About This Guide 9novdocx (en) 17 September 2009About This GuideThis Novell ® ZENworks ® Endpoint Security Management Administration Guide is written forZENworks Endpoint Security Management Administrators who are required to manage theEndpoint Security Management services, create security policies for the enterprise, generate andanalyze reporting data, and provide troubleshooting for end users. Instructions for completing thesetasks are provided in this manual.The information in this guide is organized as follows: Chapter 1, “ZENworks Endpoint Security Management,” on page 11 Chapter 2, “Policy Distribution Service,” on page 17 Chapter 3, “Configuring the Directory Service,” on page 21 Chapter 4, “Using the ZENworks Endpoint Security Management Service,” on page 37 Chapter 5, “Using the ZENworks Storage Encryption Solution Management Console,” onpage 41 Chapter 6, “Creating and Distributing Security Policies,” on page 75 Chapter 7, “Managing the Endpoint Security Client 3.5,” on page 175 Chapter 8, “Managing the Endpoint Security Client 4.0,” on page 191 Chapter 9, “Using ZENworks Endpoint Security Management Utilities,” on page 203 Appendix A, “Acronym Glossary,” on page 207AudienceThis guide is written for the ZENworks Endpoint Security Management administrators.FeedbackWe want to hear your comments and suggestions about this manual and the other documentationincluded with this product. Please use the User Comments feature at the bottom of each page of theonline documentation, or go to the Novell Documentation Feedback site (http://www.novell.com/documentation/feedback.html) and enter your comments there.Additional DocumentationZENworks Endpoint Security Management is supported by other documentation (in both PDF andHTML formats) that you can use to learn about and implement the product. For additionaldocumentation, see the ZENworks Endpoint Security Management 3.5 documentation Web site(http://www.novell.com/documentation/zesm35).Documentation ConventionsIn Novell documentation, a greater-than symbol (>) is used to separate actions within a step anditems in a cross-reference path.A trademark symbol (® , TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-partytrademark.