Reference Guide
Security Management Server - AdminHelp v9.8
ix
Encryption Rules ....................................................................................................... 166
Protected Directories .............................................................................................. 167
Modifiers – What they are and what they do ................................................................... 169
Using the Override Modifier ....................................................................................... 169
Encrypting/Not Encrypting Extensions .......................................................................... 169
Examples of extension inclusions/exclusion .............................................................. 169
Encrypting/Not Encrypting Directories .......................................................................... 170
Examples of folder inclusion/exclusion .................................................................... 170
Sub-directories and Precedence of Directives.................................................................. 170
Example of sub-directories .................................................................................. 170
Example 1 of competing directives: ........................................................................ 170
Example 2 of competing directives: ........................................................................ 171
Example 3 of competing directives: ........................................................................ 171
Environment Variables, KNOWNFOLDERID constants, and CSIDL ............................................ 171
Application Data Encryption (ADE) ............................................................................... 173
Example Policies for Common/User Key Encryption ........................................................ 173
System Data Encryption (SDE) .................................................................................... 173
Policies for SDE Encryption ..................................................................................... 174
Notes .................................................................................................................. 178
Protection of SystemRoot ....................................................................................... 178
Encryption External Media ...................................................................................... 178
What Happens When Policies Tie .............................................................................. 179
Generic Drive Statements ....................................................................................... 179
Remove System Data Encryption (SDE) ............................................................................. 179
Remove HCA-Based Encryption ...................................................................................... 179
Authentication ............................................................................................................ 179
Authentication ......................................................................................................... 179
Advanced Authentication ............................................................................................. 181
Threat Prevention ........................................................................................................ 186
Threat Prevention ..................................................................................................... 186
Advanced Threat Prevention ......................................................................................... 190
Client Firewall Settings and Rules .................................................................................. 224
Client Firewall Options .......................................................................................... 224
Client Firewall Rules ............................................................................................. 226