Reference Guide

Table of Contents
viii
Manage Security Policies ............................................................................................................................... 119
Localize Policies Displayed on the Endpoint Computer ................................................................................ 120
Localizable Policies ....................................................................................................................................... 121
Windows Encryption ...................................................................................................................................... 123
Windows Encryption ................................................................................................................................... 123
Variables ................................................................................................................................................. 134
%CSIDL:name% ................................................................................................................................. 134
%HKCU:regpath% ............................................................................................................................. 136
%HKLM:regpath% ............................................................................................................................. 136
%ENV:envname% .............................................................................................................................. 136
%% .................................................................................................................................................... 136
Windows Policies that Require Reboot .................................................................................................. 136
Windows Policies that Require Logoff ................................................................................................... 136
Advanced Windows Encryption .................................................................................................................. 136
Variables ................................................................................................................................................. 169
%CSIDL:name% ................................................................................................................................. 169
%HKCU:regpath% ............................................................................................................................. 171
%HKLM:regpath% ............................................................................................................................. 171
%ENV:envname% .............................................................................................................................. 171
%% .................................................................................................................................................... 171
Windows Policies that Require Reboot .................................................................................................. 171
Windows Policies that Require Logoff ................................................................................................... 171
Encryption Rules ........................................................................................................................................ 171
Protected Directories ............................................................................................................................. 171
Modifiers – What they are and what they do ......................................................................................... 172
Using the Override Modifier
................................................................................................................... 172
Encrypting/Not Encrypting Extensions ................................................................................................... 172
Examples of Extension Inclusions/Exclusion ...................................................................................... 172
Encrypting/Not Encrypting Directories .................................................................................................. 172
Examples of folder inclusion/exclusion .............................................................................................. 173
Sub-directories and Precedence of Directives ....................................................................................... 173
Example of sub-directories ................................................................................................................. 173
Example 1 of competing directives: ................................................................................................... 173
Example 2 of competing directives: ................................................................................................... 173