McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Guide de l'utilisateur Page 48

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 51
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 47
EEPC makes this task easy. An administrator can log on to McAfee ePO and, in just a few clicks, be
able to produce a report showing that the missing computer was encrypted.
Log on to ePolicy Orchestrator as an administrator.
Locate the system in the System Tree.
In ePolicy Orchestrator 4.5, view system properties and drill-down to encryption properties.
In ePolicy Orchestrator 4.6, drill-down to encryption properties.
Check the encryption status under the Disks tab.
Finding the user's system in ePolicy Orchestrator
The encryption status is stored as a property of the system, not the user. To confirm that a missing
computer is encrypted, you must find the system in ePolicy Orchestrator and view its properties. You
can use the queries and reports to know the encryption status of the system.
7
Use ePolicy Orchestrator to report client status
Report encryption status from McAfee ePO
48
McAfee Endpoint Encryption for PC 6.2 Software Best Practices Guide
Vue de la page 47
1 2 ... 43 44 45 46 47 48 49 50 51

Commentaires sur ces manuels

Pas de commentaire