Reference Guide
Navigate the Dell Server
116
8. In the Mail IDs fields for Dell Server Status, Password Updates, and Updates Availability, enter lists
of recipients for each notification type.
9. Follow these conventions when listing recipients:
Email address format is recipient@dell.com.
Recipients are separated with commas or semicolons.
10. In the Service alert reminder field, to enable reminders, press the Spacebar to enter an X in the
field then set the reminder interval in minutes.
11. A Service alert reminder is triggered when the reminder interval has passed after a notification is
sent about a system health issue and the host or service remains in the same state.
12. In the Summary Report field, to enable reports of notifications, select the desired interval (Daily,
Weekly, or Monthly) and then press the Spacebar to enter an X in the field.
13. Select OK.
External User Management
Allow or Block Access
To allow or block Data Guardian access for users who are not in the organization's domain:
1. In the left pane of the Remote Management Console, click Management > External User
Management.
2. Select the Registration Access tab.
3. Click Add.
4. Select Registration Access Type:
Blacklist - Blocks registration and file access for a user or a domain.
Full Access List - Grants registration and file access for a user or domain. If the user or domain is
also on the blacklist, no access is granted.
5. Enter either a domain to set access for the entire domain, or email address to set access only for a
single user.
6. Click Add.
External users can also be added to the blacklist from the Audit Events page, if the user is associated with an
audit event:
1. In the left pane of the Remote Management Console, click Reporting > Audit Events.
2. In the User column, click the
icon to the right of the user name to add to the blacklist.
Key Request
Dell Data Guardian external users can request a key from an internal user in order to access a protected
Office document. Key requests display on the Key Request Management page until the internal user approves
or denies the request. After 48 hours, key requests are removed from the list. At that time, external users
can again request access.