Administrator Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise for Mac 관리자 가이드 v2.9
- 소개
- 요구 사항
- 암호화 클라이언트 작업
- 작업
- 용어집

장 1: 소개........................................................................................................................................5
개요.........................................................................................................................................................................................5
FileVault 암호화.....................................................................................................................................................................5
Dell ProSupport에 문의........................................................................................................................................................ 5
장 2: 요구 사항................................................................................................................................ 6
Encryption 클라이언트.........................................................................................................................................................6
Encryption 클라이언트 하드웨어.................................................................................................................................6
Encryption 클라이언트 소프트웨어.............................................................................................................................6
Advanced Threat Prevention............................................................................................................................................... 7
Advanced Threat Prevention 하드웨어........................................................................................................................7
Advanced Threat Prevention 소프트웨어................................................................................................................... 8
Advanced Threat Prevention 포트................................................................................................................................8
호환성............................................................................................................................................................................... 8
장 3: 암호화 클라이언트 작업............................................................................................................ 11
Encryption 클라이언트 설치/업그레이드........................................................................................................................11
대화형 설치 또는 업그레이드.....................................................................................................................................12
명령줄 설치/업그레이드............................................................................................................................................. 13
이동식 미디어에 대해 전체 디스크 액세스 활성화................................................................................................ 15
Encryption 클라이언트 활성화..........................................................................................................................................15
암호화 정책 및 상태 보기..................................................................................................................................................16
Management Console에서 정책 및 상태 보기.......................................................................................................... 19
시스템 볼륨......................................................................................................................................................................... 20
암호화 사용................................................................................................................................................................... 20
암호화 프로세스...........................................................................................................................................................20
FileVault 복구 키 재활용.............................................................................................................................................. 23
사용자 경험................................................................................................................................................................... 23
복구.......................................................................................................................................................................................24
볼륨 탑재........................................................................................................................................................................25
FileVault 복구.................................................................................................................................................................26
이동식 미디어..................................................................................................................................................................... 29
지원되는 형식............................................................................................................................................................... 29
Encryption External Media 및 정책 업데이트...........................................................................................................30
암호화 예외................................................................................................................................................................... 30
이동식 미디어 탭의 오류............................................................................................................................................ 30
감사 메시지................................................................................................................................................................... 30
Endpoint Security Suite Enterprise에 대한 로그 파일 수집......................................................................................... 30
Encryption 클라이언트 for Mac 제거...............................................................................................................................31
관리자로서 활성화..............................................................................................................................................................31
활성화..............................................................................................................................................................................31
임시로 활성화................................................................................................................................................................ 31
Encryption 클라이언트 참조............................................................................................................................................. 32
선택적 펌웨어 암호 보호 정보................................................................................................................................... 32
목차
목차 3