Trend Micro, the Trend Micro t-ball logo, OfficeScan, and ... Endpoint Encryption has capabilities...

download Trend Micro, the Trend Micro t-ball logo, OfficeScan, and ... Endpoint Encryption has capabilities to

of 261

  • date post

    10-Jul-2020
  • Category

    Documents

  • view

    0
  • download

    0

Embed Size (px)

Transcript of Trend Micro, the Trend Micro t-ball logo, OfficeScan, and ... Endpoint Encryption has capabilities...

  • Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at:

    http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx

    Trend Micro, the Trend Micro t-ball logo, OfficeScan, and Control Manager are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

    Copyright © 2017. Trend Micro Incorporated. All rights reserved.

    Document Part No.: APEM67634/161108

    Release Date: May 2017

    Protected by U.S. Patent No.: Patents pending.

    http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx

  • This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product.

    Detailed information about how to use specific features within the product may be available in the Trend Micro Online Help and/or the Trend Micro Knowledge Base at the Trend Micro website.

    Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com.

    Evaluate this documentation on the following site:

    http://www.trendmicro.com/download/documentation/rating.asp

    mailto:docs@trendmicro.com http://www.trendmicro.com/download/documentation/rating.asp

  • i

    Table of Contents

    Chapter 1: Introduction

    Chapter 2: About Trend Micro Endpoint Encryption Features and Benefits ..................................................................................... 2-3

    What's New ..................................................................................................... 2-4

    About PolicyServer ......................................................................................... 2-7

    Management Consoles ................................................................................... 2-8 Trend Micro Control Manager ............................................................. 2-9 About PolicyServer MMC ................................................................... 2-10

    Endpoint Encryption Agents ..................................................................... 2-10

    Authentication Methods .............................................................................. 2-12 ColorCode ............................................................................................. 2-13 Domain Authentication ....................................................................... 2-13 Fixed Password ..................................................................................... 2-14 PIN ......................................................................................................... 2-14 Remote Help ......................................................................................... 2-14 Self Help ................................................................................................ 2-15 Smart Card ............................................................................................. 2-15

    Chapter 3: Getting Started with PolicyServer MMC Logging on to PolicyServer MMC ............................................................... 3-3

    PolicyServer MMC Interface ......................................................................... 3-4

    Working with Groups and Users .................................................................. 3-6 Defining Users and Groups .................................................................. 3-6 Adding a Top Group ............................................................................. 3-7 Adding a New User to a Group ........................................................... 3-8 Adding a New Enterprise User .......................................................... 3-11 Adding an Existing User to a Group ................................................ 3-13

  • Trend Micro Endpoint Encryption 6.0 PolicyServer MMC Guide

    ii

    Understanding Policy Controls .................................................................. 3-15 Policy Visual Indicators ....................................................................... 3-15 Policy Fields and Buttons .................................................................... 3-16 Modifying Policies ................................................................................ 3-17

    Disabling Agents ........................................................................................... 3-19

    Active Directory Synchronization .............................................................. 3-20 Active Directory Overview ................................................................. 3-21 Configuring Active Directory ............................................................. 3-22 Importing Active Directory Users ..................................................... 3-24

    Chapter 4: Policies in PolicyServer MMC Authentication Overview .............................................................................. 4-2

    Groups ..................................................................................................... 4-2 Users ......................................................................................................... 4-3 Devices ..................................................................................................... 4-5

    Policy Overview .............................................................................................. 4-5 Policy Visual Indicators ......................................................................... 4-6 Policy Fields and Buttons ...................................................................... 4-7 Accessing Policies ................................................................................... 4-7 Selecting a Policy for Modification ...................................................... 4-8 Editing Policies with Ranges ................................................................. 4-8 Editing Policies with True/False or Yes/ No Responses .............. 4-10 Editing Policies with Multiple-choice / Single-selection ................ 4-12 Editing Policies with Text String Arguments ................................... 4-15 Editing Policies with Multiple Options ............................................. 4-16

    Policy Synchronization ................................................................................. 4-18

    PolicyServer Policies ..................................................................................... 4-18 Admin Console Policies ...................................................................... 4-19 Administrator Policies ......................................................................... 4-19 Authenticator Policies .......................................................................... 4-20 Log Alert Policies ................................................................................. 4-21 Service Pack Download Policies ........................................................ 4-22 Welcome Message Policies .................................................................. 4-22

    Full Disk Encryption Policies ..................................................................... 4-23 Agent Policies ........................................................................................ 4-24

  • Table of Contents

    iii

    Encryption Policies .............................................................................. 4-26 Login Policies ........................................................................................ 4-26 Password Policies .................................................................................. 4-32

    File Encryption Policies ............................................................................... 4-33 Agent Policies ........................................................................................ 4-33 Encryption Policies .............................................................................. 4-33 Login Policies ........................................................................................ 4-35 Password Policies .................................................................................. 4-36

    Common Policies .......................................................................................... 4-37 Agent Policy .......................................................................................... 4-37 Authentication Policies ........................................................................ 4-38

    Chapter 5: Groups in PolicyServer MMC Group Management ....................................................................................... 5-2

    Adding a Top Group ............................................................................. 5-2 Adding a Subgroup ................................................................................ 5-4 Modifying a Group ................................................................................. 5-5 Removing a Group ................................................................................. 5-5 Adding a New User to a Group ........................................................... 5-5 Adding an Existing User to a