
Installation Guide 95
This policy template:
• provides protection of the System Drive and all Fixed Drives.
• provides Hardware Crypto Accelerator encryption (when a compatible Hardware Crypto Accelerator is detected on the
client computer).
• prompts users to encrypt Removable Storage devices.
• provides the ability to write only UDF CD/DVDs. Port control configuration allows read access to all optical drives.
Basic Protection for All Fixed Drives
This policy template:
• provides protection of the System Drive and all Fixed Drives.
• provides Hardware Crypto Accelerator encryption (when a compatible Hardware Crypto Accelerator is detected on the
client computer).
• provides the ability to write CD/DVDs in any supported format. Port control configuration allows read access to all
optical drives.
This policy template does not:
• provide encryption for Removable Storage devices.
Basic Protection for System Drive Only
This policy template:
• provides protection of the System Drive, typically the C: drive, where the operating system is loaded.
• provides Hardware Crypto Accelerator encryption (when a compatible Hardware Crypto Accelerator is detected on the
client computer).
• provides the ability to write CD/DVDs in any supported format. Port control configuration allows read access to all
optical drives.
This policy template does not:
• provide encryption for Removable Storage devices.
Basic Protection for External Drives
This policy template:
• provides protection of Removable Storage devices.
• provides the ability to write only UDF CD/DVDs. Port control configuration allows read access to all optical drives.
This policy template does not:
• provide protection for the System Drive (typically the C: drive, where the operating system is loaded) or other Fixed
Drives.
Encryption Disabled
This policy template does not provide encryption protection. Take additional measures to safeguard devices from loss and
theft when using this template.
This template is useful for organizations that prefer to start with no active encryption to transition into security. As the
organization becomes comfortable with their deployment, encryption can be enabled slowly by adjusting individual
policies or by applying stronger templates for portions of or for the entire organization.
Comentarios a estos manuales