Only your private key can decrypt and verifies yoursigned messages.Boot sectors, system files, and swap files are all encrypted.Encrypting your boot drive means you do not have to worry ifyour computer is lost or stolen: to access your data, anattacker would need the appropriate passphrase.Your keyring holds both your keypairs and the public keys ofothers, which you use to send encrypted messages to them.Click the PGP Keys Control Box to see the keys on yourkeyring:1The icon for a PGP keypair has two keys, denoting theprivate and the public key. Your public key encrypts messages that Starting Symantec Encryption Desktop (page 3) The Symantec Encryption Desktop Main Screen (page 3) Using Symantec Desktop Email Encryption (page 4) Using PGP Viewer (page 5)1 Your public key you can give to everyone. Your private key decryptsincoming encrypted messages and signs outgoingmessages. If someone gets your private key and itspassphrase, they can read your messages andimpersonate you to others. What Am I Installing? (page 2) System Requirements Installing Symantec Encryption Desktop (page 2) Keep your private key and its passphrase private, as thename suggests. A keypair is the combination of aprivate key and a public key. New to Symantec Encryption Desktop? (page 1) Understanding the Basics (page 1)After installation, Symantec Encryption Desktop prompts youto create a PGP keypair. For deployment, management, and policy enforcementinformation for Symantec Encryption Desktop, see theSymantec Encryption Server Administrator’s Guide.Understanding the BasicsContents What is Symantec Encryption Desktop? (page 1)Symantec Encryption Desktop uses keys to encrypt, sign,decrypt, and verify your messages. Completely destroy files and folders so that nothing canrecover them. Formore information, see the Licensing section of theSymantec Encryption Desktop User’s Guide.In addition, use Symantec Encryption Desktop to: Use part of your hard drive space as an encrypted virtualdisk volume with its own drive letter. Certain other features of SymantecEncryption Desktop may require a different license. In it, you will learn what a keypair is, why youmight want to create one, how to create one, and how toexchange keys with others so you can encrypt your owndata and share data securely with others.Use Symantec File Share Encryption to let authorized usersshare protected files in a shared space-such as a file server,shared folder, or USB removable drive.Symantec Drive EncryptionSymantec Drive Encryption is used to lock down the entirecontents of your system or an external or USB flash drive youspecify.Note: A Symantec Encryption Desktop license providesyou with access to a certain set of Symantec EncryptionDesktop features. The Symantec Encryption Desktop User’s Guide providesmore detailed information on Symantec EncryptionDesktop. You will find that,with Symantec Encryption Desktop, protecting your data willbe as easy as turning a key in a lock.Symantec File Share Encryption This Quick Start Guide helps you install SymantecEncryption Desktop and get started. Creating PGP Virtual Disk Volumes (page 10) Creating a PGP Zip Archive (page 11) Using PGP Shredder to Shred Files (page 11) Getting Assistance (page 12)Symantec Desktop Email EncryptionNew to Symantec Encryption Desktop?Use Symantec Desktop Email Encryption to automatically andtransparently encrypt, sign, decrypt, and verify emailmessage through policies you defined for you byadministrators, or policies you control if you are not part of aSymantec Encryption Server-managed environment.Use this step-by-step guide to get started. ![]() ![]() This award winning,easy-to-use solution encrypts email, files, virtual volumes,and entire disks from a single desktop application. ![]() Symantec Encryption Desktop forWindowsQuick Start GuideVersion 10.4 Using Symantec File Share Encryption (page 6)What is Symantec Encryption Desktop? Using Symantec Drive Encryption to Encrypt a Drive (page 7) Symantec Encryption Desktop provides comprehensivesecurity for desktops and laptops, making it possible forenterprises, workgroups, and individuals to protect sensitiveinformation without changing the existing IT infrastructureor disrupting work processes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |