Reference Guide
Security Management Server v10.2.10 AdminHelp
ix
Example 3 of competing directives: ................................................................................................... 174
Environment Variables, KNOWNFOLDERID constants, and CSIDL .......................................................... 174
Application Data Encryption (ADE) ........................................................................................................ 175
Example Policies for Common/User Key Encryption .......................................................................... 176
System Data Encryption (SDE) ................................................................................................................ 176
Encryption Rules for SDE Encryption .................................................................................................. 177
Protection of SystemRoot ............................................................................................................... 177
Encryption Rules for Encryption External Media ................................................................................ 177
What Happens When Policies Tie ....................................................................................................... 177
Encryption Rules for Generic Drive Statements ................................................................................. 177
Remove System Data Encryption (SDE) ...................................................................................................... 177
Authentication ............................................................................................................................................... 178
Authentication ........................................................................................................................................... 178
Advanced Authentication ........................................................................................................................... 179
Threat Prevention ......................................................................................................................................... 186
Threat Prevention ...................................................................................................................................... 186
Advanced Threat Prevention ..................................................................................................................... 190
Client Firewall Settings and Rules ............................................................................................................. 224
Client Firewall Options ....................................................................................................................... 224
Client Firewall Rules ........................................................................................................................... 227
Policies Set by Application Control ........................................................................................................... 230
Advanced Threat Events tab fields and filters .......................................................................................... 231
Manage Enterprise Advanced Threats - Protection ................................................................................... 231
Threats ................................................................................................................................................... 232
File Details ............................................................................................................................................. 233
Script Control Table ............................................................................................................................... 234
Manage Enterprise Advanced Threats - Agents ......................................................................................... 234
Manage Enterprise Advanced Threats - Certificate ................................................................................... 234
Manage Enterprise Advanced Threats - Cylance Score and Threat Model Updates .................................. 235
Threat Model Updates ............................................................................................................................ 235
Manage Enterprise Advanced Threats - Global List ................................................................................... 236
Global Quarantine .................................................................................................................................. 236
Safe ......................................................................................................................................................... 237
Unassigned .............................................................................................................................................. 238