Users Guide

& 1 e WLA O#- 3d
%LMB foB VB qnO: /f!- El _dQ !!& vOB Zx _ O*TO
Y. 8HG _d:L N"GB vG!- L/Q %LM& 8#Om L! kQ W<:&
&nOg %LM b3& .NOB ?C! !k:;/v8vOB bIL !e l
1CG
m V@OY. %LM O#-B L/Q 9: d8! kX d; Y v VB 58TOY.
Dell Encryption Key Manager(LDNB Encryption Key ManagerN v*T))B O
#- [w; \x-UOY.
LTO 4 W LTO 5 esLjB LTO 4 W LTO 5 %LM +..v! %LM& 2B
fl Xg %LM& O#-R v V@OY. L u
Nn bI: -v!-v`GB O#
-N NQ :I zO W 3. @vleG _} W |k b8! kQ qk; vbOv
Jm5 zeH%LM! kQ -BQ 8H v\; _!UOY.
WLA esLj O#- VgG: Y=z0: < !vVddRN 8:KOY.
O#- !I
Q WLA esLj
pg LTO 4 W LTO 5 WLA esLjB sLj/. NMdL:& kX gkI
v Vn_ UOY.
WLA esLj! kQ Z<Q $8B 2-2 dLvG :Oe~n W RA.~n d
8gW;; |6OJC@.
O#- 0 |.
O#-B OCG ,SH
h~!- )/ >yG 0 gkz|CLV@OY. L/Q
0G }:, /v8v, &n W |[: O#-OB WLA esLj! 3!H n5
/f! {s Y(OY. ON @kANW%: 0 |.& v`R v V@OY. L/
Q @kANW%L xB /f GB @kAN
W%! >SGv JB O#-! JdQ
/fG fl, Dell Encryption Key Manager!- JdQ pg 0 |. [w; v
`R v V@OY. 1-3 dLvG :O#- |.;!- L/Q [w;Z<w 3mU
OY.
O#- $%
O#-& 8vOB % gkGB f}TOY. )b!B 0 1C ^?Or W O#-
OB
<}; &nOB T"L wTKOY. L/Q T"; 3$OB f} W '!B
n5 /f! {s Y(OY. Z<Q $8B 1-3 dLvG :O#- |.;& |6O
JC@.
1-1
|
|