McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Guida Utente Pagina 49

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 63
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 48
You can create different permission roles and assign them with different Endpoint Encryption Permission Sets
to different users.
Figure 5-1 Endpoint Encryption permission sets
To verify the configured permission sets, log off from ePolicy Orchestrator, then log on with a user
account that belongs to any one of the new roles.
Use correct format of the user name (domain\username) when logging on to ePolicy Orchestrator.
EEPC 7.0 Patch 1 scalability
Use these configurations, recommendations on components, and considerations for scalability.
ePolicy Orchestrator 4.6 Patch 4
EEPC 7.0 Patch 1
These considerations and settings will help improve scalability:
Operations and maintenance
EEPC 7.0 Patch 1 scalability
5
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
49
Vedere la pagina 48
1 2 ... 44 45 46 47 48 49 50 51 52 53 54 ... 62 63

Commenti su questo manuale

Nessun commento