The following table explains the terminology used throughout the Endpoint Encryption documentation.
Term |
Description |
---|---|
Agent |
Software installed on an endpoint that communicates with a management server. |
Authentication |
The process of identifying a user. |
ColorCode™ |
The authentication method requiring a color-sequence password. |
Command Builder |
A Trend Micro tool to generate scripts used to install PolicyServer and Endpoint Encryption agents for automatic or mass deployments. |
Command Line Helper |
A Trend Micro tool for creating encrypted values to secure credentials used by Endpoint Encryption agent installation scripts. |
Control Manager |
Trend Micro Control Manager is a central management console that manages Trend Micro products and services at the gateway, mail server, file server, and corporate desktop levels. |
Device |
Any computer, laptop, or removal media (external drive, USB drive) managed by Endpoint Encryption. |
Domain authentication |
The authentication method for single sign-on (SSO) using Active Directory. |
DriveTrust™ |
Hardware-based encryption technology by Seagate™. |
Encryption Management for Microsoft BitLocker |
The Endpoint Encryption Full Disk Encryption agent for Microsoft Windows environments that simply need to enable Microsoft BitLocker on the hosting endpoint. Use the Encryption Management for Microsoft BitLocker agent to secure endpoints with Trend Micro full disk encryption protection in an existing Windows infrastructure. |
Encryption Management for Apple FileVault |
The Endpoint Encryption Full Disk Encryption agent for Mac OS environments that simply need to enable Apple FileVault on the hosting endpoint. Use the Encryption Management for Apple FileVault agent to secure endpoints with Trend Micro full disk encryption protection in an existing Mac OS infrastructure. |
Endpoint Encryption Service |
The PolicyServer service that securely manages all Endpoint Encryption 6.0 agent communication. For Endpoint Encryption 3.1.3 and below agent communication, see Legacy Web Service. |
Enterprise |
The Endpoint Encryption Enterprise is the unique identifier about the organization in the PolicyServer database configured during PolicyServer installation. One PolicyServer database may have multiple Enterprise configurations. However, Endpoint Encryption configurations using Control Manager may only have one Enterprise. |
File Encryption |
The Endpoint Encryption agent for file and folder encryption on local drives and removable media. Use File Encryption to protect files and folders located on virtually any device that appears as a drive within the host operating system. |
Fixed password |
The authentication method for using a standard user password consisting of letters and/or numbers and/or special characters. |
Full Disk Encryption |
The Endpoint Encryption agent for hardware and software encryption with preboot authentication. Full Disk Encryption secures data files, applications, registry settings, temporary files, swap files, print spoolers, and deleted files on any Windows endpoint. Strong preboot authentication restricts access vulnerabilities until the user is validated. |
Legacy Web Service |
The PolicyServer service that securely manages all Endpoint Encryption 3.1.3 and below agent communication. For details, see About PolicyServer. For Endpoint Encryption 6.0 communication, see Endpoint Encryption Service. |
OfficeScan |
OfficeScan protects enterprise networks from malware, network viruses, web-based threats, spyware, and mixed threat attacks. An integrated solution, OfficeScan consists of an agent that resides at the endpoint and a server program that manages all agents. |
OPAL |
Trusted Computing Group's Security Subsystem Class for client devices. |
Password |
Any type of authentication data used in combination with a user name, such as fixed, PIN, and ColorCode. |
PIN |
The authentication method for using a Personal Identification Number, commonly used for ATM transactions. |
PolicyServer |
The central management server that deploys encryption and authentication policies to the Endpoint Encryption agents. |
Remote Help |
The authentication method for helping Endpoint Encryption users who forget their credentials or Endpoint Encryption devices that have not synchronized policies within a pre-determined amount of time. |
Recovery Console |
The Full Disk Encryption interface to recover Endpoint Encryption devices in the event of primary operating system failure, troubleshoot network issues, and manage users, policies, and logs. |
Recovery Tool |
A bootable disk used to repair a device if the device is unable to boot. The Recovery Tool is distributed as an ISO file in the Full Disk Encryption installation package. |
SED |
A self-encrypting drive. SEDs provide "hardware-based encryption", as opposed to the type of encryption that Full Disk Encryption provides, which is referred to as "software-based encryption". |
Self Help |
The authentication method for helping Endpoint Encryption users provide answers to security questions instead of contacting Technical Support for password assistance. |
Smart card |
The authentication method requiring a physical card in conjunction with a PIN or fixed password. |