The table contains the protection scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one protection scope that includes all shared directories.
Protection scope settings
Setting |
Description |
---|---|
Merge inherited values |
This check box enables or disables the merging of the list of exclusions when inherited in child policies. If the check box is selected, items in the list of the parent policy are displayed in child policies, and items can be added to the list of the child policy. If the check box is cleared, the list items are not merged when inheriting policy settings. This check box is cleared by default. |
Scope name |
Protection scope name. |
Path |
Path to the directory that the application scans. |
Status |
The status indicates whether the application scans this scope. |
You can add, edit, delete, move up, and move down items in the table.
The application scans objects in the specified scopes in the order in which these scopes appear in the list. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.
You can also import the list of protection scopes from a file by clicking Import or export the list of protection scopes to a file in JSON format by clicking Export. When importing, you are prompted to replace the list of protection scopes or add protection scopes to the existing list.
Page top