Dell Data Protection | Encryption Manual de instalación Pagina 87

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 102
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 86
Installation Guide 87
Application
Data
Encryption
List
winword.exe
excel.exe
powerpnt.exe
msaccess.exe
winproj.exe
outlook.exe
acrobat.exe
visio.exe
mspub.exe
notepad.exe
wordpad.exe
winzip.exe
winrar.exe
onenote.exe
onenotem.exe
String - maximum of 100 entries of 500 characters each
We do not recommend adding explorer.exe or iexplorer.exe to
the ADE list, as unexpected or unintended results may occur.
However, explorer.exe is the process used to create a new
Notepad file on the desktop using the right-click menu. Setting
encryption by file extension, instead of the ADE list, provides
more comprehensive coverage.
List process names of applications (without paths) whose new
files you want encrypted, separated by carriage returns. Do not
use wildcards.
We strongly recommend not listing applications or installers
that write system-critical files. Doing so could result in
encryption of important system files, which could make a
Windows endpoint unbootable.
Common process names:
Outlook: outlook.exe
Word: winword.exe
FrontPage: frontpg.exe
PowerPoint: powerpnt.exe
Access: msaccess.exe
WordPad: wordpad.exe
Microsoft Paint: mspaint.exe
Excel: excel.exe
The following hard-coded system and installer process names are
ignored if specified in this policy:
hotfix.exe
update.exe
setup.exe
msiexec.exe
wuauclt.exe
wmiprvse.exe
migrate.exe
unregmp2.exe
ikernel.exe
wssetup.exe
svchost.exe
Application
Data
Encryption
Key
Common
Common, User, User Roaming
Choose a key to indicate who should be able to access files
encrypted by Application Data Encryption List, and where.
Common if you want these files to be accessible to all managed
users on the endpoint where they were created (the same level of
access as Common Encrypted Folders), and encrypted with the
Common Encryption Algorithm.
User if you want these files to be accessible only to the user who
created them, only on the endpoint where they were created (the
same level of access as User Encrypted Folders), and encrypted
with the User Encryption Algorithm.
User Roaming if you want these files to be accessible only to the
user who created them, on any encrypted Windows endpoint,
and encrypted with the User Encryption Algorithm.
Changes to this policy do not affect files already encrypted
because of this policy.
Encrypt
Outlook
Personal
Folders
Tru e False True encrypts Outlook Personal Folders.
Encrypt
Tem p Fi les
Tru e False
True encrypts the paths listed in the environment variables
TEMP and TMP with the User Data Encryption Key.
To reduce encryption sweep time, the client clears the contents
of the TEMP and TMP folders for initial encryption, as well as
updates to this policy. However, if you use a third-party
application that requires the file structure within the \temp
directory to be preserved, you should prevent this deletion.
To disable temporary file deletion, create DeleteTempFiles
(REG_DWORD) and set its value to 0 in the registry at
HKLM\SOFTWARE\Dell\CMGShield.
Vista de pagina 86
1 2 ... 82 83 84 85 86 87 88 89 90 91 92 ... 101 102

Comentarios a estos manuales

Sin comentarios