Dell Data Protection

22 Administrator Guide
To view effective polices, in the Actions area, click
View Effective Policies
.
7
Click the
Security Policies
tab. The following tasks can be completed from this tab:
Expand the types of policies as desired. Change individual policies as desired. When finished, click
Save
. In the left pane,
click
Actions
>
Commit Policies
. Click
Apply Changes
.
8
Click the
Users
tab. This area displays a list of users activated on this Mac computer. Click the user’s detail icon to
display the information for all computers this user is activated against.
9
Click the
Endpoint Groups
tab. This area displays all of the endpoint groups to which this Mac computer belong.
User Experience
For maximum security, the client software disables the
Automatic Login
feature of Mac OS X computers.
Additionally, the client software automatically enforces the Mac OS X feature
require password after sleep or screen saver
begins
. Lion (and later) enhances this setting by allowing a configurable amount of time in sleep/screen saver mode before
enforcing authentication. The client software allows a user to set a value up to five minutes before authentication is
enforced.
Users can use the computer normally as the encryption sweep progresses. All data on the currently booted system volume
is being encrypted, including the operating system, while the operating system continues to operate.
If the computer is restarted or enters system sleep, the encryption sweep pauses and then automatically resumes after the
restart or wake.
The client software does not support the use of hibernation images, which the Mac OS X
Safe Sleep
feature uses to wake
the computer if the battery is fully discharged during sleep.
To reduce user impact, the client software automatically updates the system sleep mode to disable hibernation and
enforces this setting. The computer can still enter sleep, but the current system state will be maintained only in memory.
Therefore, the computer will be fully restarted if completely shut down during sleep, which could occur if the battery runs
down or is replaced.
Recovery
Occasionally, you may need access to data on encrypted disks. As a
Dell
Administrator, you can access encrypted disks
without decrypting them, saving you valuable time.
You might need to access a user’s encrypted data for many reasons, but a few common use cases are as follows:
You may need to move a user’s encrypted data to a different Mac as part of a hardware refresh.
You may need to access an encrypted disk because of an operating system fault that causes the system volume to no
longer boot, and you need to run various utilities to repair the operating system.
You may need to access a user’s encrypted data because the user made an unauthorized configuration change, and you
need to remedy the situation.
This section guides you through the process of using one of the three recovery operations available.
Choose one option below:
Mount Volume
Accept New System Configuration
FileVault Recovery - use only if using FileVault encryption on the endpoint to be recovered. FileVault can be used with
Dell Data Protection | Enterprise Edition v7.4 or later running on Mac OS X 10.7 or later. FileVault recovery is also used
on fusion drives.