This answer is provided by Infinity AI Copilot and should be confirmed by reviewing official documentation in Support Center.
Yes, Check Point's Media Encryption & Port Protection can be configured to control write access to encrypted USB media based on whether the device is protected by Harmony Endpoint.
Here's how it works:
Protected Devices: Devices with Harmony Endpoint can be configured to allow full read/write access to encrypted media. This ensures that only authorized and protected devices can modify the data.
Unprotected Devices: For devices without Harmony Endpoint, you can set policies to restrict write access. However, users can still access business data from these devices if a password is provided during the encryption process. This allows for read-only access unless otherwise specified by policy.
Policy Configuration: You can define specific write actions in the Media Encryption settings, such as:
- Allowing only encrypted files to be written.
- Blocking any data writing to unprotected devices.
- Allowing user overrides with justification, if necessary.
For more detailed configuration, you can refer to the Harmony Endpoint Administration Guide.
If you need further assistance with setting up these policies, feel free to ask!