
Local key management
26 |
Local key management
This chapter deals with the different options related to user local encryption keys, i.e.
encryption keys that you create on your own and that you manage on your own.
If allowed by the policy that your Endpoint Encryption Administrator has assigned to
you, you can create your own encryption keys; i.e. encryption keys that no one else
but you can see or manage. The only one that can manage your keys is you. You will
decide with whom you want to share your encryption keys such that more persons can
read data encrypted with your key, if needed.
If you have local keys enabled in your policy, you will see an entry for this in the tray
icon menu which appears when you right-click the product icon in the system tray.
Depending on the number of Endpoint Encryption products installed on your computer,
this menu may look different than below. The image below shows a tray icon menu
where only Endpoint Encryption for Files and Folders is installed.
Figure18:Userlocalkeystrayiconmenuoptions
Each of the local key options is subject to policy control and may be disabled for you.
If disabled, the corresponding entry won’t be listed in the menu.
For user friendliness, each of the menu options starts a wizard when selected. The
wizard will help you through all the steps needed to complete the action you selected.
In the following paragraphs, each local key menu option is described in text, where
the wizard steps are listed, along with important details.
Kommentare zu diesen Handbüchern