McAfee OFFICE 3.1 Manual de usuario Pagina 3

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 35
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 2
Contents
Preface ........................................................................................... 4
Using this guide ............................................................................................. 4
Audience ................................................................................................. 4
Conventions ............................................................................................ 4
Welcome ......................................................................................... 5
About This Guide ..................................................................................... 5
Audience ................................................................................................. 5
Related Documentation ............................................................................. 6
Introduction ................................................................................... 7
Why Endpoint Encryption for Files and Folders? ........................................... 7
Design Philosophy .................................................................................... 7
How Endpoint Encryption for Files and Folders works .................................... 8
The Context Menu Options (right-click menu options) .................. 12
Encrypt… ............................................................................................... 13
Decrypt… ............................................................................................... 14
Search encrypted… (folder context menu only) ........................................... 14
Create Self-Extractor ({filename}.exe)… .................................................... 15
Attach as Self-Extractor to E-mail… ........................................................... 17
Attach encrypted to E-mail… (files only) ..................................................... 17
Reading a Self-Extractor .......................................................................... 18
The tray icon options .................................................................... 21
About Endpoint Encryption for Files and Folders… ........................................ 21
Unload all keys ....................................................................................... 22
User Local Key management options ......................................................... 22
Endpoint Encryption Recovery .................................................................. 22
Show status ........................................................................................... 24
Local key management ................................................................. 26
Create Local Key…................................................................................... 27
Delete Local Key… ................................................................................... 28
Export Local Key… ................................................................................... 29
Import Local Key… .................................................................................. 30
Rename Local Key… ................................................................................ 31
Recover Local Keys… ............................................................................... 32
Change Local Token… .............................................................................. 33
Index ............................................................................................ 35
Vista de pagina 2
1 2 3 4 5 6 7 8 ... 34 35

Comentarios a estos manuales

Sin comentarios