This section contains the following topics:
Specify Which Removable Devices To Monitor
Configure Encrypt Actions in the User Policy
Educate Your Users About the Encryption Utility
CA Data Protection Cannot Encrypt Files Copied to Network Locations
Copyright © 2015 CA Technologies.
All rights reserved.
|
|