web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
  • Online Help Center
  • Security for Endpoints
  • Endpoint Encryption
  • Endpoint Encryption 6.0 Administration Guide
  • Appendices
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Introduction
  • About Trend Micro Endpoint Encryption
    • Features and Benefits
    • What's New
    • About PolicyServer
    • Management Consoles
    • Endpoint Encryption Agents
    • Authentication Methods
  • Getting Started
    • System Requirements
      • PolicyServer System Requirements
      • PolicyServer MMC System Requirements
      • Full Disk Encryption System Requirements
        • Recommended Disk Combinations
      • File Encryption System Requirements
      • Encryption Management for Microsoft BitLocker System Requirements
      • Encryption Management for Apple FileVault System Requirements
    • Setting Up Control Manager
      • Control Manager Architecture
      • Adding PolicyServer as a Managed Product to Control Manager
      • Configuring Directory Management for PolicyServer
      • Configuring Proxy Settings
    • Active Directory Synchronization
      • Active Directory Overview
      • Configuring Active Directory
      • Importing Active Directory Users
      • Managing Password Setting Objects from Active Directory
  • Dashboard
    • Tabs
    • Widgets
    • Endpoint Encryption Users
    • Endpoint Encryption Devices
    • Full Disk Encryption Status
    • Endpoint Encryption Unsuccessful Device Logon
    • Endpoint Encryption Unsuccessful User Logon
    • Endpoint Encryption Device Lockout
    • Endpoint Encryption Security Violations Report
  • Policies
    • Authentication Overview
    • Policies in Control Manager
      • Policy Options
      • Policy Types
    • Creating a Policy
      • Specifying Policy Targets
    • Configuring Endpoint Encryption Users Rules
    • Configuring Full Disk Encryption Rules
    • Configuring File Encryption Rules
    • Configuring Common Policy Rules
    • Migrating Groups to Control Manager
  • Full Disk Encryption
    • Full Disk Encryption Tools
    • Full Disk Encryption Context Menu
    • Full Disk Encryption Preboot
      • Menu Options
      • Network Connectivity
        • Connecting to a Wireless Network
      • Network Information
      • On-Screen Keyboard
      • Changing the Keyboard Layout
      • Changing Authentication Methods
      • Changing Passwords
      • Remote Help
      • Smart Card
      • Self Help
    • Full Disk Encryption Policy Synchronization
    • Patch Management with Full Disk Encryption
  • File Encryption
    • Registering File Encryption
    • File Encryption Actions
      • Encrypting a File or Folder
      • Using File Encryption Secure Delete
    • File Encryption Context Menu
      • Changing Password in File Encryption
      • Using Remote Help to Unlock a File Encryption Device
    • File Encryption Authentication
      • Domain Authentication Requirements
      • Forced Password Reset
      • Endpoint Encryption Device Policy Rules
    • Policy Synchronization
  • Encryption Management for Third-Party Products
    • About Encryption Management Agents
    • Encryption Management Agent Policy Limitations
    • Encryption Management for Microsoft BitLocker
      • Viewing Encryption Status
      • Understanding Encryption Status
      • Understanding Agent Information
      • Synchronizing Policies with PolicyServer
        • Policy Synchronization
        • Synchronizing Policies from the About Screen
        • Synchronizing Policies From the System Tray
    • Encryption Management for Apple FileVault
      • Viewing Encryption Status
      • Understanding Encryption Status
      • Understanding Agent Information
      • Synchronizing Policies with PolicyServer
        • Policy Synchronization
        • Synchronizing Policies from the About Screen
        • Synchronizing Policies From the Menu Bar
      • Creating a Mobile Account for Active Directory on Mac OS
      • Troubleshooting Password and Encryption Issues
  • Recovery
    • Preboot Errors after Installation
    • Full Disk Encryption Recovery Methods
    • Recovery Console
      • Recovery Console Options
      • Accessing the Recovery Console from Full Disk Encryption Preboot
      • Accessing Recovery Console from Windows
      • Manage Disks Options
      • Encrypt Disks
      • Decrypt Disks
        • Using Decrypt Disk in Preboot
      • Mount Partitions
      • Restore Boot
      • Manage Full Disk Encryption Users
        • Editing Users
        • Adding Users
        • Deleting Users
      • Manage Policies
      • View Logs
      • Network
        • Managing Network Configuration
        • Migrating Full Disk Encryption to a New Enterprise
        • Changing the Full Disk Encryption PolicyServer
        • Configuring Wi-Fi Settings
        • Network Troubleshooting
    • Recovery Tool
      • Preparing the Recovery Tool
      • Scanning and Repairing a Disk
      • Using Extensive Repair
      • Recovery Tool Options
      • Advanced Functions
        • Using the File Explorer
    • Remote Help Assistance
  • Resolved and Known Issues
    • Resolved Issues
      • Resolved Issues in Endpoint Encryption 6.0
    • Known Issues
      • PolicyServer MMC Issues
      • Control Manager Integration Issues
      • Endpoint Encryption Deployment Tool Plug-in Issues
      • Full Disk Encryption Issues
      • File Encryption Issues
      • Encryption Management for Microsoft BitLocker Issues
      • Encryption Management for Apple FileVault Issues
  • Technical Support
    • Troubleshooting Resources
      • Using the Support Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
      • Documentation Feedback
  • Appendices
    • Maintenance Tools
      • Using the Diagnostics Monitor
      • Using the Log Server Tool
      • Using the PolicyServer Change Settings Tool
    • PolicyServer Message IDs
      • Administrator Alerts
      • Audit Log Alerts
      • Certificate Alerts
      • Device Alerts
      • Error Alerts
      • Full Disk Encryption Activity Alerts
      • Installation Alerts
      • Login / Logout Alerts
      • Mobile Device Alerts
      • OCSP Alerts
      • OTA Alerts
      • Password Alerts
      • PIN Change Alerts
      • Smart Card Alerts
    • Endpoint Encryption Services
    • Policy Mapping Between Management Consoles
    • Glossary
Appendices

  • Maintenance Tools
  • PolicyServer Message IDs
  • Endpoint Encryption Services
  • Policy Mapping Between Management Consoles
  • Glossary
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Introduction
  • About Trend Micro Endpoint Encryption
    • Features and Benefits
    • What's New
    • About PolicyServer
    • Management Consoles
    • Endpoint Encryption Agents
    • Authentication Methods
  • Getting Started
    • System Requirements
      • PolicyServer System Requirements
      • PolicyServer MMC System Requirements
      • Full Disk Encryption System Requirements
        • Recommended Disk Combinations
      • File Encryption System Requirements
      • Encryption Management for Microsoft BitLocker System Requirements
      • Encryption Management for Apple FileVault System Requirements
    • Setting Up Control Manager
      • Control Manager Architecture
      • Adding PolicyServer as a Managed Product to Control Manager
      • Configuring Directory Management for PolicyServer
      • Configuring Proxy Settings
    • Active Directory Synchronization
      • Active Directory Overview
      • Configuring Active Directory
      • Importing Active Directory Users
      • Managing Password Setting Objects from Active Directory
  • Dashboard
    • Tabs
    • Widgets
    • Endpoint Encryption Users
    • Endpoint Encryption Devices
    • Full Disk Encryption Status
    • Endpoint Encryption Unsuccessful Device Logon
    • Endpoint Encryption Unsuccessful User Logon
    • Endpoint Encryption Device Lockout
    • Endpoint Encryption Security Violations Report
  • Policies
    • Authentication Overview
    • Policies in Control Manager
      • Policy Options
      • Policy Types
    • Creating a Policy
      • Specifying Policy Targets
    • Configuring Endpoint Encryption Users Rules
    • Configuring Full Disk Encryption Rules
    • Configuring File Encryption Rules
    • Configuring Common Policy Rules
    • Migrating Groups to Control Manager
  • Full Disk Encryption
    • Full Disk Encryption Tools
    • Full Disk Encryption Context Menu
    • Full Disk Encryption Preboot
      • Menu Options
      • Network Connectivity
        • Connecting to a Wireless Network
      • Network Information
      • On-Screen Keyboard
      • Changing the Keyboard Layout
      • Changing Authentication Methods
      • Changing Passwords
      • Remote Help
      • Smart Card
      • Self Help
    • Full Disk Encryption Policy Synchronization
    • Patch Management with Full Disk Encryption
  • File Encryption
    • Registering File Encryption
    • File Encryption Actions
      • Encrypting a File or Folder
      • Using File Encryption Secure Delete
    • File Encryption Context Menu
      • Changing Password in File Encryption
      • Using Remote Help to Unlock a File Encryption Device
    • File Encryption Authentication
      • Domain Authentication Requirements
      • Forced Password Reset
      • Endpoint Encryption Device Policy Rules
    • Policy Synchronization
  • Encryption Management for Third-Party Products
    • About Encryption Management Agents
    • Encryption Management Agent Policy Limitations
    • Encryption Management for Microsoft BitLocker
      • Viewing Encryption Status
      • Understanding Encryption Status
      • Understanding Agent Information
      • Synchronizing Policies with PolicyServer
        • Policy Synchronization
        • Synchronizing Policies from the About Screen
        • Synchronizing Policies From the System Tray
    • Encryption Management for Apple FileVault
      • Viewing Encryption Status
      • Understanding Encryption Status
      • Understanding Agent Information
      • Synchronizing Policies with PolicyServer
        • Policy Synchronization
        • Synchronizing Policies from the About Screen
        • Synchronizing Policies From the Menu Bar
      • Creating a Mobile Account for Active Directory on Mac OS
      • Troubleshooting Password and Encryption Issues
  • Recovery
    • Preboot Errors after Installation
    • Full Disk Encryption Recovery Methods
    • Recovery Console
      • Recovery Console Options
      • Accessing the Recovery Console from Full Disk Encryption Preboot
      • Accessing Recovery Console from Windows
      • Manage Disks Options
      • Encrypt Disks
      • Decrypt Disks
        • Using Decrypt Disk in Preboot
      • Mount Partitions
      • Restore Boot
      • Manage Full Disk Encryption Users
        • Editing Users
        • Adding Users
        • Deleting Users
      • Manage Policies
      • View Logs
      • Network
        • Managing Network Configuration
        • Migrating Full Disk Encryption to a New Enterprise
        • Changing the Full Disk Encryption PolicyServer
        • Configuring Wi-Fi Settings
        • Network Troubleshooting
    • Recovery Tool
      • Preparing the Recovery Tool
      • Scanning and Repairing a Disk
      • Using Extensive Repair
      • Recovery Tool Options
      • Advanced Functions
        • Using the File Explorer
    • Remote Help Assistance
  • Resolved and Known Issues
    • Resolved Issues
      • Resolved Issues in Endpoint Encryption 6.0
    • Known Issues
      • PolicyServer MMC Issues
      • Control Manager Integration Issues
      • Endpoint Encryption Deployment Tool Plug-in Issues
      • Full Disk Encryption Issues
      • File Encryption Issues
      • Encryption Management for Microsoft BitLocker Issues
      • Encryption Management for Apple FileVault Issues
  • Technical Support
    • Troubleshooting Resources
      • Using the Support Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
      • Documentation Feedback
  • Appendices
    • Maintenance Tools
      • Using the Diagnostics Monitor
      • Using the Log Server Tool
      • Using the PolicyServer Change Settings Tool
    • PolicyServer Message IDs
      • Administrator Alerts
      • Audit Log Alerts
      • Certificate Alerts
      • Device Alerts
      • Error Alerts
      • Full Disk Encryption Activity Alerts
      • Installation Alerts
      • Login / Logout Alerts
      • Mobile Device Alerts
      • OCSP Alerts
      • OTA Alerts
      • Password Alerts
      • PIN Change Alerts
      • Smart Card Alerts
    • Endpoint Encryption Services
    • Policy Mapping Between Management Consoles
    • Glossary
Close