...
Widget Connector | ||
---|---|---|
|
Overview
This topic explains your options for creating Vormetric policy rules and how to configure these rules in your DSM (Data Security Manager). These rules will determine who or what has access to your encrypted data.
...
- Know how to Create a starter policy with learn mode
- Review Vormetric Policy Planning
- Log into the DSM as Security Administrator
What Are Policy Rules?
A policy rule is a statement that gives you options to allow, deny, apply an encryption key, and audit access attempts on a GuardPoint based on a combination of 6 criteria. The policy rules are analyzed in descending order, similar to firewall rules, which means the order of these rules is important.
...
Expand | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
The Effect field must be completed; this is the only mandatory field to complete in order to create a policy rule. The Effect field will either permit or deny access, and additionally, determine if the rule should be audited or if the encryption key will be applied. The following table shows the available options:
|