Working With Actions In A Media Encryption & Port Protection Rule - Check Point HARMONY R81 Administration Manual

Endpoint server
Table of Contents

Advertisement

Working with Actions in a Media Encryption &
Port Protection Rule
Each Media Encryption & Port Protection rule includes these main action types:
n
"Configuring the Read Action" on page 251
are protected by the policy
"Configuring a Write Action" on page 252
n
devices that are protected by the policy
"Configuring Peripheral Device Access" on page 256
n
types of peripheral devices
Media Encryption & Port Protection rules also contain these Advanced action types:
"Offline Access Actions" on page 263
n
non-protected computer
n
"Device Scanning and Authorization Actions" on page 268
storage devices for malware and unauthorized file types.
n
"Log Actions" on page 271
log entries when a storage device is attached to an endpoint computer
n
"UserCheck Actions" on page 273
violations and optionally lets them override a policy.
"Media Encryption Site Actions" on page 274
n
access to drives encrypted by different Endpoint Security Management Servers
"Global Automatic Access Action" on page 277
n
that applies to all rules, unless overridden by a different rule or action.
Working with Actions in a Media Encryption & Port Protection Rule
- Controls access to devices that are connected a
- Controls when Media Encryption & Port Protection creates
- Controls when and how to tell users about policy
R81 Harmony Endpoint Server Administration Guide      |      250
- Controls how users can read devices that
- Controls how and when users can write to
- Controls access to different
- Configures scanning of
- Controls when to allow or prevent
- Defines the default automatic action

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HARMONY R81 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF