Contents
4 Sanctuary Device Control — Version v4.0.0
Basic operation ........................................................................................155
To use an already defined template .........................................................155
Managing templates.............................................................................155
What is a template............................................................................ 155
To create a template..........................................................................155
To delete, save with another name, rename, import, and export a template ..156
The Log Explorer window in detail ................................................................ 157
Navigation/Control bar.......................................................................... 157
Column Headers ..................................................................................158
The Settings dialog ............................................................................159
Results window...................................................................................164
Criteria/Properties panel........................................................................164
Control buttons panel ...........................................................................164
Sorting and applying criteria to specific fields ............................................164
Available columns.....................................................................................165
Viewing access attempts to devices ............................................................... 167
Viewing client error reports ......................................................................... 170
Viewing Shadowed files...............................................................................171
Shadowing file names only ......................................................................... 173
DVD/CD Shadowing .................................................................................... 173
Forcing an upload of the latest log files ......................................................... 173
To force the immediate retrieval of the latest logs from any client .................. 173
Saving application execution logs to a CSV (comma-separated values) file.............. 174
Chapter 6: Using the Audit Logs Viewer ......................................... 175
To view system administrator activity ............................................................ 176
Search options ......................................................................................... 176
Actions ................................................................................................... 178
Chapter 7: Using the Media Authorizer ..........................................183
Introduction ............................................................................................183
Authorizing users to use specific DVDs/CDs.......................................................186
Pre-requisites.....................................................................................186
To authorize the use of a specific DVD/CD...................................................186
Encrypting removable storage devices ........................................................... 187
Introduction....................................................................................... 187
Pre-requisites.................................................................................... 188
Decentralized encryption.......................................................................189
Limitations.........................................................................................189
To encrypt a specific removable storage device ...........................................190
Removable device encryption methods comparison ..................................... 193
Possible error messages when encrypting a device ......................................194
Authorizing access .................................................................................... 197
Selecting users for a device .................................................................... 197
To grant access to use DVDs/CDs/encrypted removable media....................... 197
To deny access to DVDs/CDs/encrypted removable media.............................199
Selecting devices for a user ................................................................... 200
To grant access to use DVDs/CDs/encrypted removable media...................... 200
To deny access to DVDs/CDs/encrypted removable media............................. 201
Removing media from the database..............................................................202
To remove a DVD/CD..............................................................................202
To remove an encrypted removable storage device ......................................202