Components of Media Encryption & Port Protection

The available actions in Media Encryption & Port Protection are based on the policy configured by your administrator.

  • Port Protection rules control access to removable devices such as:

    • Bluetooth Audio

    • Bluetooth Computer

    • Bluetooth Health

    • Bluetooth HID

    • Bluetooth Imaging

    • Bluetooth Phone

    • Bluetooth Toy

    • Bluetooth Wearable

    • Printers

    • USB Audio

    • USB Health

    • USB HID

    • USB Network

    • USB Smart Card

    • USB Video

    • USB Audio

    • USB Wireless Controller

    Some devices may belong to two categories (or more). For example, a camera is both an audio and video device, so blocking audio devices blocks the cameras as well.

    The policy controls device access for all available ports including USB and Firewire. Policy rules specify access rights for each type of removable storage device and the ports that they can connect to.

  • Your rules can apply different access permissions for business data (encrypted) and non-business data (non-encrypted). In addition, rules can specify which file types are defined as business data and must be stored on encrypted storage.