Reference Guide
Manage Policies
164
More...
Message policies must have non-blank values.
"Space" and "Enter" characters used to add lines between row
s
count as characters used. Messages over the 512 character
limit are truncated on the client.
Optionally customize the message to include specific
instructions about how to contact the help desk or security
administrator.
EMS Encryption
Rules
String
Encryption rules to be used to encrypt/not encrypt certain
drives, directories, and folders.
A total of 2048 characters are allowed. "Space" and "Enter"
characters u
sed to add lines between rows count as characters
used. Any rules exceeding the 2048 limit are ignored.
See Encryption Rules for information.
More...
Storage devices which incorporate multi-interface c
onnections,
such as Firewire, USB, eSATA, etc. may require the use of both
Encryption External Media and en
cryption rules to encrypt the
endpoint. This is necessary due to differences in how the
Windows operating system handles storage devices based on
interface type.
To ensure encrypting an iPod via Encryption External Media
does not make the device unusable, use the following rules:
-R#:\Calendars
-R#:\Contacts
-R#:\iPod_Control
-R#:\Notes
-R#:\Photos
You can also force encryption of specific file types in the
direct
ories above. Adding the following rules will ensure that
ppt, pptx, doc, docx, xls, and xlsx fi
les are encrypted in the
directories excluded from encryption via the previous rules:
^R#:\Calendars
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Contacts
;ppt
.doc.xls
.pptx.docx
.xlsx
^R#:
\iPod_Control
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Notes
;ppt.doc
.xls.pptx
.docx.xlsx
^R#:\Photos
;ppt.doc
.xls.pptx
.docx.xlsx
Replacing these five rules with the fo
llowing rule will force
encryption of ppt, pptx, doc, docx, xls, and xl
sx files in any
directory on the iPod, including Calendars, Contacts,
iPod_Control, Notes, and Photos:
^R#:\;ppt.doc.xls
.pptx.docx.xlsx
These rules disable or enable encryption for the
se folders and
file types for all removable devices - not just an iPod. Use
care when defining rules to exclude an iPod from encryption.