" />" />" />
You can use the ZENworks Audit feature to capture Full Disk Encryption change and agent events that occur in your zone. Change and agent events are configuration changes made to the zone through ZENworks Control Center or the zman command line utilities.
You use change events to capture changes that ZENworks administrators make to Disk Encryption policies. You can capture any of the following events:
|
|
|
Generated events provide information about the ZENworks administrator who performed the action, the affected policy, and the date the change occurred.
You enable Full Disk Encryption change events at the Management Zone.
In ZENworks Control Center, click Configuration > Management Zone Settings > Audit Management > Events Configuration to display the Events Configuration page.
On the Change Events tab, click Add to display the Add Change Events dialog box.
In the Change Events tree, expand the Full Disk Encryption section, then select the change events you want to audit for Disk Encryption policies.
Configure the event settings, and then click OK to add the events to the list of audited change events.
For more detailed information and instructions, see Enabling a Change Event
in the ZENworks Audit Management Reference.
In ZENworks Control Center, click Audit and Messages.
In the Zone Audit panel, use the Dashboard and Events tabs to view the audited events:
Dashboard: Shows a summary of the audited events. You can see key indicators about top events and impacted objects, and can drill into the specific events. By default, the dashboard shows you an overview of events in the last 4 hours. If you want to see more data, you can change the time period.
Events: Shows the change and agent events being audited and the generated events. You can click a generated event to see its details. By default, the list shows the events generated in the last 4 hours. If you want to see more data, you can change the time period.
For more detailed information and instructions, see Viewing a Generated Change Event
in the ZENworks Audit Management Reference.
You use agent events to capture when device volumes are encrypted or decrypted on devices that have a Disk Encryption policy applied. You can capture any of the following events:
Volume Encryption Started
Volume Encrypted
Volume Decryption Started
Volume Decrypted
You enable Full Disk Encryption agent events at the Management Zone.
In ZENworks Control Center, click Configuration > Management Zone Settings > Audit Management > Events Configuration to display the Events Configuration page.
On the Agent Events tab, click Add to display the Add Agent Events dialog box.
In the Agent Events tree, expand the Full Disk Encryption section, then select the agent events you want to audit for Disk Encryption policies.
Configure the event settings, and then click OK to add the events to the list of audited agent events.
In ZENworks Control Center, click Audit and Messages.
In the Zone Audit panel, use the Dashboard and Events panels to view the audited events:
Dashboard: Shows a summary of the audited events. You can see key indicators about top events and impacted objects, and can drill into the specific events. By default, the dashboard shows you an overview of events in the last 4 hours. If you want to see more data, you can change the time period.
Events: Shows the change and agent events being audited and the generated events. You can click a generated event to see its details. By default, the list shows the events generated in the last 4 hours. If you want to see more data, you can change the time period.
For more detailed information and instructions, see Viewing a Generated Change Event
in the ZENworks Audit Management Reference.
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.microfocus.com/about/legal/.
© Copyright 2008 - 2023 Open Text
The only warranties for products and services of Open Text and its affiliates and licensors (“Open Text”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Open Text shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice.