McAfee全盘加密管理员手册EndpointEncryptionforPC

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

McAfeeEndpointEncryptionforPC-5.2.12AdministrationGuideCOPYRIGHTCopyright©2012McAfee,Inc.AllRightsReserved.Nopartofthispublicationmaybereproduced,transmitted,transcribed,storedinaretrievalsystem,ortranslatedintoanylanguageinanyformorbyanymeanswithoutthewrittenpermissionofMcAfee,Inc.,oritssuppliersoraffiliatecompanies.TRADEMARKATTRIBUTIONSAVERT,EPO,EPOLICYORCHESTRATOR,FOUNDSTONE,GROUPSHIELD,INTRUSHIELD,LINUXSHIELD,MAX(MCAFEESECURITYALLIANCEEXCHANGE),MCAFEE,NETSHIELD,PORTALSHIELD,PREVENTSYS,SECURITYALLIANCE,SITEADVISOR,TOTALPROTECTION,VIRUSSCAN,WEBSHIELDareregisteredtrademarksortrademarksofMcAfee,Inc.and/oritsaffiliatesintheUSand/orothercountries.McAfeeRedinconnectionwithsecurityisdistinctiveofMcAfeebrandproducts.Allotherregisteredandunregisteredtrademarkshereinarethesolepropertyoftheirrespectiveowners.LICENSEINFORMATIONLicenseAgreementNOTICETOALLUSERS:CAREFULLYREADTHEAPPROPRIATELEGALAGREEMENTCORRESPONDINGTOTHELICENSEYOUPURCHASED,WHICHSETSFORTHTHEGENERALTERMSANDCONDITIONSFORTHEUSEOFTHELICENSEDSOFTWARE.IFYOUDONOTKNOWWHICHTYPEOFLICENSEYOUHAVEACQUIRED,PLEASECONSULTTHESALESANDOTHERRELATEDLICENSEGRANTORPURCHASEORDERDOCUMENTSTHATACCOMPANYYOURSOFTWAREPACKAGINGORTHATYOUHAVERECEIVEDSEPARATELYASPARTOFTHEPURCHASE(ASABOOKLET,AFILEONTHEPRODUCTCD,ORAFILEAVAILABLEONTHEWEBSITEFROMWHICHYOUDOWNLOADEDTHESOFTWAREPACKAGE).IFYOUDONOTAGREETOALLOFTHETERMSSETFORTHINTHEAGREEMENT,DONOTINSTALLTHESOFTWARE.IFAPPLICABLE,YOUMAYRETURNTHEPRODUCTTOMCAFEEORTHEPLACEOFPURCHASEFORAFULLREFUND.McAfeeEndpointEncryptionforPC—5.2.122ContentsIntroducingMcAfeeEndpointEncryption...............................................7WhatisMcAfeeEndpointEncryptionforPC.....................................................7HowMcAfeeEndpointEncryptionforPCworks..................................................8EndpointEncryptionproductcomponents.......................................................8EndpointEncryptionforPCfeatures..........................................................10Aboutthisguide..........................................................................10Conventions..............................................................................10Findingproductdocumentation..............................................................11Requirements............................................................................11InstallingEndpointEncryptionManager...............................................13InstallEndpointEncryptionManager..........................................................13EEPCuserpolicies........................................................................14Useradministrationfunctions................................................................14Userconfigurationoptions..................................................................15UsingtokenswithEEPC..................................................................18SupportedSmartCardsandtokens...........................................................18Generaltokenoperation....................................................................18Storedvaluetokens.......................................................................19Certificate,orcryptonlytokens..............................................................19Othertypesoftoken.......................................................................20Tokencompatibility........................................................................21Specifictokennotes.......................................................................21SonyPuppyfingerprintreader...............................................................23SettinguptheSonyPuppyfingerprintreader............................................24EndpointEncryptionforPCsetup.....................................................24InstallingEndpointEncryptionwithPuppysupport.......................................24AladdineToken64KB......................................................................25SafeNetIKEY2032........................................................................25UsingEndpointEncryptionPhantomUSBbiometrickey..........................................25UsingUpekfingerprintreader...............................................................263McAfeeEndpointEncryptionforPC—5.2.12Creatingandconfiguringsystems......................................................27Machineadministrationfunctions(right-clickmenu).............................................27Machineconfigurationoptions...............................................................29Filegroupsandmanagement............................................................40EndpointEncryptionfilegroups..............................................................40Settingfilegroupfunctions.................................................................41Importingnewfiles........................................................................42Exportingfiles............................................................................42Deletingfiles...........................

1 / 130
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功