This contains the following policy settings:
These are applications that are exempted from CFSA control. That is, users can save files to any network location if they are using a trusted application.
For example, you may not need to monitor an in‑house system application that always encrypts files when saving. By default, lsass.exe is always included in this list—see the ‘trusted application’ definition in CFSA terminology.
In the Trusted Application List setting, add the applications you want to exempt from the CFSA. You must supply the executable or process name, such as Winword.exe.
Note: Trusted applications override any network location filters. Users can save files directly from a trusted application to any network location.
This setting determines how the agent handles attempts to copy files to unlisted network locations (that is, any not listed in Special Locations List). The available actions are exactly the same as for special locations (see below).
Note: If no special locations are listed, the default handling is applied to all network locations.
This is a list of network locations that require specific handling by the CFSA. You can either list the locations you want the CFSA to control or the ones you want it to ignore. In the Special Locations List setting, specify the network locations that you want to detect. You must supply the UNC path, for example:
\\UX-FILESVR-01\New Project\Reports
Note: If a path contains spaces, you do not need to enclose it in quotes.
This setting determines how the CFSA handles attempts to copy files to a network location listed in Special Locations. The available actions are:
The user is allowed to copy files to special locations. Policy is not applied.
The user is not allowed to copy files to special network locations (unless they are using a trusted application).
If the user attempts to copy a file to a special location using:
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |