Devices and Users Overview Parent topic

This chapter explains how Endpoint Encryption protects user identity and endpoint access. Correctly configuring Endpoint Encryption users, policy groups, and devices ensures that data remains encrypted from unauthorized users, thus preventing data loss risk from accidental information release or deliberate sabotage.
Topics include: