1 关于帮助 1 ...........................................................................................................................................
2 更改日志 1 ...........................................................................................................................................
3 产品概述 1 ...........................................................................................................................................
3.1 系统要求 2 .....................................................................................................................................
3.2 适用于 MAC 的 EFDE 3 ....................................................................................................................
4 购买服务 3 ...........................................................................................................................................
5 ESET Full Disk Encryption使用 3 ...........................................................................................................
6 启用和配置 ESET Full Disk Encryption 4 ...............................................................................................
6.1 加密选项 5 .....................................................................................................................................
6.2 密码策略 6 .....................................................................................................................................
6.3 用户界面 8 .....................................................................................................................................
6.4 工具 8 ...........................................................................................................................................
6.5 EFDE 客户端部署 9 ..........................................................................................................................
6.5 EFDE 一体式安装程序 9 ...................................................................................................................
6.5 EFDE 软件安装任务 10 ...................................................................................................................
6.5 启用加密”向导 11 .......................................................................................................................
6.6 通过命令行部署 ESET Full Disk Encryption 13 .....................................................................................
6.6 使用预定义的密码部署安装程序 13 ......................................................................................................
6.6 通过命令行使密码无效 14 ...............................................................................................................
6.6 通过命令行暂停/恢复 FDE 身份验证 15 .................................................................................................
6.6 通过命令行添加/删除键盘布局 15 .......................................................................................................
7 EFDE 客户端加密过程 16 ......................................................................................................................
8 加密管理 18 .........................................................................................................................................
8.1 暂停 FDE 身份验证 19 ......................................................................................................................
9 预启动登录 22 ......................................................................................................................................
10 加密恢复 22 .......................................................................................................................................
10.1 恢复密码 23 ..................................................................................................................................
10.2 恢复数据 24 ..................................................................................................................................
11 解密/卸载 28 ......................................................................................................................................
12 常见问题 30 .......................................................................................................................................
13 故障排除 31 .......................................................................................................................................
14 隐私策略 32 .......................................................................................................................................
15 最终用户许可协议 34 .........................................................................................................................