Dell Data Protection

Administrator Guide 19
EMS Access and Device Code Length
8, 16, or 32
Number of characters Access and Device Codes have. 32 characters is the most secure, while 8
is the easiest to enter.
EMS Cooldown Time Delay
0-5000 seconds
Number of seconds the user must wait between the first and second rounds of Access Code
entry attempts.
EMS Cooldown Time Increment
0-5000 seconds
Incremental time to add to the previous cooldown time after each unsuccessful round of
Access Code entry attempts.
EMS Access Code Failed Message
String - 5-512 characters - You are not authorized to use this media. Please contact your system
administrator.
Message that displays following unsuccessful Access Code Attempts Allowed.
Message policies must have non-blank values.
“Space” and “Enter” characters used to add lines between rows count as characters used.
Messages over the 512 character limit are truncated in the client software.
Dell recommends that you customize the message to include specific instructions about how
to contact the Help Desk or Security Administrator.
EMS Encryption Rules See the AdminHelp for instructions on how to use this policy.
Encryption rules used to encrypt/not encrypt certain drives, directories, and folders.
A total of 2048 characters are allowed. “Space” and “Enter” characters used to add lines
between rows count as characters used. Any rules exceeding the 2048 limit are ignored.
Storage devices that incorporate multi-interface connections, such as Firewire, USB, and
eSATA, may require the use of both EMS and encryption rules to encrypt the endpoint. This is
necessary due to differences in how the Mac operating system handles storage devices based on
interface type.
EMS Block Access to UnShieldable
Media
True or Fa lse
Block access to any removable storage that is less than 20MB and thus has insufficient storage
capacity to host EMS (such as a 1.44MB floppy disk).
All access is blocked if
Encrypt External Media
and this policy are both
Tr ue
. If
Encrypt
External Media
is
True
, but this policy is
False
, data can be read from the non-encryptable
removable storage, but write access to the media is blocked.
If
Encrypt External Media
is
False
, then this policy has no effect and access to non-encryptable
removable storage is not impacted.
Shield Permissions
Policy Proxy Connections
String - maximum of 1500 characters
Fully Qualified Dell Policy Proxy host names, or IP addresses, separated by carriage returns.
When polling for policy updates, the client software will attempt to connect to the Dell Policy
Proxy hosts in the order shown until a connection is successful.
The client computer’s configuration file (com.dell.ddp.plist) may specify additional Dell
Policy Proxy host names, which are not listed here. However, the client computer will attempt
to connect to the Dell Policy Proxy hosts specified in this policy before those specified in the
client software’s configuration file.
Policy Proxy Polling Interval
1-1440 minutes
The interval that the client software attempts to poll the Dell Policy Proxy for policy updates
and send inventory information to the Dell Policy Proxy.