McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Betriebsanweisung Seite 59

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 63
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 58
Endpoint Encryption makes this task easy. An administrator can log on to McAfee ePO and, in just a
few clicks, be able to produce a report showing that the missing computer was encrypted.
Log on to ePolicy Orchestrator as an administrator.
Locate the system in the System Tree.
In the McAfee ePO server, drilldown to encryption properties.
Check the encryption status under the Disks tab.
Finding the user's system in ePolicy Orchestrator
The encryption status is stored as a property of the system, not the user. To confirm that a missing
computer is encrypted, you must find the system in ePolicy Orchestrator and view its properties. You
can use the queries and reports to know the encryption status of the system.
Figure 7-3 Endpoint Encryption system properties
Use ePolicy Orchestrator to report client status
Report encryption status from McAfee ePO
7
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
59
Seitenansicht 58
1 2 ... 54 55 56 57 58 59 60 61 62 63

Kommentare zu diesen Handbüchern

Keine Kommentare