The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" andĦ DFARS, et seq. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. For more information on the Third Party Programs, please see the Third Party Notice document for this Symantec product that may be available at the Third Party Legal Notice Appendix that may be included with this Documentation and/or Third Party Legal Notice ReadMe File that may accompany this Symantec product. The License Agreement accompanying the Licensed Software does not alter any rights or obligations you may have under those open source or free software licenses. Some of the Third Party Programs are available under open source or free software licenses. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ("Third Party Programs"). Other names may be trademarks of their respective owners. Symantec, the Symantec Logo, the Checkmark Logo, PGP, and Pretty Good Privacy are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. 65ĥ Preface Documentation version Legal Notice Documentation version:, Release Date: December, 2015 Copyright 2015 Symantec Corporation. 58Ĥ Contents 4 Chapter 11 Quick reference for commands and options List of commands List of options Commands that registered users can run Index. 21ģ Contents 3 About the -status command status command Chapter 5 Disk operation commands About the -decrypt command decrypt command encrypt command stop command resume command Chapter 6 Preboot configuration setup and Display commands bootprop-set -name PWDFORMAT command set-language command set-sound command show-config command Chapter 7 Autologon boot bypass commands About Autologon check-autologon command enable-autologon command disable-autologon command Chapter 8 Client-Server commands show-client-monitor command extend-client-monitor command Chapter 9 User management commands About the user management commands list-users command verify-user command register-user command unregister-user command change-passphrase command change-userdomain command Chapter 10 Disk authentication for WinPE recovery command auth-disk command. 9 About client administrator privileges Audience Important terms System requirements Installing and uninstalling Chapter 2 The Command-Line Interface About syntax and usage About scripting Changing the path Invoking Administrator Command Line About passwords Chapter 3 Help and Version commands About the -help command help (-h) command version command Chapter 4 Disk information commands About the -info command info command enum command. 1 Symantec Endpoint Encryption Drive Encryption Administrator Command Line Guide VersionĢ Contents Preface.
0 Comments
Leave a Reply. |