Administrator Guide

Kapitel 1: Einleitung........................................................................................................................ 5
Übersicht................................................................................................................................................................................ 5
FileVault-Verschlüsselung.....................................................................................................................................................5
Kontaktieren des Dell ProSupports..................................................................................................................................... 5
Kapitel 2: Anforderungen.................................................................................................................6
Encryption-Client...................................................................................................................................................................6
Encryption-Client-Hardware.......................................................................................................................................... 6
Encryption Client Software............................................................................................................................................ 6
Advanced Threat Prevention............................................................................................................................................... 7
Advanced Threat Prevention – Hardware....................................................................................................................7
Advanced Threat Prevention – Software.................................................................................................................... 8
Advanced Threat Prevention – Ports...........................................................................................................................8
Kompatibilität....................................................................................................................................................................8
Kapitel 3: Aufgaben für den Encryption Client.................................................................................. 11
Installation/Upgrade von dem Encryption Client..............................................................................................................11
Interaktive Installation oder Upgrade...........................................................................................................................12
Installation/Upgrade über Befehlszeile........................................................................................................................13
Aktivieren des vollständigen Festplattenzugriffs für Wechselmedien.....................................................................15
Aktivieren von Encryption Client........................................................................................................................................16
Verschlüsselungsrichtlinie und Status anzeigen...............................................................................................................17
Anzeigen von Richtlinie und Status in der Verwaltungskonsole..............................................................................20
Systemlaufwerke.................................................................................................................................................................20
Verschlüsselung aktivieren........................................................................................................................................... 20
Verschlüsselungsvorgang..............................................................................................................................................21
Austauschen der FileVault-Wiederherstellungsschlüssel..........................................................................................24
Benutzerfreundlichkeit..................................................................................................................................................24
Wiederherstellung................................................................................................................................................................26
Volume laden..................................................................................................................................................................26
FileVault-Wiederherstellung..........................................................................................................................................27
Wechselmedien....................................................................................................................................................................30
Unterstützte Formate...................................................................................................................................................30
Encryption External Media und Richtlinienaktualisierung..........................................................................................31
Verschlüsselungsausnahmen........................................................................................................................................ 31
Fehler auf der Registerkarte „Wechselmedien“......................................................................................................... 31
Überprüfungsmeldungen...............................................................................................................................................31
Sammeln von Protokolldateien für Endpoint Security Suite Enterprise....................................................................... 32
Deinstallieren von dem Encryption Client for Mac..........................................................................................................32
Aktivierung als Administrator............................................................................................................................................. 32
Aktivieren........................................................................................................................................................................33
Vorübergehend aktivieren............................................................................................................................................ 33
Encryption Client – Referenzdokument...........................................................................................................................33
Informationen zum optionalen Firmware-Kennwortschutz......................................................................................33
Inhaltsverzeichnis
Inhaltsverzeichnis 3