Reference Guide
Table of Contents
vi
Suspend a Server Encryption Client ............................................................................. 80
Reinstate a Suspended Server Encryption Client .............................................................. 80
Commands for Self-Encrypting Drives ............................................................................. 81
Priority of Commands for Self-Encrypting Drives ............................................................. 81
Allow PBA Login Bypass ........................................................................................... 81
Unlock a Self-Encrypting Drive ................................................................................... 82
Remove Users from Endpoint with Self-Encrypting Drive .................................................... 82
Lock a Self-Encrypting Drive...................................................................................... 83
Send Wipe Command to Self-Encrypting Drive ................................................................ 83
Set the Server Connection Retry Interval ...................................................................... 83
Administrators ............................................................................................................ 84
Assign or Modify Administrator Roles .............................................................................. 84
Administrator Roles ................................................................................................... 84
Delegate Administrator Rights ...................................................................................... 87
Reporting .................................................................................................................... 88
Compliance Reporter .................................................................................................... 88
Data Guardian Audit Events ............................................................................................ 88
Map visualization ...................................................................................................... 88
Audit event options and filters ..................................................................................... 89
Options in the Columns dropdown ............................................................................... 90
Protected Office Document audit events ......................................................................... 91
Examples of Map Visualization and Column Filters ........................................................... 93
Example of drilling in at the map level ...................................................................... 93
Get Started with Data Guardian Audit Events....................................................................... 94
Audit Protected Office Documents ................................................................................. 94
Audit Cloud Encryption............................................................................................... 95
Default Monikers and Columns ...................................................................................... 95
View Audit Events (Geolocation)
...................................................................................... 96
Event Data ............................................................................................................. 97
Export Events to a SIEM/Syslog Server ............................................................................... 97
Export Audit Events with TLS/SSL over TCP ...................................................................... 97
Advanced Threat Prevention Syslog Event Types ................................................................... 99
Advanced Threat Prevention Syslog IP Addresses ................................................................ 102
Management ............................................................................................................... 103