Working with Actions in a Media Encryption &
Port Protection Rule
Each Media Encryption & Port Protection rule includes these main action types:
n
"Configuring the Read Action" on page 251
are protected by the policy
"Configuring a Write Action" on page 252
n
devices that are protected by the policy
"Configuring Peripheral Device Access" on page 256
n
types of peripheral devices
Media Encryption & Port Protection rules also contain these Advanced action types:
"Offline Access Actions" on page 263
n
non-protected computer
n
"Device Scanning and Authorization Actions" on page 268
storage devices for malware and unauthorized file types.
n
"Log Actions" on page 271
log entries when a storage device is attached to an endpoint computer
n
"UserCheck Actions" on page 273
violations and optionally lets them override a policy.
"Media Encryption Site Actions" on page 274
n
access to drives encrypted by different Endpoint Security Management Servers
"Global Automatic Access Action" on page 277
n
that applies to all rules, unless overridden by a different rule or action.
Working with Actions in a Media Encryption & Port Protection Rule
- Controls access to devices that are connected a
- Controls when Media Encryption & Port Protection creates
- Controls when and how to tell users about policy
R81 Harmony Endpoint Server Administration Guide | 250
- Controls how users can read devices that
- Controls how and when users can write to
- Controls access to different
- Configures scanning of
- Controls when to allow or prevent
- Defines the default automatic action
Need help?
Do you have a question about the HARMONY R81 and is the answer not in the manual?