User Permissions in Anchor
This article gives an overview of the permissions that Anchor users have access to.
You will learn:
- What user permissions are.
- Which permissions users have access to and what they do.
User permissions: Actions available for users when following access rules.
Endpoint users have been given all permissions listed below:
For detailed tutorials on using, User permission please watch the following videos.
The Anchor Platform
This article gives an introduction to the main components of the Anchor. The Anchor platform is comprised of multiple components: Windows 10 Agent: Enforce control over unstructured data located on endpoint machines. Server Agents: Anchor, monitor, ...
Anchor Certified Application
What are Anchor Certified Applications? Anchor maintains a list of certified applications, which are applications that have been reviewed by Anchor to ensure plain text does not leak from their normal operations. Anchor allows the organization to ...
This article gives an overview of user roles. You will learn: What user roles are? How to view and edit a user role? User roles are user groups that allow for the management of your data control strategy. The User roles tab provides easy access to ...
What Are Anchored Files?
This article gives an overview of Anchored files, Anchoring and unAnchoring. You will learn: What Anchored files are. How to Anchor files using Egnyte. How to unAnchor files using Egnyte. How to Anchor files in a protected folder. How to unAnchor ...
Admin Approved Applications
What are admin approved applications? Organizations may also maintain a list of admin approved applications. These are applications not certified by Anchor that organizations trust to consume controlled content. Note, the organization takes ...