click Next > to continue. 3. Select where to save the

Pagina 25

Local key management | 31 2. Find the location of the SKS file – Specify the location where you have saved the exported key (SKS file) that you have

Pagina 26 - Local key management

Local key management 32 | 4. Summary page – This page shows a summary of the rename operation. If you want to change the name again, simply click &

Pagina 27 - Create Local Key…

Local key management | 33 4. Summary page – This dialog shows information about the recovery to be performed. Click Next > to continue, or click

Pagina 28 - Delete Local Key…

Local key management 34 | functional certificate is available. Contact your IT Administrator if you have problems importing digital certificates. Se

Pagina 29 - Export Local Key…

Index | 35 Index CChangetokenforlocalkey,33Closeallkeys,22Createlocalkey,27,30DDecrypt…files,14folders,14Deletelocalkey,28

Pagina 30 - Import Local Key…

Preface 4 | Preface Using this guide This guide describes how to use the McAfee Endpoint Encryption for Files and Folders client. Audience This guid

Pagina 31 - Rename Local Key…

Welcome | 5 Welcome McAfee is dedicated to providing you and your company with the best in security for protecting information on computers. Applying

Pagina 32 - Recover Local Keys…

Welcome 6 | Related Documentation The following documents are available from your McAfee representative: • Endpoint Encryption for Files and Folder

Pagina 33 - Change Local Token…

Introduction | 7 Introduction Why Endpoint Encryption for Files and Folders? Within all organizations there are people you trust with data and people

Pagina 34

Introduction 8 | How Endpoint Encryption for Files and Folders works The Endpoint Encryption for Files and Folders client encrypts folders and docum

Pagina 35

Introduction | 9 The document remains encrypted regardless of where it is moved. Thus, the file will remain encrypted even if stored on a USB memory

Comentarios a estos manuales

Sin comentarios