![Check Point Pointsec PC Скачать руководство пользователя страница 37](http://html1.mh-extra.com/html/check-point/pointsec-pc/pointsec-pc_installation-manual_2594794037.webp)
Specifying Volumes, Encryption Methods, and the Recovery Path
Chapter 2 Installing Pointsec PC for Administrators
31
Configure the following settings:
Table 2-2
Setting
Explanation
Volumes
From the volumes listed, select the volumes you want Pointsec PC to
protect; you can select a maximum of twelve volumes.
Note:
In a Common Criteria validated environment, all volumes must be
selected for protection.
Note:
Never use volume/disk partition editing software with Pointsec PC
installed on the workstation. If you need to resize a partition, remove
Pointsec PC completely first and then resize the partition. Otherwise,
resizing might cause loss of data.
Boot Protection
Select this option to implement user authentication at boot level on the
specified volume.
Note:
In a Common Criteria validated environment, this setting must be
selected.
Encryption
Select this option to encrypt the volumes selected.
Algorithm
Select the encryption algorithm you want to use.
Note:
You must use the same algorithm for all volumes on the same
computer.
Note:
In a Common Criteria-validated environment either 168 bits 3DES
(FIPS 46-3) or 256 bits AES (FIPS 197) must be selected.
Содержание Pointsec PC
Страница 1: ...Pointsec PC Installation Guide Version 6 3 1 B November 5 2008...
Страница 2: ......
Страница 4: ......
Страница 6: ...ii...
Страница 12: ...Who To Contact in the Case of an Unsuccessful Delivery 6...