Contents
2 Sanctuary Device Control Administrator's Guide 4.2.2
Assigning permissions to groups instead of users ................................................................................ 42
Shadowing notes ........................................................................................................................ 42
Chapter 3: Using the Device Explorer ............................................................................. 47
How does the Device Explorer work ...................................................................................................... 48
Restricted and unrestricted devices ...................................................................................................... 49
Optimizing the way you use the Device Explorer ...................................................................................... 50
Context menu and drag & drop ...................................................................................................... 50
Keyboard shortcuts ...................................................................................................................... 51
Adding comments to an entry ........................................................................................................ 51
Computer groups ........................................................................................................................ 51
Renaming Computer Groups/Device Groups/Devices ............................................................................. 52
Event notification ....................................................................................................................... 52
Device Groups ............................................................................................................................ 55
Supported devices types .................................................................................................................... 56
Managing permissions ....................................................................................................................... 56
Chapter 4: Managing permissions/rules ......................................................................... 57
Using the Permissions dialog .............................................................................................................. 57
Special case: Working with Removable Storage Devices ........................................................................ 59
Using file filters ............................................................................................................................... 60
To remove File Filtering settings from a permission ............................................................................. 63
File Filtering examples ................................................................................................................. 64
Adding a user or group when defining a permission ................................................................................. 66
To assign default permissions ............................................................................................................. 67
Root-level permissions ................................................................................................................. 67
To assign default permissions to users and groups .............................................................................. 68
Priority of default permissions ....................................................................................................... 69
Read/Write permissions ................................................................................................................ 70
To assign computer-specific permissions to users and groups ...................................................................... 71
To modify permissions.................................................................................................................. 72
To remove permissions ................................................................................................................. 73
To assign scheduled permissions to users and groups ............................................................................... 73
To modify scheduled permissions.................................................................................................... 74
To remove scheduled permissions ................................................................................................... 75
To assign temporary permissions to users .............................................................................................. 75
To remove temporary permissions ................................................................................................... 76
To assign temporary permissions to offline users ..................................................................................... 76
To assign online and offline permissions ...............................................................................................80
To remove offline or online permissions ........................................................................................... 81
To export and import permission settings .............................................................................................. 81
Shadowing devices ........................................................................................................................... 82
To shadow a device ..................................................................................................................... 83
To remove the shadow rule ........................................................................................................... 84
To view a ‘shadowed’ file ............................................................................................................. 84
Copy limit ....................................................................................................................................... 84
To add a copy limit ...................................................................................................................... 85
To remove a copy limit ................................................................................................................. 86
Applying multiple permissions to the same user ...................................................................................... 86
Forcing users to encrypt removable storage devices .................................................................................. 87
Setting permissions to force users to encrypt removable storage devices .................................................. 87
Managing devices ............................................................................................................................ 92
To add a new device .................................................................................................................... 93
To remove a device ...................................................................................................................... 94
Specific, unique, removable devices ................................................................................................ 94
Changing permissions mode .......................................................................................................... 95
Priority options when defining permissions ...................................................................................... 95
Informing client computers of permission changes .................................................................................. 96
Chapter 5: Using the Log Explorer ................................................................................ 99
Introduction ................................................................................................................................... 99
Monitoring user input/output device actions ..................................................................................... 99
Monitoring administrator actions ................................................................................................... 100
Accessing the Log Explorer ................................................................................................................. 101
Log Explorer templates ..................................................................................................................... 102
To use an existing template .......................................................................................................... 103
To create and use a new template ................................................................................................. 103
Log Explorer window........................................................................................................................ 104
Navigation/Control bar ................................................................................................................ 105
Column headers ......................................................................................................................... 105
Results panel / custom report contents ............................................................................................ 109
Criteria/Properties panel ............................................................................................................... 111
Control button panel ................................................................................................................... 111
Select and edit templates window ....................................................................................................... 111