Working with Actions in a Rule
Each Media Encryption & Port Protection rule includes these main action types:
- - Controls how users can read devices that are protected by the policy
- - Controls how and when users can write to devices that are protected by the policy
- - Controls access to different types of peripheral devices
Media Encryption & Port Protection rules also contain these action types:
- - Controls access to devices that are connected a non-protected computer
- - Configures scanning of storage devices for malware and unauthorized file types.
- - Controls when Media Encryption & Port Protection creates log entries when a storage device is attached to an endpoint computer
- - Controls when and how to tell users about policy violations and optionally lets them override a policy.
- - Controls when to allow or prevent access to drives encrypted by different Endpoint Security Management Servers
- - Defines the default automatic action that applies to all rules, unless overridden by a different rule or action.