Reference Guide
Table of Contents
viii
Key Revocation ...................................................................................................... 117
Change the Superadmin Password .................................................................................. 117
Change Account Lockout Settings ................................................................................... 118
Manage Policies .............................................................................................................. 119
Manage Security Policies ................................................................................................ 119
Localize Policies Displayed on the Endpoint Computer ............................................................ 120
Localizable Policies ...................................................................................................... 121
Windows Encryption...................................................................................................... 123
Windows Encryption ................................................................................................... 123
Variables ............................................................................................................. 132
%CSIDL:name% ................................................................................................. 132
%HKCU:regpath% ............................................................................................... 134
%HKLM:regpath% ............................................................................................... 134
%ENV:envname% ............................................................................................... 134
%% ................................................................................................................ 134
Windows Policies that Require Reboot .......................................................................... 134
Windows Policies that Require Logoff ........................................................................... 134
Advanced Windows Encryption ...................................................................................... 134
Variables ............................................................................................................. 164
%CSIDL:name% ................................................................................................. 164
%HKCU:regpath% ............................................................................................... 166
%HKLM:regpath% ............................................................................................... 166
%ENV:envname% ............................................................................................... 166
%% ................................................................................................................ 166
Windows Policies that Require Reboot .......................................................................... 166
Windows Policies that Require Logoff ........................................................................... 166
Encryption Rules ....................................................................................................... 166
Protected Directories
.............................................................................................. 167
Modifiers – What they are and what they do ................................................................... 169
Using the Override Modifier ....................................................................................... 169
Encrypting/Not Encrypting Extensions .......................................................................... 169
Examples of extension inclusions/exclusion .............................................................. 169
Encrypting/Not Encrypting Directories .......................................................................... 170
Examples of folder inclusion/exclusion .................................................................... 170