Configuring a Check Point Full Disk Encryption Policy

You can use the default Full Disk Encryption rule Default Full Disk Encryption settings for the entire organization. Edit the actions of the rule to your requirements. and install the policy.

Alternatively, use the following procedure to create a new Check Point Full Disk Encryption policy rule and configure actions for a specific organizational unit. After you install the Full Disk Encryption policy, make sure the policy is installed on the client.