16
ZENworks Endpoint Security Client 4.0 User Guide
no
vd
ocx
(e
n)
13
Ma
y 20
09
3.2 Changing Locations
At startup, the Endpoint Security Client 4.0 switches to the Unknown location. It then attempts to
detect the current network environment and to change the location automatically. If the network
environment is either unrecognized, or has not been preset, the location must be changed manually.
If you cannot perform the following steps, your ZENworks Endpoint Security administrator might
have prevented you from changing locations manually.
To change a location:
1
Right-click the
Endpoint Security Client 4.0
icon in the taskbar to display a menu of choices.
2
Click the appropriate location.
3.3 Data Encryption
When activated by policy, the Endpoint Security Client 4.0 manages the encryption of files placed in
a specific directory on the endpoint and placed in removable storage devices.
The following instructions will assist you in using ZENworks Endpoint Security on the endpoint.
Section 3.3.1, “Managing Files on Non-System Volumes,” on page 16
Section 3.3.2, “Managing Files on Removable Storage,” on page 16
3.3.1 Managing Files on Non-System Volumes
Fixed disks are defined as all non-system volume drives installed on the computer, as well as any
partitions of a hard-disk drive. Each fixed disk on the endpoint has a “Safe Harbor” folder (by
default the folder is called
Encrypted Files
) and exists on each non-system volume or drive off
the root directory. All files placed in this folder are encrypted, using the current encryption key. Only
authorized users on the computer can decrypt these files.
When saving a file, select the Safe Harbor folder from the available folders on the desired drive.
3.3.2 Managing Files on Removable Storage
Removable storage is defined as any storage device that is “connected” to a computer. This includes
(but is not limited to) USB thumb drives, flash memory cards, and PCMCIA memory cards, along
with traditional Zip, floppy, and external CDR drives, digital cameras with storage capacity, and
MP3 players.
Summary of Contents for ZENworks Endpoint Security Client 4.0
Page 4: ...4 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Page 6: ...6 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Page 8: ...8 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...
Page 14: ...14 ZENworks Endpoint Security Client 4 0 User Guide novdocx en 13 May 2009...