Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This topic explains your options for creating Vormetric policy rules and how to configure these rules in your DSM (Data Security Manager). These rules will determine who or what has access to your encrypted data.


Prerequisites

...

Before you begin, you must:

...