McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Uživatelská příručka Strana 59

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 63
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 58
Endpoint Encryption makes this task easy. An administrator can log on to McAfee ePO and, in just a
few clicks, be able to produce a report showing that the missing computer was encrypted.
Log on to ePolicy Orchestrator as an administrator.
Locate the system in the System Tree.
In the McAfee ePO server, drilldown to encryption properties.
Check the encryption status under the Disks tab.
Finding the user's system in ePolicy Orchestrator
The encryption status is stored as a property of the system, not the user. To confirm that a missing
computer is encrypted, you must find the system in ePolicy Orchestrator and view its properties. You
can use the queries and reports to know the encryption status of the system.
Figure 7-3 Endpoint Encryption system properties
Use ePolicy Orchestrator to report client status
Report encryption status from McAfee ePO
7
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
59
Zobrazit stránku 58
1 2 ... 54 55 56 57 58 59 60 61 62 63

Komentáře k této Příručce

Žádné komentáře