Administrator Guide

1: 소개........................................................................................................................................5
개요.........................................................................................................................................................................................5
FileVault 암호화.....................................................................................................................................................................5
Dell ProSupport 문의........................................................................................................................................................ 5
2: 요구 사항................................................................................................................................ 6
Encryption 클라이언트.........................................................................................................................................................6
Encryption 클라이언트 하드웨어.................................................................................................................................6
Encryption 클라이언트 소프트웨어.............................................................................................................................6
Advanced Threat Prevention............................................................................................................................................... 7
Advanced Threat Prevention 하드웨어........................................................................................................................7
Advanced Threat Prevention 소프트웨어....................................................................................................................7
Advanced Threat Prevention 포트................................................................................................................................8
호환성............................................................................................................................................................................... 8
3: 암호화 클라이언트 작업............................................................................................................ 11
Encryption 클라이언트 설치/업그레이드........................................................................................................................11
대화형 설치 또는 업그레이드.....................................................................................................................................12
명령줄 설치/업그레이드............................................................................................................................................. 13
이동식 미디어에 대해 전체 디스크 액세스 활성화................................................................................................ 15
Encryption 클라이언트 활성화..........................................................................................................................................15
암호화 정책 상태 보기..................................................................................................................................................16
Management Console에서 정책 상태 보기.......................................................................................................... 19
시스템 볼륨..........................................................................................................................................................................19
암호화 사용.................................................................................................................................................................... 19
암호화 프로세스...........................................................................................................................................................20
FileVault 복구 재활용.............................................................................................................................................. 22
사용자 환경................................................................................................................................................................... 23
복구.......................................................................................................................................................................................24
볼륨 탑재........................................................................................................................................................................24
FileVault 복구.................................................................................................................................................................25
이동식 미디어..................................................................................................................................................................... 28
지원되는 형식............................................................................................................................................................... 28
Encryption External Media 정책 업데이트...........................................................................................................29
암호화 예외................................................................................................................................................................... 29
이동식 미디어 탭의 오류............................................................................................................................................ 29
감사 메시지................................................................................................................................................................... 29
Endpoint Security Suite Enterprise 대한 로그 파일 수집......................................................................................... 29
Encryption 클라이언트 for Mac 제거..............................................................................................................................30
관리자로서 활성화.............................................................................................................................................................30
활성화..............................................................................................................................................................................31
임시로 활성화................................................................................................................................................................ 31
Encryption 클라이언트 참조..............................................................................................................................................31
선택적 펌웨어 암호 보호 정보....................................................................................................................................31
목차
목차 3