7.1 Creating a Policy

To create a Disk Encryption policy by using the Create New Policy Wizard:

  1. In ZENworks Control Center, click Policies to display the Policies page.

  2. In the Policies panel, click New > Policy to launch the Create New Policy Wizard.

  3. On the Select Platform page, select Windows, then click Next.

  4. On the Select Policy Category page, select Windows Full Disk Encryption Policies, then click Next.

  5. On the Select Policy Type page, select Disk Encryption Policy, then click Next.

  6. On the Define Details page, specify a name for the policy, select the folder in which to place the policy, then click Next.

    The name must be unique among all other policies located in the selected folder. For additional requirements, see Naming Objects in ZENworks Control Center in the ZENworks 11 SP3 ZENworks Control Center Reference.

  7. Proceed with the wizard to define the details of the policy. Refer to the following sections for detailed information about each page of information you must supply:

  8. After you have defined the details listed above and are at the Summary page, review the information to make sure it is correct. If it is incorrect, click the Back button to revisit the appropriate wizard page and make changes. If it is correct, select either of the following options (if desired), then click Finish to create the policy.

    • Create as Sandbox: Select this option to create the policy as a Sandbox version. The Sandbox version is isolated from devices until you publish it. For example, you can assign it to devices, but it is applied only after you publish it. You can also use the Sandbox version to test the policy on devices you’ve designated as test devices. For information, see Section 8.0, Testing a Disk Encryption Policy.

    • Define Additional Properties: Select this option to display the policy’s property pages. These pages let you define system requirements that must be met before the policy can be assigned to a device, assign the policy to devices, and add the policy to policy groups.

  9. To test the policy before assigning it to devices, see Section 8.0, Testing a Disk Encryption Policy.

  10. To assign the policy to devices, see Section 9.0, Assigning a Disk Encryption Policy.