Administrator Guide

Table Of Contents
1: はじめに..................................................................................................................................5
.........................................................................................................................................................................................5
FileVault .....................................................................................................................................................................5
Dell ProSupport へのおわせ................................................................................................................................... 5
2: 要件....................................................................................................................................... 6
Encryption クライアント.................................................................................................................................................... 6
Encryption クライアントハードウェア......................................................................................................................6
Encryption クライアントソフトウェア......................................................................................................................6
Advanced Threat Prevention............................................................................................................................................... 7
Advanced Threat Prevention ハードウェア............................................................................................................... 7
Advanced Threat Prevention ソフトウェア............................................................................................................... 8
Advanced Threat Prevention のポート........................................................................................................................8
互換性............................................................................................................................................................................... 8
3: Encryption クライアントのタスク............................................................................................ 12
Encryption Client のインストールとアップグレード.................................................................................................. 12
話型インストールまたはアップグレード...........................................................................................................13
コマンドラインでのインストール / アップグレード.......................................................................................... 14
リムーバブル メディアのフル ディスク アクセスの...............................................................................16
Encryption Client のアクティブ....................................................................................................................................17
のポリシーとステータスの表示......................................................................................................................... 17
管理コンソールのポリシーとステータスの表示..................................................................................................20
システムボリューム.......................................................................................................................................................... 21
.............................................................................................................................................................21
プロセス............................................................................................................................................................ 22
FileVault リカバリキーの再利用................................................................................................................................25
ユーザーエクスペリエンス....................................................................................................................................... 25
リカバリ.............................................................................................................................................................................. 26
ボリュームをマウントする....................................................................................................................................... 26
FileVault リカバリ.........................................................................................................................................................27
リムーバブルメディア...................................................................................................................................................... 31
サポートされるフォーマット....................................................................................................................................31
Encryption External Media とポリシーの更新.........................................................................................................32
化例外.....................................................................................................................................................................32
リムーバブルメディア タブのエラー................................................................................................................. 32
監査メッセージ............................................................................................................................................................ 32
Endpoint Security Suite Enterprise ログファイルの.............................................................................................32
Encryption Client for Mac のアンインストール............................................................................................................33
管理者としてのアクティブ......................................................................................................................................... 33
アクティブ................................................................................................................................................................ 34
一時的なアクティブ................................................................................................................................................34
Encryption クライアントの......................................................................................................................................34
オプションのファームウェアパスワード保護について..................................................................................... 34
目次
目次 3