Reference Guide

Security Management Server Virtual v10.2.7 AdminHelp
ix
%HKLM:regpath% ............................................................................................................................. 183
%ENV:envname% .............................................................................................................................. 183
%% .................................................................................................................................................... 183
Windows Policies that Require Reboot .................................................................................................. 183
Windows Policies that Require Logoff ................................................................................................... 183
Encryption Rules ........................................................................................................................................ 183
Protected Directories ............................................................................................................................. 183
Modifiers What they are and what they do ......................................................................................... 184
Using the Override Modifier ................................................................................................................... 184
Encrypting/Not Encrypting Extensions ................................................................................................... 184
Examples of Extension Inclusions/Exclusion ...................................................................................... 184
Encrypting/Not Encrypting Directories .................................................................................................. 185
Examples of folder inclusion/exclusion ............................................................................................. 185
Sub-directories and Precedence of Directives ....................................................................................... 185
Example of sub-directories ................................................................................................................. 185
Example 1 of competing directives: ................................................................................................... 185
Example 2 of competing directives: ................................................................................................... 186
Example 3 of competing directives: ................................................................................................... 186
Environment Variables, KNOWNFOLDERID constants, and CSIDL .......................................................... 186
Application Data Encryption (ADE) ........................................................................................................ 188
Example Policies for Common/User Key Encryption .......................................................................... 188
System Data Encryption (SDE) ................................................................................................................ 188
Encryption Rules for SDE Encryption .................................................................................................. 189
Protection of SystemRoot ............................................................................................................... 189
Encryption Rules for Encryption External Media ................................................................................ 189
What Happens When Policies Tie ....................................................................................................... 189
Encryption Rules for Generic Drive Statements ................................................................................. 189
Remove System Data Encryption (SDE) ...................................................................................................... 190
Authentication ............................................................................................................................................... 190
Authentication ........................................................................................................................................... 190
Advanced Authentication ........................................................................................................................... 191
Threat Prevention ......................................................................................................................................... 197
Threat Prevention ...................................................................................................................................... 197
Advanced Threat Prevention ..................................................................................................................... 201