Term | Description | ||
---|---|---|---|
Agent
|
Software installed on an endpoint that communicates with a management server.
|
||
Authentication
|
The process of identifying a user.
|
||
ColorCode™
|
The authentication method requiring a color-sequence password.
|
||
Command Line Helper
|
A Trend Micro tool for creating encrypted values to secure
credentials when creating Endpoint Encryption agent installation scripts.
|
||
Command Line Installer Helper
|
A Trend Micro tool for creating encrypted values to secure
credentials when creating Endpoint Encryption agent installation scripts.
|
||
Control Manager
|
Trend Micro
Control Manager is a central management console that manages Trend Micro products and services at the gateway, mail server, file server, and
corporate desktop levels.
|
||
Domain authentication
|
The authentication method for single sign-on (SSO) using Active Directory.
|
||
DriveTrust™
|
Hardware-based encryption technology by Seagate™.
|
||
Encryption Management for Microsoft
BitLocker
|
The Endpoint Encryption
Full Disk Encryption agent for Microsoft
Windows environments that simply need to enable Microsoft BitLocker on the hosting
endpoint.
Use the Encryption Management for Microsoft
BitLocker agent to secure
endpoints with Trend Micro full disk encryption
protection in an existing Windows infrastructure.
For more information, see About Full Disk Encryption.
|
||
Encryption Management for Apple
FileVault
|
The Endpoint Encryption
Full Disk Encryption agent for Mac OS
environments that simply need to enable Apple FileVault on the hosting
endpoint.
Use the Encryption Management for Apple
FileVault agent to secure
endpoints with Trend Micro full disk encryption
protection in an existing Mac OS infrastructure.
For more information, see About Full Disk Encryption.
|
||
Endpoint Encryption Device |
Any computer, laptop, or removal media (external drive, USB drive) managed by Endpoint Encryption.
|
||
Endpoint Encryption Service
|
The PolicyServer service that securely manages all Endpoint Encryption
5.0 agent communication. For more information, see About PolicyServer.
For Endpoint Encryption 3.1.3 and below agent
communication, see Legacy Web Service.
|
||
Enterprise
|
The Endpoint Encryption Enterprise is the unique identifier about the
organization in the PolicyServer database configured when installing
PolicyServer. One PolicyServer
database may have multiple Enterprise configurations. However, Endpoint Encryption configurations using Control Manager may only
have one Enterprise.
|
||
File Encryption
|
The Endpoint Encryption agent for file and folder
encryption on local drives and removable media.
Use File Encryption to protect files and folders located on virtually any device
that appears as a drive within the host operating system.
For more information, see About File Encryption.
|
||
FIPS
|
Federal Information Processing Standard. The computer security standard established
by the United
States federal government.
|
||
Fixed password
|
The authentication method for using a standard user password consisting of letters
and/or numbers
and/or special characters.
|
||
Full Disk Encryption
|
The Endpoint Encryption
agent for hardware and software encryption with preboot authentication.
|
||
KeyArmor
|
The Endpoint Encryption password-protected, encrypted
USB device.
|
||
Legacy Web Service
|
The PolicyServer service that securely manages all Endpoint Encryption 3.1.3 and below agent communication. For
details, see About PolicyServer.
For Endpoint Encryption
5.0 communication, see Endpoint Encryption Service.
|
||
OCSP
|
Online Certificate Status Protocol. The protocol used for X.509 digital certificates.
|
||
OfficeScan
|
OfficeScan protects enterprise
networks from malware, network viruses, web-based threats, spyware, and mixed threat
attacks. An integrated solution, OfficeScan consists of an
agent that resides at the endpoint and a server program that manages all agents.
|
||
OPAL
|
Trusted Computing Group's Security Subsystem
Class for client devices.
|
||
Password
|
Any type of authentication data used in combination with a user name, such as fixed,
PIN, and
ColorCode.
|
||
PIN
|
The authentication method for using a Personal Identification Number, commonly used
for ATM
transactions.
|
||
PolicyServer
|
The central management server that deploys encryption and authentication policies
to the Endpoint Encryption agents.
|
||
Remote Help
|
The authentication method for helping Endpoint Encryption users who forget
their credentials or Endpoint Encryption devices that have not synchronized
policies within a pre-determined amount of time.
|
||
Recovery Console
|
The Full Disk Encryption interface to recover Endpoint Encryption devices in the event of primary operating system failure, troubleshoot network issues, and manage users, policies, and logs. | ||
Repair CD
|
The Full Disk Encryption bootable CD that can decrypt a drive before removing Full Disk Encryption in the event that the disk becomes corrupted. | ||
RESTful
|
Representational State Transfer web API . The AES-GCM encrypted communications protocol
used by
Endpoint Encryption 5.0 agents. After a user authenticates, PolicyServer generates a token related to the specific policy configuration.
Without authentication, the service denies all policy transactions.
|
||
RSA SecurID
|
A mechanism for performing two-factor authentication for a user to a network resource. | ||
SED
|
Secure Encrypted Device. A hard drive, or other device, which is encrypted.
|
||
Self Help
|
The authentication method for helping Endpoint Encryption users provide
answers to security questions instead of contacting Technical Support for password
assistance.
|
||
Smart card
|
The authentication method requiring a physical card in conjunction with a PIN or fixed
password.
|
||
SOAP
|
Simple Object Access Protocol. The encrypted communications protocol used by all Endpoint Encryption 3.1.3 and older agents to communicate with PolicyServer. Under certain situations, SOAP may allow insecure policy
transactions without user authentication. Legacy Web Service filters SOAP calls by
requiring
authentication and limiting the commands that SOAP accepts.
|