12.07.2015 Views

Endpoint Encryption for Files and Folders 3.2.1 Quick Start ... - McAfee

Endpoint Encryption for Files and Folders 3.2.1 Quick Start ... - McAfee

Endpoint Encryption for Files and Folders 3.2.1 Quick Start ... - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Creating <strong>Encryption</strong> KeysCreating <strong>Encryption</strong> KeysFor more detailed in<strong>for</strong>mation about keys, see the <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>Files</strong> <strong>and</strong><strong>Folders</strong> Administrator’s Guide.<strong>Encryption</strong> keys are used to protect data. They mathematically “scramble” the data inthe file to prevent anyone from reading it. Without access to the encryption key usedto scramble the data, you will not be able to underst<strong>and</strong> it. You can give access toparticular keys to certain users. This method lets you make data available only tocertain individuals.With <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>Files</strong> <strong>and</strong> <strong>Folders</strong> , you can create many keys to protectdifferent classes of data. For example, if you want to protect in<strong>for</strong>mation thatexecutives use from lower tiers of managers, you could create the following set ofkeys:KeyExecutives KeyCountry Managers KeyFunctional Managers KeyAccounting <strong>and</strong> Finance KeyUsersExecutive Management, Board of DirectorsExecutive Management, Country ManagersExecutive Management, Country Managers,Functional ManagersExecutive Management, Accounting <strong>and</strong> FinancedepartmentsCreating a new encryption keyFollow the schema on the next pages to create a new encryption key.| 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!