31.11 Encryption Policies

In the navigation bar, select "Encryption Policies" to view policy information for computers (groups) and users (groups), and to set, modify, or delete policies. Policies support inheritance (stacking) and include: encryption authorization settings, encryption parameter settings, document backup settings, long-term offline authorization, and secure communication settings.

In the object selection area, choose an object and click the settings icon button:

  • Select "Encryption Authorization Management → Enable Transparent Encryption" to enable encryption authorization for the client.
  • Select "Encryption Authorization Management → Enable Read-Only Encryption" to enable read-only encryption for the client.
  • Select "Encryption Authorization Management → Revoke Encryption Authorization" to revoke encryption authorization for the client.

Select a specific encryption policy in the navigation bar and a computer (group) in the object selection area. The rightmost view will display the policy settings page, where you can click the button on the far right to set or modify the policy.

Encryption policy settings are the same as those in the console.