You can use the ZENworks Audit feature to capture Full Disk Encryption change events that occur in your zone. Change events are configuration changes made to the zone through ZENworks Control Center or the zman command line utilities.
You use change events to capture changes that ZENworks administrators make to Disk Encryption policies. You can capture any of the following events:
Generated events provide information about the ZENworks administrator who performed the action, the affected policy, and the date the change occurred.
You enable Full Disk Encryption change events at the Management Zone.
In ZENworks Control Center, click> > > to display the Events Configuration page.
On the Change Events tab, clickto display the Add Change Events dialog box.
In thetree, expand the section, then select the Disk Encryption policy change events you want to audit.
Configure the event settings, then clickto add the events to the list of audited change events.
In ZENworks Control Center, click.
In the Zone Audit panel, use theand tabs to view the audited events:
Dashboard: Shows a summary of the audited events. You can see key indicators about top events and impacted objects, and can drill into the specific events. By default, the dashboard shows you an overview of events in the last 4 hours. If you want to see more data, you can change the time period.
Events: Shows the change events being audited and the generated events. You can click a generated event to see its details. By default, the list shows the events generated in the last 4 hours. If you want to see more data, you can change the time period.
Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to the Novell International Trade Services Web page for more information on exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2014 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher.
For Novell trademarks, see the Novell Trademark and Service Mark list.
All third-party trademarks are the property of their respective owners.