Trend Micro, the Trend Micro t-ball logo, OfficeScan, and Control 2018-07-31آ  This documentation...

download Trend Micro, the Trend Micro t-ball logo, OfficeScan, and Control 2018-07-31آ  This documentation introduces

of 263

  • date post

    13-Mar-2020
  • Category

    Documents

  • view

    0
  • download

    0

Embed Size (px)

Transcript of Trend Micro, the Trend Micro t-ball logo, OfficeScan, and Control 2018-07-31آ  This documentation...

  • Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at:

    http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx

    Trend Micro, the Trend Micro t-ball logo, OfficeScan, and Control Manager are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

    Copyright © 2018. Trend Micro Incorporated. All rights reserved.

    Document Part No.: APEM68337/180626

    Release Date: August 2018

    Protected by U.S. Patent No.: Patents pending.

    http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx

  • This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product.

    Detailed information about how to use specific features within the product may be available in the Trend Micro Online Help and/or the Trend Micro Knowledge Base at the Trend Micro website.

    Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com.

    Evaluate this documentation on the following site:

    http://www.trendmicro.com/download/documentation/rating.asp

    mailto:docs@trendmicro.com http://www.trendmicro.com/download/documentation/rating.asp

  • Privacy and Personal Data Collection Disclosure

    Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features.

    The following link outlines the types of data that Endpoint Encryption collects and provides detailed instructions on how to disable the specific features that feedback the information.

    https://success.trendmicro.com/data-collection-disclosure

    Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Policy:

    https://www.trendmicro.com/en_us/about/legal/privacy-policy-product.html

    https://success.trendmicro.com/data-collection-disclosure https://www.trendmicro.com/en_us/about/legal/privacy-policy-product.html

  • i

    Table of Contents

    Chapter 1: Introduction

    Chapter 2: About Trend Micro Endpoint Encryption Features and Benefits ..................................................................................... 2-3

    What's New ..................................................................................................... 2-4

    About PolicyServer ......................................................................................... 2-8

    Management Consoles ................................................................................... 2-9 Trend Micro Control Manager ........................................................... 2-10 About PolicyServer MMC ................................................................... 2-11

    Endpoint Encryption Agents ..................................................................... 2-11

    Authentication Methods .............................................................................. 2-13 ColorCode ............................................................................................. 2-14 Domain Authentication ....................................................................... 2-14 Fixed Password ..................................................................................... 2-15 PIN ......................................................................................................... 2-15 Remote Help ......................................................................................... 2-15 Self Help ................................................................................................ 2-16 Smart Card ............................................................................................. 2-16

    Chapter 3: Getting Started with PolicyServer MMC Logging on to PolicyServer MMC ............................................................... 3-3

    PolicyServer MMC Interface ......................................................................... 3-4

    Working with Groups and Users .................................................................. 3-6 Defining Users and Groups .................................................................. 3-6 Adding a Top Group ............................................................................. 3-7 Adding a New User to a Group ........................................................... 3-8 Adding a New Enterprise User .......................................................... 3-11 Adding an Existing User to a Group ................................................ 3-13

  • Trend Micro Endpoint Encryption PolicyServer MMC Guide

    ii

    Understanding Policy Controls .................................................................. 3-15 Policy Visual Indicators ....................................................................... 3-15 Policy Fields and Buttons .................................................................... 3-16 Modifying Policies ................................................................................ 3-17

    Disabling Agents ........................................................................................... 3-19

    Active Directory Synchronization .............................................................. 3-20 Active Directory Overview ................................................................. 3-21 Configuring Active Directory ............................................................. 3-22 Importing Active Directory Users ..................................................... 3-24

    Chapter 4: Policies in PolicyServer MMC Authentication Overview .............................................................................. 4-2

    Groups ..................................................................................................... 4-2 Users ......................................................................................................... 4-3 Devices ..................................................................................................... 4-5

    Policy Overview .............................................................................................. 4-5 Policy Visual Indicators ......................................................................... 4-6 Policy Fields and Buttons ...................................................................... 4-7 Accessing Policies ................................................................................... 4-7 Selecting a Policy for Modification ...................................................... 4-8 Editing Policies with Ranges ................................................................. 4-8 Editing Policies with True/False or Yes/ No Responses .............. 4-10 Editing Policies with Multiple-choice / Single-selection ................ 4-12 Editing Policies with Text String Arguments ................................... 4-15 Editing Policies with Multiple Options ............................................. 4-16

    Policy Synchronization ................................................................................. 4-18

    PolicyServer Policies ..................................................................................... 4-18 Admin Console Policies ...................................................................... 4-19 Administrator Policies ......................................................................... 4-19 Authenticator Policies .......................................................................... 4-20 Log Alert Policies ................................................................................. 4-21 Service Pack Download Policies ........................................................ 4-22 Welcome Message Policies .................................................................. 4-22

    Full Disk Encryption Policies ..................................................................... 4-23 Agent Policies ........................................................................................ 4-24

  • Table of Contents

    iii

    Encryption Policies .............................................................................. 4-26 Login Policies ........................................................................................ 4-26 Password Policies .................................................................................. 4-32

    File Encryption Policies ............................................................................... 4-33 Agent Policies ........................................................................................ 4-33 Encryption Policies .............................................................................. 4-33 Login Policies ........................................................................................ 4-35 Password Policies .................................................................................. 4-36

    Common Policies .......