Reference Guide

Navigate Dell Security Center
76
6. Click Add.
External users can also be added to the blacklist from the Audit Events page, if the user is associated
with an audit event:
1. In the left pane, click Reporting > Audit Events.
2. In the user column, click
to the right of the user name to add to the blacklist.
Key Request
Data Guardian external users can request a key from an internal user to access a protected Office
document. Key requests are shown on the Key Request Management page until the internal user
approves or denies the request. After 48 hours, key requests are removed from the list. At that time,
external users can request access again.
If the internal user is not available or has left the enterprise, an administrator can use this page to
approve or deny requests.
Columns include:
User - external user making the request
File Name
Request Date
Request Expiration
File Owner - internal user
Approve/Deny
To approve or deny a request:
1. In the left pane, click Management > Data Guardian Management.
2. Select the Key Request tab.
3. Search for specific requests or select requests in the list.
To select multiple requests to approve or deny, press Ctrl and then select the requests.
To select multiple sequential requests, select the first request and then press Shift and select
the last request in the sequential list.
4. Click Approve or Deny.
To approve or deny a single request, click approve
or deny icon at the right end of the request.
Key Revocation
The administrator can revoke access to files, at both the user level and the file level.
To revoke access:
1. In the left pane, click Management > Data Guardian Management.
2. Select the Key Revocation tab.
3. Select the user or file from which to revoke files.