Reference Guide

Security Management Server v10.2.7 AdminHelp
ix
Windows Policies that Require Reboot .................................................................................................. 153
Windows Policies that Require Logoff ................................................................................................... 153
Advanced Windows Encryption .................................................................................................................. 153
Variables ................................................................................................................................................. 183
%CSIDL:name% ................................................................................................................................. 183
%HKCU:regpath% ............................................................................................................................. 185
%HKLM:regpath% ............................................................................................................................. 185
%ENV:envname% .............................................................................................................................. 185
%% .................................................................................................................................................... 185
Windows Policies that Require Reboot .................................................................................................. 185
Windows Policies that Require Logoff ................................................................................................... 185
Encryption Rules ........................................................................................................................................ 185
Protected Directories ............................................................................................................................. 185
Modifiers What they are and what they do ......................................................................................... 186
Using the Override Modifier ................................................................................................................... 186
Encrypting/Not Encrypting Extensions ................................................................................................... 186
Examples of Extension Inclusions/Exclusion ...................................................................................... 186
Encrypting/Not Encrypting Directories .................................................................................................. 187
Examples of folder inclusion/exclusion ............................................................................................. 187
Sub-directories and Precedence of Directives ....................................................................................... 187
Example of sub-directories ................................................................................................................. 187
Example 1 of competing directives: ................................................................................................... 187
Example 2 of competing directives: ................................................................................................... 188
Example 3 of competing directives: ................................................................................................... 188
Environment Variables, KNOWNFOLDERID constants, and CSIDL .......................................................... 188
Application Data Encryption (ADE) ........................................................................................................ 190
Example Policies for Common/User Key Encryption .......................................................................... 190
System Data Encryption (SDE) ................................................................................................................ 190
Encryption Rules for SDE Encryption .................................................................................................. 191
Protection of SystemRoot ............................................................................................................... 191
Encryption Rules for Encryption External Media ................................................................................ 191
What Happens When Policies Tie ....................................................................................................... 191
Encryption Rules for Generic Drive Statements ................................................................................. 191
Remove System Data Encryption (SDE) ...................................................................................................... 192