You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Introduction
About Trend Micro Endpoint Encryption
What's New
About PolicyServer
Management Consoles
Endpoint Encryption Agents
Authentication Methods
Getting Started
System Requirements
PolicyServer System Requirements
PolicyServer MMC System Requirements
Full Disk Encryption System Requirements
Recommended Disk Combinations
File Encryption System Requirements
Encryption Management for Microsoft BitLocker System Requirements
Encryption Management for Apple FileVault System Requirements
Setting Up Control Manager
Control Manager Architecture
Adding PolicyServer as a Managed Product to Control Manager
Configuring Directory Management for PolicyServer
Configuring Proxy Settings
Active Directory Synchronization
Active Directory Overview
Configuring Active Directory
Importing Active Directory Users
Managing Password Setting Objects from Active Directory
Dashboard
Tabs
Widgets
Endpoint Encryption Users
Endpoint Encryption Devices
Full Disk Encryption Status
Endpoint Encryption Unsuccessful Device Logon
Endpoint Encryption Unsuccessful User Logon
Endpoint Encryption Device Lockout
Endpoint Encryption Security Violations Report
Policies
Authentication Overview
Policies in Control Manager
Policy Options
Policy Types
Creating a Policy
Specifying Policy Targets
Configuring Endpoint Encryption Users Rules
Configuring Full Disk Encryption Rules
Configuring File Encryption Rules
Configuring Common Policy Rules
Migrating Groups to Control Manager
Encryption Management for Third-Party Products
About Encryption Management Agents
Encryption Management Agent Policy Limitations
Encryption Management for Microsoft BitLocker
Viewing Encryption Status
Understanding Encryption Status
Understanding Agent Information
Synchronizing Policies with PolicyServer
Policy Synchronization
Synchronizing Policies from the About Screen
Synchronizing Policies From the System Tray
Updating PolicyServer Settings
Encryption Management for Apple FileVault
Viewing Encryption Status
Understanding Encryption Status
Understanding Agent Information
Synchronizing Policies with PolicyServer
Policy Synchronization
Synchronizing Policies from the About Screen
Synchronizing Policies From the Menu Bar
Updating PolicyServer Settings
Creating a Mobile Account for Active Directory on Mac OS
Troubleshooting Password and Encryption Issues
Full Disk Encryption (Deprecated)
Full Disk Encryption Tools
Full Disk Encryption Context Menu
Full Disk Encryption Preboot
Menu Options
Network Connectivity
Connecting to a Wireless Network
Network Information
On-Screen Keyboard
Changing the Keyboard Layout
Changing Authentication Methods
Changing Passwords
Remote Help
Smart Card
Self Help
Skipping the Preboot Screen
Full Disk Encryption Policy Synchronization
Patch Management with Full Disk Encryption
File Encryption (Deprecated)
Registering File Encryption
File Encryption Actions
Encrypting a File or Folder
Using File Encryption Secure Delete
File Encryption Context Menu
Changing Password in File Encryption
Using Remote Help to Unlock a File Encryption Device
File Encryption Authentication
Domain Authentication Requirements
Forced Password Reset
Endpoint Encryption Device Policy Rules
Policy Synchronization
Recovery
Preboot Errors after Installation
Full Disk Encryption Recovery Methods
Recovery Console
Recovery Console Options
Accessing the Recovery Console from Full Disk Encryption Preboot
Accessing Recovery Console from Windows
Manage Disks Options
Encrypt Disks
Decrypt Disks
Using Decrypt Disk in Preboot
Mount Partitions
Restore Boot
Manage Full Disk Encryption Users
Editing Users
Adding Users
Deleting Users
Manage Policies
View Logs
Network
Managing Network Configuration
Migrating Full Disk Encryption to a New Enterprise
Changing the Full Disk Encryption PolicyServer
Configuring Wi-Fi Settings
Network Troubleshooting
Recovery Tool
Preparing the Recovery Tool
Scanning and Repairing a Disk
Using Extensive Repair
Recovery Tool Options
Advanced Functions
Using the File Explorer
Remote Help Assistance
Resolved and Known Issues
Resolved Issues
Known Issues
Technical support
Troubleshooting resources
Using the support portal
Threat encyclopedia
Contacting Trend Micro
Speeding up the support call
Sending suspicious content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other resources
Download center
Appendices
Maintenance Tools
Using the Diagnostics Monitor
Using the Log Server Tool
Using the PolicyServer Change Settings Tool
PolicyServer Message IDs
Endpoint Encryption Services
Policy Mapping Between Management Consoles
Glossary
Network
Go to
Network
→
Setup
to verify, test, and/or change the network settings that are used by Full Disk Encryption Preboot.
Go to
Network
→
Troubleshooting
to view DHCP logs and run trace route commands.
Related information
Managing Network Configuration
Migrating Full Disk Encryption to a New Enterprise
Changing the Full Disk Encryption PolicyServer
Configuring Wi-Fi Settings
Network Troubleshooting
Table of Contents
Introduction
About Trend Micro Endpoint Encryption
What's New
About PolicyServer
Management Consoles
Endpoint Encryption Agents
Authentication Methods
Getting Started
System Requirements
PolicyServer System Requirements
PolicyServer MMC System Requirements
Full Disk Encryption System Requirements
Recommended Disk Combinations
File Encryption System Requirements
Encryption Management for Microsoft BitLocker System Requirements
Encryption Management for Apple FileVault System Requirements
Setting Up Control Manager
Control Manager Architecture
Adding PolicyServer as a Managed Product to Control Manager
Configuring Directory Management for PolicyServer
Configuring Proxy Settings
Active Directory Synchronization
Active Directory Overview
Configuring Active Directory
Importing Active Directory Users
Managing Password Setting Objects from Active Directory
Dashboard
Tabs
Widgets
Endpoint Encryption Users
Endpoint Encryption Devices
Full Disk Encryption Status
Endpoint Encryption Unsuccessful Device Logon
Endpoint Encryption Unsuccessful User Logon
Endpoint Encryption Device Lockout
Endpoint Encryption Security Violations Report
Policies
Authentication Overview
Policies in Control Manager
Policy Options
Policy Types
Creating a Policy
Specifying Policy Targets
Configuring Endpoint Encryption Users Rules
Configuring Full Disk Encryption Rules
Configuring File Encryption Rules
Configuring Common Policy Rules
Migrating Groups to Control Manager
Encryption Management for Third-Party Products
About Encryption Management Agents
Encryption Management Agent Policy Limitations
Encryption Management for Microsoft BitLocker
Viewing Encryption Status
Understanding Encryption Status
Understanding Agent Information
Synchronizing Policies with PolicyServer
Policy Synchronization
Synchronizing Policies from the About Screen
Synchronizing Policies From the System Tray
Updating PolicyServer Settings
Encryption Management for Apple FileVault
Viewing Encryption Status
Understanding Encryption Status
Understanding Agent Information
Synchronizing Policies with PolicyServer
Policy Synchronization
Synchronizing Policies from the About Screen
Synchronizing Policies From the Menu Bar
Updating PolicyServer Settings
Creating a Mobile Account for Active Directory on Mac OS
Troubleshooting Password and Encryption Issues
Full Disk Encryption (Deprecated)
Full Disk Encryption Tools
Full Disk Encryption Context Menu
Full Disk Encryption Preboot
Menu Options
Network Connectivity
Connecting to a Wireless Network
Network Information
On-Screen Keyboard
Changing the Keyboard Layout
Changing Authentication Methods
Changing Passwords
Remote Help
Smart Card
Self Help
Skipping the Preboot Screen
Full Disk Encryption Policy Synchronization
Patch Management with Full Disk Encryption
File Encryption (Deprecated)
Registering File Encryption
File Encryption Actions
Encrypting a File or Folder
Using File Encryption Secure Delete
File Encryption Context Menu
Changing Password in File Encryption
Using Remote Help to Unlock a File Encryption Device
File Encryption Authentication
Domain Authentication Requirements
Forced Password Reset
Endpoint Encryption Device Policy Rules
Policy Synchronization
Recovery
Preboot Errors after Installation
Full Disk Encryption Recovery Methods
Recovery Console
Recovery Console Options
Accessing the Recovery Console from Full Disk Encryption Preboot
Accessing Recovery Console from Windows
Manage Disks Options
Encrypt Disks
Decrypt Disks
Using Decrypt Disk in Preboot
Mount Partitions
Restore Boot
Manage Full Disk Encryption Users
Editing Users
Adding Users
Deleting Users
Manage Policies
View Logs
Network
Managing Network Configuration
Migrating Full Disk Encryption to a New Enterprise
Changing the Full Disk Encryption PolicyServer
Configuring Wi-Fi Settings
Network Troubleshooting
Recovery Tool
Preparing the Recovery Tool
Scanning and Repairing a Disk
Using Extensive Repair
Recovery Tool Options
Advanced Functions
Using the File Explorer
Remote Help Assistance
Resolved and Known Issues
Resolved Issues
Known Issues
Technical support
Troubleshooting resources
Using the support portal
Threat encyclopedia
Contacting Trend Micro
Speeding up the support call
Sending suspicious content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other resources
Download center
Appendices
Maintenance Tools
Using the Diagnostics Monitor
Using the Log Server Tool
Using the PolicyServer Change Settings Tool
PolicyServer Message IDs
Endpoint Encryption Services
Policy Mapping Between Management Consoles
Glossary