Components of Media Encryption & Port Protection

The available actions in Media Encryption & Port Protection are based on the policy configured by your administrator.

  • Port Protection rules control access to removable devices such as:

    • Bluetooth Radio

    • Camera Device

    • Firewire IEEE 1394

    • Smartphones

    • CD/DVD Drives

    • External hard disks

    • Flash Memory

    • USB network devicesz

    • Infrared Devices

    • Keyboard

    • Modems

    • Mouse Device

    Some devices may belong to two categories (or more). For example, a camera is both an audio and video device, so blocking audio devices blocks the cameras as well.

    The policy controls device access for all available ports including USB and Firewire. Policy rules specify access rights for each type of removable storage device and the ports that they can connect to. Policy rules can include requirements for malware scanning and data authorization. In addition, the policy can prevent the connection of unauthorized devices to your computer.

  • Media Encryption allows you to create encrypted storage on removable storage devices that have business-related data. When you create the encrypted storage, two drives show in Windows Explorer. One drive is encrypted for business data. The other drive is not encrypted and can be used for non-business data.

    Your rules can apply different access permissions for business data (encrypted) and non-business data (non-encrypted). In addition, rules can specify which file types are defined as business data and must be stored on encrypted storage.