Unencrypted Endpoint Drive

An unencrypted endpoint drive refers to a Windows or macOS device drive that does not have data encryption applied. Data on such drives is not protected by encryption, making it vulnerable to unauthorized access if the device is lost or stolen.

Creating a new Unencrypted Endpoint Drive policy

To create a new Unencrypted Endpoint Drive policy:

  1. From the Device Posture tab, select + ADD :

    Add new device posture policy

  2. Select Add to Windows or Add to macOS .

    The Add new device policy dialog appears.

  3. Select Unencrypted Endpoint Drive from the Select policy type dropdown.

    Add new Unencrypted Endpoint Drive policy

  4. Select the policy Action :
    • Review : No auto-remediation is performed and a ticket is raised and classified as requiring review. The ticket remains open until either the admin user closes it manually or the vulnerability is observed by the Coro endpoint agent as being resolved.
  5. Enter label names (predefined or custom) to the Labels field listed under Apply policy to devices with these labels to apply the new policy to specific groups of devices.

    Apply device policy labels

  6. Select SAVE .

    The policy is created with the configured settings.

    note

    When encryption is disabled on a device drive, an Unencrypted endpoint drive ticket type is created.

The policy can be viewed by selecting the dropdown next to Unencrypted Endpoint Drive on the Device Posture tab. See Device posture configuration overview.

The following policy details are displayed:

  • Device labels applicable to the policy.
  • The action(s) applicable to the policy, for example, Review .

    View Unencrypted Endpoint Drive policy