Trusted Location Options

<< Click to Display Table of Contents >>

RayManageSoft Unified Endpoint Manager > 3.1 > User Guide > Appendix I: Preference Settings for Managed Devices > Preference Setting Listing By Behavior > Types of Behavior 

Trusted Location Options

The following settings determine whether RayManageSoft Unified Endpoint Manager trusted locations are used.

 

UseTrustDatabase - determines whether RayManageSoft Unified Endpoint Manager only downloads from trusted  locations.

TrustDatabaseFxd - determines whether users need administrator permissions to change trusted and excluded locations.

 

To Add a Trusted Location

To identify a trusted location, create a key for the location under the following registry key:

[Registry]\ManageSoft\Launcher\CurrentVersion\TrustedLocations

 

Then create the following subkeys and assign values to identify the location.

 

Directory  - the location of the distribution location within the specified host. To include subfolders, append \* to the end of the value.

Host - the computer on which the distribution location is hosted.

Port - the port number for data transfer to the managed device.

Protocol - the protocol for transferring files to the managed device.

 

To Add an Excluded Location

To identify an excluded location, create a key for the location under the following registry key:

[Registry]\ManageSoft\Launcher\CurrentVersion\ExcludedLocations

 

Then create the following subkeys and assign values to identify the location.

 

Directory  - the location of the distribution location within the specified host. To include subfolders, append \* to the end of the value.

Host - the computer on which the distribution location is hosted.

Port - the port number for data transfer to the managed device.

Protocol - the protocol for transferring files to the managed device.

 

How RayManageSoft Unified Endpoint Manager Identifies Trusted Locations

If the UseTrustDatabase preference is set to True, RayManageSoft Unified Endpoint Manager determines trusted locations based on the following rules:

oOnly servers identified under the TrustedLocations key are included unless they are also listed under the ExcludedLocations key.

oIf there are no server identified under the TrustedLocations key, all servers are trusted unless listed under ExcludedLocations key.