Reference Guide

Security Management Server Virtual v10.2.11 AdminHelp
Date Range - Enter a Start Date and End Date to limit results to entries that occur between these
dates. To insert dates into these fields, click the calendar icons to the right of the fields.
Time Range - If you entered a Date Range, further narrow the entries by entering a Start Time and
End Time. To insert times into these fields, click the calendar icons to the right of the fields.
Username and Host - Enter a either a username or host or both.
4. Click Search.
5. To sort the results in ascending order by column, click the heading of the column to sort.
6. To export the results to an Excel or CSV file, pull down the Export File list and select Excel or
CSV.
Exported files can hold up to 100,000 records.
Recovery
Recover Data - Encryption External Media Authentication Failure
Encryption External Media encrypts data on removable media, as defined by policy. There may be
several conditions where access to encrypted data needs to be regained. In general, these scenarios
fall into two categories:
The Encryption External Media password is lost or forgotten
The Encryption External Media software or encryption key material has been lost or corrupted
on the device
If more than one Dell Server is part of a federation, to perform Encryption External Media Recovery
across Dell Servers in the federation, see Enable Federated Key Recovery
.
Manual Authentication when Encryption External Media Password is Lost or Forgotten
If a user has lost or forgotten a password, manual authentication is necessary.
1. The user is prompted for their password. Since the password is not available, the user clicks I
forgot.
2. The user is given another opportunity to try again. If the user clicks Yes - I forgot, manual
authentication begins (or the manual authentication begins upon the set number of retries
allowed).
3. The user is instructed to contact their administrator and inform them that they need to manually
recover Encryption External Media for Windows.
4. As a Dell administrator, log in to the Management Console.
5. In the left pane, click Populations > Users.
6. Enter a filter to search for the user. The wild card character is *. You can enter Common Name,
Universal Principal Name, or sAMAccountName.
7. Click
. A user or list of users displays, based on your search filter.
8. Locate the appropriate user and click the Endpoints tab.
9. Locate the appropriate Shielded Endpoint.
10. Under Actions, click the Recover link.
Tip: Numbers are red and letters are blue.
105