Media Encryption Access Rules

You can select a global action that defines automatic access to encrypted devices. This has an effect on all Media Encryption & Port ProtectionClosed A component on Endpoint Security Windows clients. This component protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on). Acronym. MEPP. rules, unless overridden by a different ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. or action.

Make sure that the Read Policy allows access to the specified users or devices.

In the Policy view > Data Protection > Access RulesPreset > click the list menu. You can select one of these settings or create your own custom rules for automatic access to encrypted devices:

  • Encrypted storage devices are fully accessible by all users - All users can read and change all encrypted content.

  • All users in the organization can read encrypted storage devices, only owners can modify - All users can read encrypted files on storage devices. Only the media owner can change encrypted content.

  • Only owners can access encrypted storage devices - Only media owners can read and/or change encrypted content.

  • Access to encrypted storage devices requires password authentication - Users must enter a password to access the device. Automatic access in not allowed.

  • Custom - Create a customized automatic access rule to encrypted devices. There are two predefined action rules in this window. You cannot delete these rules or change the media owner or media user. But, you can change the access permissions. The two predefined actions are defaults that apply when no other custom action rules override them. The Any/Media Owner action rule is first by default and the Any/Any action rule is last by default. We recommend that you do not change the position of these rules.

    To create a new customized automatic access rule to encrypted devices:

    1. Configure these settings:

      • In the Encrypted Media Owner field, select one of these options:

        • Rule applies to any encrypted media owner - This action applies to any user.

        • Choose a user/group/ou from your organization - Select the applicable user, group or OU to which this action applies.

      • In the Encrypted Media User field, select one of these options:

        • Rule applies to any encrypted media user - This action applies to any user.
        • Select the media owner as the encrypted media user - The media owner is also defined as the user.

        • Choose a user/group/ou from your organization - Select the applicable user, group or OU to which this action applies.

    2. Click the field in the Access Allowed column, and select one of these parameters:

      • Full Access

      • No Automatic Access

      • Read-Only