Reference Guide

Security Management Server v10.2.7 AdminHelp
157
The scan priority levels are used in two ways.
1.
These values correspond with the values used by the Microsoft
SDK to set thread execution priority.
2. The client uses these values to introduce a delay in the
encryption sweep after every single file is processed.
The values translate to the following millisecond delay ranges,
where the encryption thread will sit idle and then return full
control to the operating system:
Highest=0 ms / Lowest=100 ms
User Data
Encryption Key
User
Common, User, User Roaming
Choose a key to indicate who can access files encrypted by the following
policies, and where:
• User Encrypted Folders
• Encrypt Outlook Personal folders
• Encrypt Temporary Files (\Users\<Username>\AppData\Local\Temp
only)
• Encrypt Temporary Internet Files
• Encrypt User Profile Documents (except \All Users\Shared Documents)
Select:
• Common for User Encrypted Folders to be accessible by all managed
users on the computer where they were created (the same level of access
as Common Encrypted Folders), and encrypted with the Common
encryption algorithm.
More...
The Common encryption algorithm controls the encryption algorithm for
all User Encrypted Folders and overrides any encryption algorithm
selected, including the default User encryption algorithm. For example, if
the Common encryption algorithm is set to AES 256, all Common and User
Encrypted Files/Folders is encrypted with the AES 256 algorithm.
All other encryption parameters can be selected to override default
settings. For example, if the Encrypt Temporary Files policy is set to Not
Selected, you can override this setting for any managed user by setting this
value to Selected.
Designated User Encrypted Folders use the Common Key, resulting in all
managed users having the key to access any encry
pted files stored in these
folders as permitted by security settings on the operating system.
• User for these files to be accessible only to the user who created them,
only on the computer where they were created (the same level of access
as User Encrypted Folders), and encrypted with the User Encryption
Algorithm.
• User Roaming for these files to be accessible only to the user who
created them, on any encrypted Windows computer, and encrypted with
the User encryption algorithm.
When incorporating an encryption policy to encrypt entire disk partitions,
Dell recommends using the default SDE policy, rather than Common or
User. This ensures that any operating system files that are encrypted are
accessible during times when the managed user is not logged in.
Policy Proxy
Connections
String
String - maximum of 1500 characters
List fully qualified Policy Proxy hostnames, or IP addresses, separated by
carriage returns. Ports cannot be specified in this policy.
More...
Once a valid entry is found, the remainder of the Policy Proxies listed are
ignored.
Entries are processed in the following order:
1. GKConnections Override (this registry entry overrides all other entries)
2. GKConnections (this registry entry is set automatically by the client,
based on the this policy)
3. GK
To override this policy and specify ports via the registry key, set
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\