Reference Guide
Manage Policies
• Wipe Encryption Keys to delete the encryption keys on the removable
storage, making the encrypted data inaccessible un
til the owner takes
the media to an encrypted computer for which he has a login.
EMS Access Code
Required Message
String
Authentication Failed.
Please contact your
system administrator.
String - 5-512 characters - Authentication Failed: Please contact your
system administrator.
Message that displays when a user needs to contact you for an access
code (after authentication failure).
More...
Message policies must have non-blank values.
"Space" and "Enter" characters used to add lines between rows count as
characters used. Messages over the 512 character limit are truncated
on the client.
Optionally customize the second sentence of the message to include
specific instructions about how to contact a help desk or security
administrator for authentication failures.
EMS Cooldown Time
Delay
30
0-5000 seconds
Number of seconds the user must wait before attempting to enter the
access code after failing the specified number of times.
EMS Cooldown Time
Increment
20
0-5000 seconds
Incremental time to add to the cooldow
n time each time the user fails
to enter the correct access code in the specified number of attempts.
EMS Access Code
Failed Message
String
You are not authorized
to use this media.
Please contact your
system administrator.
String - 5-512 characters - You are not authorized to use this media.
Please contact your system administrator.
Message that displays following unsuccessful Access Code Attempts
Allowed.
More...
Message policies must have non-blank values.
"Space" and "Enter" characters used to add line
s between rows count as
characters used. Messages over the 512 character limit are truncated
on the client.
Optionally customize the message to include specific instructions
about how to contact the help desk or security administrator.
EMS Encryption Rules
Encryption rules to be used to encrypt/not encrypt certain drives,
directories, and folders.
A total of 2048 characters are allowed. "Space" and "Enter" characters
used to add lines between rows count as characters used. Any rules
exceeding the 2048 limit are ignored.
See Encryption Rules for information.
More...
Storage devices which incorporate multi-
interface connections, such as
Firewire, USB, eSATA, etc. may require the use of both EMS and
encryption rules to encrypt the endpoint. This is necessary due to
differences in how the Windows operating system handles storage
devices based on interface type.
To ensure encrypting an iPod via EMS does not make the device
unusable, use the following rules:
-R#:\Calendars
-R#:\Contacts
-R#:\iPod_Control
-R#:\Notes
-R#:\Photos
You can also force encryption of specific file types in the
directories above. Adding the following rules will ensure that ppt,
pptx, doc, docx, xls, and xlsx files are encrypted in the directories
excluded from encryption via the previous rules:
^R#:\Calendars
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Contacts
;ppt
.doc.xls
.pptx.docx
254