The following procedure explains how to configure a Control Manager policy that affects Endpoint Encryption users and devices.
Endpoint Encryption user and device configuration uses the Endpoint Encryption Users and Endpoint Encryption Devices widgets. See Endpoint Encryption Users and Endpoint Encryption Devices respectively.
If your environment includes Active Directory, ensure that you have configured Active Directory and synchronized all users. See Active Directory Synchronization.
For a general description of authentication process, see Authentication Overview.
The Create Policy screen appears.
None (Draft Only): Create a policy with no targets (endpoints)
A policy with no targets may not be deployed. After creating a draft policy, edit the policy later to specify targets and deploy it to your environment.
Filter by Criteria: Endpoint Encryption does not support filtering by criteria
Specify Target(s): Specify existing endpoints.
For more information about policy targets, see Specifying Policy Targets.
Endpoint Encryption settings are divided into the following rule sets:
Rule Set |
Reference |
---|---|
Users |
|
Full Disk Encryption |
|
File Encryption |
|
Common |