The
primary form of protection that Endpoint Encryption
delivers is prevention of uauthorized user access to encrypted endpoints and devices.
Correctly configuring Endpoint Encryption devices, users,
and policy groups prevents data loss risk from accidental information release or
deliberate sabotage.
Groups act as a container for users for policy management.
Administrators and authenticators within a group have those special privileges only
within that
group, but unassigned administrators and authenticators have that role throughout
the
Enterprise.
|
|
Endpoint Encryption counts the amount
of consecutive logon attempts by a particular user account on a device. If that user
violates
the policy criteria, Endpoint Encryption can reset, lock, or
erase the disk.
|
|
Endpoint Encryption counts the amount
of consecutive logon attempts on a given device or when an agent does not communicate
with
PolicyServer for a given length of time. If a device violates the policy criteria,
Endpoint Encryption can reset, lock, or erase the disk.
|
For a complete list of the configurable methods to authenticate users and devices,
see
Authentication Methods.
Groups
Endpoint Encryption manages policies by user groups.
Groups management differs between PolicyServer MMC and Control Manager. After modifying policies and groups, PolicyServer
synchronizes groups across both consoles.
![]() |
ImportantControl Manager always takes precedence over
PolicyServer MMC for policy and group assignment. Any modifications to the group assignment
in
PolicyServer MMC are automatically overwritten the next time that Control Manager synchronizes with PolicyServer.
|
Console
|
Group Management
|
||
Control Manager
|
Endpoint Encryption automatically creates a
group each time a policy with specific targets is deployed. After deployment, modify
the
groups a user is in from the Endpoint Encryption Users widget, and
modify the users in the policy from the Policy Management screen.
|
||
PolicyServer MMC
|
Add and modify groups directly from the left pane of PolicyServer MMC.
Groups in PolicyServer MMC can be assigned as follows:
|
![]() |
NoteTo configure users within a policy group on PolicyServer MMC, see Groups in PolicyServer MMC.
To configure the users within a policy group on Control Manager, see the Endpoint Encryption Administrator's Guide.
|
Users
Endpoint Encryption users are any user account
manually added to PolicyServer or synchronized with Active Directory.
Endpoint Encryption has
several types of account roles and authentication methods for comprehensive identity-based
authentication and management. Using Control Manager or PolicyServer MMC, you can add or import user accounts, control
authentication, synchronize with the Active Directory, and manage policy group membership,
as
needed.
The following table describes the Endpoint Encryption
user roles:
Role
|
Description
|
Administrator
|
Administrators may access the management consoles and perform any
configurations within their domain. This role has different rights depending on the
level
that the administrator role is added:
|
Authenticator
|
Authenticators provide remote assistance when users forget their Endpoint Encryption passwords or have technical problems. This
role has different rights depending on the level that the authenticator role is added:
|
User
|
Basic end users have no special privileges. The user role may not log on the Endpoint Encryption management consoles. Unless allowed by
PolicyServer, the user role also may not use recovery tools.
|
![]() |
NoteTo configure Endpoint Encryption users, see Users in PolicyServer MMC.
|
Devices
Endpoint Encryption devices are Endpoint Encryption agents that have registered with PolicyServer.
Installing any Endpoint Encryption agent automatically registers
the endpoint with PolicyServer as a new Endpoint Encryption
device. Since multiple Endpoint Encryption agents may protect a
given endpoint, a single endpoint may appear as more than one Endpoint Encryption device on PolicyServer.
Depending on the policy settings, too many consecutive unsuccessful
authentication attempts to the Endpoint Encryption devices delays
the next authentication attempt, locks the Endpoint Encryption
device, or erases all data controlled by the associated Endpoint Encryption agent.
![]() |
NoteTo configure Endpoint Encryption devices, see Devices in PolicyServer MMC.
|