The
primary form of protection that Endpoint Encryption
delivers is prevention of unauthorized user access to encrypted endpoints and devices.
Correctly configuring Endpoint Encryption devices, users,
and policy groups prevents data loss risk from accidental information release or
deliberate sabotage.
Endpoint Encryption counts the amount of
consecutive logon attempts on a given device and the amount of time
since the last communication with PolicyServer for a given length of
time. If a device violates the policy criteria, Endpoint Encryption can reset, lock, or
erase the disk.
|
|
In addition to checking authentication attempts on a device, Endpoint Encryption also counts the
amount of consecutive logon attempts by a particular user account.
If that user violates the policy criteria, Endpoint Encryption can reset, lock, or
erase the disk.
|
|
Groups act as a container for users for policy management.
Administrators and authenticators within a group have those special
privileges only within that group, but unassigned administrators and
authenticators have that role throughout the Enterprise.
|
For a complete list of the configurable methods to authenticate users and devices,
see
Authentication Methods.
Devices
Endpoint Encryption devices are Endpoint Encryption agents that have registered with PolicyServer.
Installing any Endpoint Encryption agent automatically registers
the endpoint with PolicyServer as a new Endpoint Encryption
device. Since multiple Endpoint Encryption agents may protect a
given endpoint, a single endpoint may appear as more than one Endpoint Encryption device on PolicyServer.
Depending on the policy settings, Endpoint Encryption takes one of
the following actions when users attempt to consecutively log on that device unsuccessfully:
-
Delay the next authentication attempt
-
Lock the device
-
Erase all data on the device
![]() |
NoteTo configure Endpoint Encryption devices, use the
Endpoint Encryption Devices widget. See Endpoint Encryption Devices.
|
Users
Endpoint Encryption users are any user account
manually added to PolicyServer or synchronized with Active Directory.
Endpoint Encryption has
several types of account roles and authentication methods for comprehensive identity-based
authentication and management. Using Control Manager or PolicyServer MMC, you can add or import user accounts, control
authentication, synchronize with the Active Directory, and manage policy group membership,
as
needed.
The following table describes the Endpoint Encryption
user roles:
Role
|
Description
|
Administrator
|
Administrators may access the management consoles and perform any
configurations within their domain. This role has different rights depending on the
level
that the administrator role is added:
|
Authenticator
|
Authenticators provide remote assistance when users forget their Endpoint Encryption passwords or have technical problems. This
role has different rights depending on the level that the authenticator role is added:
|
User
|
Basic end users have no special privileges. The user role may not log on the Endpoint Encryption management consoles. Unless allowed by
PolicyServer, the user role also may not use recovery tools.
|
![]() |
NoteTo configure Endpoint Encryption users, use the
Endpoint Encryption Users widget. See Endpoint Encryption Users.
|
Groups
Endpoint Encryption manages policies by user groups.
Groups management differs between PolicyServer MMC and Control Manager. After modifying policies and groups, PolicyServer
synchronizes groups across both consoles.
![]() |
ImportantControl Manager always takes precedence over
PolicyServer MMC for policy and group assignment. Any modifications to the group assignment
in
PolicyServer MMC are automatically overwritten the next time that Control Manager synchronizes with PolicyServer.
|
Console
|
Group Management
|
||
Control Manager
|
Endpoint Encryption automatically creates a
group each time a policy with specific targets is deployed. After deployment, modify
the
groups a user is in from the Endpoint Encryption Users widget, and
modify the users in the policy from the Policy Management screen.
|
||
PolicyServer MMC
|
Add and modify groups directly from the left pane of PolicyServer MMC.
Groups in PolicyServer MMC can be assigned as follows:
|
![]() |
NoteTo configure the users within a policy group on Control Manager, use the Endpoint Encryption Users widget. See Endpoint Encryption Users.
To configure users within a policy group on PolicyServer MMC, see the Endpoint
Encryption PolicyServer MMC Guide.
|