Glossary Parent topic

The following table explains the terminology used throughout the Endpoint Encryption documentation.

Endpoint Encryption Terminology

Term Description
Agent
Software installed on an endpoint that communicates with a management server.
Authentication
The process of identifying a user.
ColorCode™
The authentication method requiring a color-sequence password.
Command Line Helper
A Trend Micro tool for creating encrypted values to secure credentials when creating Endpoint Encryption agent installation scripts.
Command Line Installer Helper
A Trend Micro tool for creating encrypted values to secure credentials when creating Endpoint Encryption agent installation scripts.
Control Manager
Trend Micro Control Manager is a central management console that manages Trend Micro products and services at the gateway, mail server, file server, and corporate desktop levels.
Domain authentication
The authentication method for single sign-on (SSO) using Active Directory.
DriveTrust™
Hardware-based encryption technology by Seagate™.
Encryption Management for Microsoft BitLocker
The Endpoint Encryption Full Disk Encryption agent for Microsoft Windows environments that simply need to enable Microsoft BitLocker on the hosting endpoint.
Use the Encryption Management for Microsoft BitLocker agent to secure endpoints with Trend Micro full disk encryption protection in an existing Windows infrastructure.
For more information, see About Full Disk Encryption.
Encryption Management for Apple FileVault
The Endpoint Encryption Full Disk Encryption agent for Mac OS environments that simply need to enable Apple FileVault on the hosting endpoint.
Use the Encryption Management for Apple FileVault agent to secure endpoints with Trend Micro full disk encryption protection in an existing Mac OS infrastructure.
For more information, see About Full Disk Encryption.
Endpoint Encryption Device
Any computer, laptop, or removal media (external drive, USB drive) managed by Endpoint Encryption.
Endpoint Encryption Service
The PolicyServer service that securely manages all Endpoint Encryption 5.0 Patch 3 agent communication. For more information, see About PolicyServer.
For Endpoint Encryption 3.1.3 and below agent communication, see Legacy Web Service.
Enterprise
The Endpoint Encryption Enterprise is the unique identifier about the organization in the PolicyServer database configured when installing PolicyServer. One PolicyServer database may have multiple Enterprise configurations. However, Endpoint Encryption configurations using Control Manager may only have one Enterprise.
File Encryption
The Endpoint Encryption agent for file and folder encryption on local drives and removable media.
Use File Encryption to protect files and folders located on virtually any device that appears as a drive within the host operating system.
For more information, see About File Encryption.
FIPS
Federal Information Processing Standard. The computer security standard established by the United States federal government.
Fixed password
The authentication method for using a standard user password consisting of letters and/or numbers and/or special characters.
Full Disk Encryption
The Endpoint Encryption agent for hardware and software encryption with preboot authentication.
KeyArmor
The Endpoint Encryption password-protected, encrypted USB device.
Note
Note
Endpoint Encryption 5.0 does not have KeyArmor devices. However, legacy KeyArmor devices are supported.
Legacy Web Service
The PolicyServer service that securely manages all Endpoint Encryption 3.1.3 and below agent communication. For details, see About PolicyServer.
For Endpoint Encryption 5.0 Patch 3 communication, see Endpoint Encryption Service.
OCSP
Online Certificate Status Protocol. The protocol used for X.509 digital certificates.
OfficeScan
OfficeScan protects enterprise networks from malware, network viruses, web-based threats, spyware, and mixed threat attacks. An integrated solution, OfficeScan consists of an agent that resides at the endpoint and a server program that manages all agents.
OPAL
Trusted Computing Group's Security Subsystem Class for client devices.
Password
Any type of authentication data used in combination with a user name, such as fixed, PIN, and ColorCode.
PIN
The authentication method for using a Personal Identification Number, commonly used for ATM transactions.
PolicyServer
The central management server that deploys encryption and authentication policies to the Endpoint Encryption agents.
Remote Help
The authentication method for helping Endpoint Encryption users who forget their credentials or Endpoint Encryption devices that have not synchronized policies within a pre-determined amount of time.
Recovery Console
The Full Disk Encryption interface to recover Endpoint Encryption devices in the event of primary operating system failure, troubleshoot network issues, and manage users, policies, and logs.
Repair CD
The Full Disk Encryption bootable CD that can decrypt a drive before removing Full Disk Encryption in the event that the disk becomes corrupted.
RESTful
Representational State Transfer web API . The AES-GCM encrypted communications protocol used by Endpoint Encryption 5.0 agents. After a user authenticates, PolicyServer generates a token related to the specific policy configuration. Without authentication, the service denies all policy transactions.
Note
Note
For information about AES-GCM, visit: http://tools.ietf.org/html/rfc5084#ref-GCM%3F
RSA SecurID
A mechanism for performing two-factor authentication for a user to a network resource.
SED
Secure Encrypted Device. A hard drive, or other device, which is encrypted.
Self Help
The authentication method for helping Endpoint Encryption users provide answers to security questions instead of contacting Technical Support for password assistance.
Smart card
The authentication method requiring a physical card in conjunction with a PIN or fixed password.
SOAP
Simple Object Access Protocol. The encrypted communications protocol used by all Endpoint Encryption 3.1.3 and older agents to communicate with PolicyServer. Under certain situations, SOAP may allow insecure policy transactions without user authentication. Legacy Web Service filters SOAP calls by requiring authentication and limiting the commands that SOAP accepts.