McAfee OFFICE 3.1 Manual de usuario Pagina 10

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 35
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 9
Introduction
10 |
background beyond your control. The reason for this is mainly to minimize the amount
of extra work you need to do when working with encrypted data. You probably only
want to work as normal and don’t bother about the corporate information security
rules.
Endpoint Encryption for Files and Folders supports three standard algorithms with
various key lengths, including the Endpoint Encryption FIPS 140-2 certified AES-256
algorithm.
With central management using the Endpoint Encryption Manager, and distribution of
encryption keys using the secure Endpoint Encryption Server, it is easy to allow
sharing of encrypted documents within an organization. When your Endpoint
Encryption Administrator assigns groups of users to encryption keys, the users in the
group can exchange and read encrypted documents like any other document, without
noticing any difference. Users not assigned to the key will not be able to read
documents encrypted with that key.
Using this mechanism it is possible to protect documents and folders on shared units,
e.g. a network server from unauthorized access by encrypting it with a proper key and
allocating this key to authorized users only. This approach provides for encryption key
hierarchies to be created, with an organization common key at the bottom (that every
user has), to specific department or group keys at the top (assigned only to selected
users within that department or group).
Management
When you authenticate to Endpoint Encryption for Files and Folders, the software
communicates with an Endpoint Encryption Server to update its policy and Folders, i.e.
try to access encrypted documents or do a manual Endpoint Encryption for Files and
Folders logon, provided that you are online. Endpoint Encryption for Files and Folders
will work also when offline, provided that your McAfee Administrator has made the
central encryption key(s) available for offline use.
The Endpoint Encryption Administrator creates policies that are applied to you.
Whenever you logon, your policy is applied and updated. Your Endpoint Encryption
Administrator may also force you to do an initial logon after the client has been
installed on your computer. You will notice such a forced logon in that you cannot
close the authentication window before you have authenticated.
Endpoint Encryption for Files and Folders client
Once the Endpoint Encryption for Files and Folders client is installed, the computer
needs to restart. After re-start, you may be forced to do a logon to retrieve the correct
Vista de pagina 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 ... 34 35

Comentarios a estos manuales

Sin comentarios