Reference Guide
Table of Contents
viii
%CSIDL:name% ................................................................................................................................. 132
%HKCU:regpath% ............................................................................................................................. 134
%HKLM:regpath% ............................................................................................................................. 134
%ENV:envname% .............................................................................................................................. 134
%% .................................................................................................................................................... 134
Windows Policies that Require Reboot .................................................................................................. 134
Windows Policies that Require Logoff ................................................................................................... 134
Advanced Windows Encryption .................................................................................................................. 134
Variables ................................................................................................................................................. 167
%CSIDL:name% ................................................................................................................................. 167
%HKCU:regpath% ............................................................................................................................. 169
%HKLM:regpath% ............................................................................................................................. 169
%ENV:envname% .............................................................................................................................. 169
%% .................................................................................................................................................... 169
Windows Policies that Require Reboot .................................................................................................. 169
Windows Policies that Require Logoff ................................................................................................... 169
Encryption Rules ........................................................................................................................................ 169
Protected Directories ............................................................................................................................. 169
Modifiers – What they are and what they do ......................................................................................... 170
Using the Override Modifier ................................................................................................................... 170
Encrypting/Not Encrypting Extensions ................................................................................................... 170
Examples of Extension Inclusions/Exclusion ...................................................................................... 170
Encrypting/Not Encrypting Directories .................................................................................................. 170
Examples of folder inclusion/exclusion .............................................................................................. 171
Sub-directories and Precedence of Directives ....................................................................................... 171
Example of sub-directories ................................................................................................................. 171
Example 1 of competing directives: ................................................................................................... 171
Example 2 of competing directives: ................................................................................................... 171
Example 3 of competing directives: ................................................................................................... 172
Environment Variables, KNOWNFOLDERID constants, and CSIDL .......................................................... 172
Application Data Encryption (ADE) ........................................................................................................ 173
Example Policies for Common/User Key Encryption .......................................................................... 174
System Data Encryption (SDE) ................................................................................................................ 174
Encryption Rules for SDE Encryption .................................................................................................. 175