Reference Guide
Table of Contents
vi
Commands for Self-Encrypting Drives ...................................................................................................... 91
Priority of Commands for Self-Encrypting Drives ................................................................................. 91
Allow PBA Login Bypass ........................................................................................................................ 92
Unlock a Self-Encrypting Drive ............................................................................................................. 92
Remove Users from Endpoint with Self-Encrypting Drive .................................................................... 93
Lock a Self-Encrypting Drive................................................................................................................. 93
Send Wipe Command to Self-Encrypting Drive ..................................................................................... 93
Set the Dell Server Connection Retry Interval ..................................................................................... 94
Administrators .............................................................................................................................................. 94
Assign or Modify Administrator Roles ....................................................................................................... 94
Administrator Roles .................................................................................................................................. 95
Delegate Administrator Rights ................................................................................................................. 98
Reporting ......................................................................................................................................................... 99
Manage Reports ............................................................................................................................................ 99
Manage Reports ........................................................................................................................................ 99
View or Modify an Existing Report ...................................................................................................... 100
Create a New Report .......................................................................................................................... 100
View Report ............................................................................................................................................ 100
Query using Search and More... to filter ............................................................................................ 101
Export File .......................................................................................................................................... 102
Add Schedule .......................................................................................................................................... 102
Compliance Reporter ................................................................................................................................. 102
Data Guardian Audit Events ....................................................................................................................... 103
Map visualization .................................................................................................................................... 103
Audit Event Options and Filters ............................................................................................................. 103
Options in the Columns Menu ............................................................................................................. 105
Protected Office Document or Basic File Protection audit events (Windows, Mac, mobile, web portal,
CASB) ...................................................................................................................................................... 106
Examples of Map Visualization and Column Filters ............................................................................ 110
Example of drilling in at the map level .......................................................................................... 111
Get Started with Data Guardian Audit Events ........................................................................................... 111
Audit Protected Office Documents ........................................................................................................ 111
Audit Cloud Encryption (Mac or mobile) ................................................................................................ 113
Default Monikers and Columns ............................................................................................................... 113