Encryption – The isolation period has expired
If you receive an error when attempting to login saying: “The isolation period has expired…
If you receive an error when attempting to login saying: “The isolation period has expired…
South Dartmoor College talk about using SLG…
This guide will take you through adding users to SLG, before continuing you should complete the FAQ on data cleansing…
Before provisioning accounts for your parents or teachers you must check that the data in Sims .net which these accounts will be generated from is up to date and accurate…
Can I take an image of an encrypted device, i.e with Ghost?
Is there a better way of logging onto an encrypted device as a local administrator than…
Is there a a way of seeing a list of users assigned to a particular laptop?
On going into the User Maintenance Wizard and choosing Refresh from Central Database, some of our users aren’t listed…
The Secondary School Deployment Guidelines suggests that if a member of the ICT team has a laptop, then they need to have a normal user account as…
If a machine was to crash/unexpectedly restart during the encryption you may find the application is installed but the drivers aren’t activated…
When UAC is enabled on Windows 7 or Vista you need to elevate the command prompt to succesfully run the CHKDSK command…
Can I relax the password policy used by the ScoMIS Encryption Service for my school so that my users have simpler password to remember?
When imaging an encyrpted device with WDS you might find that it appears to be succesful up until the machine restarts…
Depending on how your network has been configured the Encryption Service software may fail to install in a Viglen Classlink network…
It is possible that during the encryption process or afterwards at a later date the hard disc malfunctions. In this case normal recovery methods will not work with an encrypted disc.
Before installing the ScoMIS Encryption Service software onto a Toshiba Satellite Pro Notebook please make sure of the following…
Encryption: How to exclude the Endpoint Encryption File System from being scanned by an anti-virus on-access scanner on the client computer
This FAQ explains some of the benefits of the ScoMIS encryption service and how this compares in each case to the open source truecrypt solution…
Following the downloading guide does not work, you may have problems with the web page freezing or simply appearing to do nothing…
To enable visually impaired users to easily use an laptop once it has been encrypted you need to contact the Service Desk…
This screen cast video is the third in a series of three going through a deployment in a secondary school…
This screen cast video is the second in a series of three going through a deployment in a secondary school…
This screen cast video is the first in a series of three going though a deployment in a secondary school…
This video is a demonstration of an end user installation to give you an idea of the process and how simple it is – the video quite large so may take a few minutes to download and begin… [swfobj src=”http://faq.scomis.org/wp-content/uploads/2010/01/ScoMIS-Encryption-Service-End-User-Installation.swf” width=”640″ height=”480″ align=”center”] Reviewed 22/12/2014.
Before installating the encryption software you must run a CHKDSK to make sure that the hard drive is mechanically healthy.
[swfobj src=”http://faq.scomis.org/wp-content/uploads/2010/01/Putting-the-ScoMIS-Encryption-Service-Setup-Package-on-the-network.swf” width=”640″ height=”480″ align=”center”] Reviewed 22/12/2014
This short video will take you through downloading the encryption software setup package…
On protected devices for example Laptops or PCs, Endpoint Encryption, in simple terms, encrypts the operating system making it impossible to read data from the disk without the encryption key.
Deployment and installation documentation for the ScoMIS Encryption Service