Administrative Configuration for Enterprise IT
IT departments need to configure CipherShed and to confiure what the user (non-IT support) may configure.
Enterprise Policy may require or limit what a user may do on their assigned corporate asset.
Examples include which algorithms, password complexity, removable media encryption, key escrow, etc.
In a windows environment this is managed by Active Directory.
#1 Updated by Jason Pyeron about 6 years ago
Also add (https://forum.truecrypt.ch/t/suggesting-simplified-disk-mounting/425) application user profiles.
hidden by default menu options, tools installed / not installed, etc.
#2 Updated by Jason Pyeron about 6 years ago
- support silient installer - https://forum.truecrypt.ch/t/windows-unattended-installer-install-truecrypt-silently/176/2
- support entropy source(s) - e.g. file/pipe/shared library/web service (https://pthree.org/2014/07/23/entropy-as-a-service/)
#3 Updated by Jason Pyeron about 6 years ago
- silient uninstall - https://forum.truecrypt.ch/t/silent-uninstall-of-truecrypt/195