Reference Guide
Manage Policies
178
• Wipe Encryption Keys to delete the encryption keys on the media,
making the encrypted data inaccessible until the owner takes the media to
an encrypted computer for which he has a login.
EMS Access Code
Required Message
String
Authentication Failed. Please contact your system
administrator.
String - 5-512 characters - Authentication Failed: Please contact your
system administrator.
Message that displays when a user needs to contact an administrator for
an access code after authentication failure.
More...
Message policies must have non-blank values.
"Space" and "Enter" characters used to add lines between rows count as
characters used. Messages over the 512 character limit are truncated on
the client.
Optionally customize the second sentence of the message to include
specific instructions about how to contact a help desk or security
administrator for authentication failures.
EMS Cooldown
Time Delay
30
0-5000 seconds
Number of seconds the user must wait before attempting to enter the
access code after failing the specified number of times.
EMS Cooldown
Time Increment
20
0-5000 seconds
Incremental time to add to the cooldown time each time the user fails to
enter the correct access code in the specified number of attempts.
EMS Access Code
Failed Message
String
You are not authorized to use this media. Please contact
your system administrator.
String - 5-512 characters - You are not authorized to use this media. Please
contact your system administrator.
Message that displays following unsuccessful Access Code Attempts
Allowed.
More...
Message policies must have non-blank values.
"Space" and "Enter" characters used to add lines between rows count as
characters used. Messages over the 512 character limit are truncated on
the client.
Optionally customize the message to include specific instructions about
how to contact the help desk or security administrator.
EMS Encryption
Rules
String
Encryption rules to be used to encrypt/not encrypt certain drives,
directories, and folders.
A total of 2048 characters are allowed. "Space" and "Enter" characters
used to add lines between rows count as characters used. Any rules
exceeding the 2048 limit are ignored.
See Encryption Rules for information.
More...
Storage devices which incorporate multi-interface connections, such as
Firewire, USB, eSATA, etc. may require the use of both Encryption External
Media and encryption rules to encrypt the endpoint. This is necessary due
to differences in how the Windows operating system handles storage
devices based on interface type.
To ensure encrypting an iPod via Encryption External Media does not make
the device unusable, use the following rules:
-R#:\Calendars
-R#:\Contacts
-R#:\iPod_Control
-R#:\Notes
-R#:\Photos
You can also force encryption of specific file types in the directories above.
Adding the following rules will ensure that ppt, pptx, doc, docx, xls, and
xlsx files are encrypted in the directories excluded from encryption via the
previous rules:
^R#:\Calendars
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Contacts