Chapter 11: securelaunch, Chapter 12: securesuite program maintenance, Appendix 1: troubleshooting – Sony FIU-900 User Manual
Page 5: Appendix 2: glossary, Appendix 3: a table of securesuite policies
S
ECURING A
F
ILE OR
F
OLDER
....................................................................................................... 84
S
ECURE
F
OLDER
E
MERGENCY
R
ECOVERY
U
TILITY
...................................................................... 85
Choosing your Emergency Recovery Passphrase ........................................................ 85
Changing your Emergency Recovery Passphrase........................................................ 86
Disabling the Emergency Recovery Utility .................................................................. 87
S
ECURE
F
OLDER
S
HARING
............................................................................................................. 88
W
ORKING WITH
S
ECURED
F
ILES AND
F
OLDERS
........................................................................... 90
R
EMOVING
S
ECURITY
F
ROM A
F
ILE OR
F
OLDER
.......................................................................... 91
Chapter 11: SecureLaunch............................................................ 92
S
ETTING
U
SER
R
ESTRICTIONS
...................................................................................................... 92
Changing User Restrictions ......................................................................................... 97
R
EMOVING
U
SER
R
ESTRICTIONS
.................................................................................................. 98
S
ECURE
L
AUNCH
A
CCESS
P
OLICY
R
ULES
................................................................................... 100
Chapter 12: SecureSuite Program Maintenance ....................... 101
C
HANGING YOUR
C
ONFIGURATION
............................................................................................ 101
Installing OEM Device Modules ................................................................................ 102
Removing OEM Device Modules................................................................................ 104
U
NINSTALLING
S
ECURE
S
UITE
XS W
ORKSTATION
..................................................................... 106
Appendix 1: Troubleshooting...................................................... 107
C
OMMON
U
SER
P
ROBLEMS
......................................................................................................... 107
Appendix 2: Glossary .................................................................. 109
Appendix 3: A Table of SecureSuite Policies ............................ 115
D
OMAIN
/S
YSTEM
-L
EVEL
S
ECURE
S
UITE
P
OLICIES
..................................................................... 115
P
OLICY
........................................................................................................................................ 115
A
VAILABLE
S
ETTINGS
................................................................................................................. 115
L
IMITS SETTINGS OF
…................................................................................................................ 115
D
EPENDS ON SETTING OF
… ........................................................................................................ 115
U
SER
-L
EVEL
S
ECURE
S
UITE
P
OLICIES
......................................................................................... 116
P
OLICY
........................................................................................................................................ 116
A
VAILABLE
S
ETTINGS
................................................................................................................. 116
L
IMITS SETTINGS OF
…................................................................................................................ 116
D
EPENDS ON SETTING OF
… ........................................................................................................ 116
U
SER
-L
EVEL
S
ECURE
F
OLDER
P
OLICIES
..................................................................................... 116
P
OLICY
........................................................................................................................................ 116
A
VAILABLE
S
ETTINGS
................................................................................................................. 116
L
IMITS SETTINGS OF
…................................................................................................................ 116
D
EPENDS ON SETTING OF
… ........................................................................................................ 116
D
OMAIN
/S
YSTEM
-L
EVEL
S
ECURE
F
OLDER
P
OLICIES
.................................................................. 117
P
OLICY
........................................................................................................................................ 117
A
VAILABLE
S
ETTINGS
................................................................................................................. 117
L
IMITS SETTINGS OF
…................................................................................................................ 117
D
EPENDS ON SETTING OF
… ........................................................................................................ 117
U
SER
-L
EVEL
S
ECURE
S
ESSION FOR
I
NTERNET
E
XPLORER
P
OLICIES
.......................................... 117
P
OLICY
........................................................................................................................................ 117
A
VAILABLE
S
ETTINGS
................................................................................................................. 117
L
IMITS SETTINGS OF
…................................................................................................................ 117
D
EPENDS ON SETTING OF
… ........................................................................................................ 117
S
ITE
-L
EVEL
S
ECURE
S
ESSION FOR
I
NTERNET
E
XPLORER
P
OLICIES
............................................ 118