The following table explains the policies governing installation privileges on devices with File Encryption installed.
Policy Name |
Description |
Value Range and Default |
---|---|---|
Allow User to Uninstall | This policy specifies whether a user other than an Administrator can uninstall the endpoint application. |
Yes, No Default: Yes |