Working with Advanced Actions in a Media Encryption & Port Protection Rule
R81 Harmony Endpoint Server Administration Guide|263
Working with Advanced Actions in a Media Encryption &
Port Protection Rule
You can configure advanced actions in a Media Encryption & Port Protection policy rule.
Offline Access Actions
You can select one of these predefined actions to define encryption behavior for storage
devices:
n
Allow offline access to encrypted media - Users can enter a password to access
storage devices on protected computers not connected to an Endpoint Security
Management Server (Offline). Users can also use their password to access storage
devices on a non-protected computer.
n
Do not allow offline access to encrypted media - Users cannot access storage devices
on protected computers that are not connected to an Endpoint Security Management
Server or on non-protected computers.
You can change the settings of these predefined actions and create new custom Offline
Access to Media action.
Custom Offline Access Settings
You can define custom offline access actions that include these settings:
Encryption Settings
Setting Description
Allow user to
choose
owner during
encryption
Lets users manually define the device owner before encryption. This lets
users create storage devices for other users. By default, the device owner
is the user who is logged into the endpoint computer. The device owner
must be an Active Directory user.
Allow user to
change size
of encrypted
media
Lets users change the percentage of a storage device that is encrypted,
not to be lower than Minimum percentage of media capacity used for
encrypted storage or Default percentage of media capacity used for
encrypted storage. Also see
"Configuring Encryption Container Settings"
on page265
.
Allow users
to remove
encryption
from media
Lets users decrypt storage devices.