Software Token
|
Generating a software token creates a unique
string that you can use to unlock Endpoint Encryption devices
and to remotely help Endpoint Encryption users reset
forgotten passwords.
|
Recovery Key
|
Generating
a recovery key allows the user to decrypt a hard disk when the user has forgotten the
original password or key. The recovery key is only available to Encryption Management for Apple
FileVault and Encryption Management for Microsoft
BitLocker
agents because they do not use the other recovery methods available in Full Disk Encryption.
|
Kill device
|
Initiating
a kill command deletes all Endpoint Encryption device data. The
deleted data is different depending on the scope of data that the associated Endpoint Encryption agent manages. For example, initiating a kill
command to a Full Disk Encryption device deletes all data from the
endpoint, while initiating a kill command to a File Encryption
device deletes all files and folders in local or removable storage protected by the
File Encryption agent. The kill command is issued when the Endpoint Encryption agent communicates with PolicyServer.
|
Lock device
|
Initiating a lock command to the Endpoint Encryption device prevents Endpoint Encryption
user access until after performing a successful Remote Help authentication. Locking
a device
reboots the endpoint and forces it into a state that requires Remote Help. The lock
command is
issued when the Endpoint Encryption agent communicates with PolicyServer.
|
Soft reset
|
Initiating a
soft reset command reboots the endpoint. The command issues the next time that the
agent communicates with PolicyServer.
|