Reference Guide

Manage Policies
162
More...
Message policies must have non-blank values.
"Space" and "Enter" characters used to add l
ines between rows
count as characters used. Messages over the 512 character
limit are truncated on the client.
Optionally customize the message to include specific
instructions about how to contact the help desk or security
administrator.
EMS Encryption
Rules
String
Encryption rules to be used to encrypt/not encrypt certain
drives, directories, and folders.
A total of 2048 characters are allowed. "Space" and "Enter"
characters used to add lines between rows count as characters
used. Any rules exceeding the 2048 limit are ignored.
See Encryption Rules for information.
More...
Storage devices which incorporate multi-interface c
onnections,
such as Firewire, USB, eSATA, etc. may require the use of both
Encryption Exter
nal Media and encryption rules to encrypt the
endpoint. This is necessary due to differences in how the
Windows operating system handles storage devices based on
interface type.
To ensure encrypting an iPod via Encryption External Media
does not make the device unusable, use the following rules:
-R#:\Calendars
-R#:\Contacts
-R#:\iPod_Control
-R#:\Notes
-R#:\Photos
You can also force encryption of specific file types in the
directories above. Adding the following rules will ensure that
ppt, pptx, doc, docx,
xls, and xlsx files are encrypted in the
directories excluded from encryption via the previous rules:
^R#:\Calendars
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Contacts
;ppt
.doc.xls
.pptx.docx
.xlsx
^R#:
\iPod_Control
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Notes
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Photos
;ppt.doc
.xls.pptx
.docx.xlsx
Replacing these
five rules with the following rule will force
encryption of ppt, pptx, doc,
docx, xls, and xlsx files in any
directory on the iPod, including Calendars, Contacts,
iPod_Control, Notes, and Photos:
^R#:\;ppt.doc.xls
.pptx.docx.xlsx
These rules disable or ena
ble encryption for these folders and
file types for all removable devices - not just an iPod. Use
care when defining rules to exclude an iPod from encryption.