Views:

This section explains the configurable options for policy rules affecting all Endpoint Encryption devices.

  1. Create a new Endpoint Encryption policy.

    See Creating a Policy.

  2. Click Common.

    The Common policy rules settings appear.

    Figure 1. Common Policy Rules
  3. Under Allow User to Uninstall, select Allow User (non-administrator) accounts to uninstall agent software to allow any Endpoint Encryption user to uninstall the agent.
    Note:

    By default, only Administrator accounts can uninstall Endpoint Encryption agents.

  4. Under Lockout and Lock Device Actions, configure the following options:
    • Select Lock account after <number> days to specify the number of days that the Endpoint Encryption device locks if it does not synchronize policies.

      • Use Account lockout action to specify whether the remote authentication or erase action occurs at lockout.

        Note:

        For information about lock options, see Lockout Actions

    • Select Failed log on attempts allowed to specify how many times that a user can attempt to authenticate before the Endpoint Encryption device locks.

    • For Full Disk Encryption or File Encryption devices, separately configure the following:

      • Use Device locked action to specify whether the "Remote Authentication" or the "Erase" action occurs at lockout.

        Note:

        For information about lock options, see Lockout Actions

      • Use Number of minutes to lock device to specify the duration that time delay locks the Endpoint Encryption device from authentication

  5. Under Password, configure the following options:
    • Select Users must change password after <number> days to control when a user is prompted to update password.

    • Select Users cannot reuse the previous <number> passwords to specify how many previous passwords the user may reuse.

    • Select Number of consecutive characters allowed in a password to specify how many repeated characters a user may specify in the password.

    • Select Minimum length allowed for passwords to specify how many characters the user is required to use in the password.

  6. Under Password Requirements, specify the password character limitations.
    • Letters

    • Lowercase characters

    • Uppercase characters

    • Numbers

    • Symbols

    Important:

    The sum total of letters, numbers, and symbols cannot exceed 255 characters.

  7. Under Agent, specify the Sync internal in minutes.

Lockout Actions

Some policies have settings to lock out a user account or to lock a device based on certain criteria. Account lockout and device lockout actions affect the Endpoint Encryption device whether or not the agent synchronizes policies with PolicyServer. For example, if the Endpoint Encryption agent does not communicate with PolicyServer for a certain period of time, the Endpoint Encryption agent automatically locks the Endpoint Encryption device. Use the tables below to understand the actions available for the account lockout and device lock actions.

The following table describes when the lockout actions occur:

Type

Description

Account lockout

Account lockout actions take effect when the Endpoint Encryption agent does not communicate with PolicyServer for a certain period of time as set by the policy.

Full Disk Encryption device lockout

Full Disk Encryption device lockout actions take effect when the Endpoint Encryption user exceeds the number of unsuccessful logon attempts to that Full Disk Encryption device as set by the policy.

File Encryption device lockout

File Encryption device lockout actions take effect when the Endpoint Encryption user exceeds the number of unsuccessful logon attempts to that File Encryption device as set by the policy.

The options for lockout actions are as follows:

Action

Description

Erase

PolicyServer erases all data controlled by the associated Endpoint Encryption agent.

Warning:

The Endpoint Encryption user cannot recover the erased data.

Remote authentication

PolicyServer locks the Endpoint Encryption device until the Endpoint Encryption user contacts receives Remote Help authentication from an authenticator or from Support.

See Remote Help.

Time delay

PolicyServer temporarily locks the Endpoint Encryption device and notifies the Endpoint Encryption user that the device is locked. The ability to authenticate or reset the password is disabled during the time delay. The duration of the time delay is determined by policy. Once the time delay has expired, the user is permitted to authenticate.