章 1: はじめに..................................................................................................................................5
概要.........................................................................................................................................................................................5
FileVault 暗号化.....................................................................................................................................................................5
Dell ProSupport へのお問い合わせ................................................................................................................................... 5
章 2: 要件....................................................................................................................................... 6
Encryption クライアント.................................................................................................................................................... 6
Encryption クライアントハードウェア......................................................................................................................6
Encryption クライアントソフトウェア......................................................................................................................6
Advanced Threat Prevention............................................................................................................................................... 7
Advanced Threat Prevention ハードウェア............................................................................................................... 7
Advanced Threat Prevention ソフトウェア............................................................................................................... 8
Advanced Threat Prevention のポート........................................................................................................................8
互換性............................................................................................................................................................................... 8
章 3: Encryption クライアントのタスク............................................................................................ 12
Encryption Client のインストールとアップグレード.................................................................................................. 12
対話型インストールまたはアップグレード...........................................................................................................13
コマンドラインでのインストール / アップグレード.......................................................................................... 14
リムーバブル メディアのフル ディスク アクセスの有効化...............................................................................16
Encryption Client のアクティブ化....................................................................................................................................17
暗号化のポリシーとステータスの表示......................................................................................................................... 17
管理コンソールのポリシーとステータスの表示..................................................................................................20
システムボリューム.......................................................................................................................................................... 21
暗号化の有効化.............................................................................................................................................................21
暗号化プロセス............................................................................................................................................................ 22
FileVault リカバリキーの再利用................................................................................................................................25
ユーザーエクスペリエンス....................................................................................................................................... 25
リカバリ.............................................................................................................................................................................. 26
ボリュームをマウントする....................................................................................................................................... 26
FileVault リカバリ.........................................................................................................................................................27
リムーバブルメディア...................................................................................................................................................... 31
サポートされるフォーマット....................................................................................................................................31
Encryption External Media とポリシーの更新.........................................................................................................32
暗号化例外.....................................................................................................................................................................32
リムーバブルメディア タブ上のエラー................................................................................................................. 32
監査メッセージ............................................................................................................................................................ 32
Endpoint Security Suite Enterprise ログファイルの収集.............................................................................................32
Encryption Client for Mac のアンインストール............................................................................................................33
管理者としてのアクティブ化......................................................................................................................................... 33
アクティブ化................................................................................................................................................................ 34
一時的なアクティブ化................................................................................................................................................34
Encryption クライアントの参照......................................................................................................................................34
オプションのファームウェアパスワード保護について..................................................................................... 34
目次
目次 3