The Effect field must be completed; this is the only mandatory field to complete in order to create a policy rule. The Effect field will either permit or deny access, and additionally, determine if the rule should be audited or if the encryption key will be applied. The following table shows the available options: Type of Effect | Action |
---|
Permit | Permits access to the data. | Deny | Denies access to the data. | Apply Key | Encrypts the data written into the GuardPoint with the key specified in the Key Selection Rules tab. | Audit | Creates an entry in the Message Log that describes: - What data was accessed
- When the data was access
- The applied security rule
|
|