Controlling access to the volume

This protection prevents applications from bypassing security checks that the file system of the system disk conducts, and makes it possible to access the raw volume directly.

In the rules, you can allow or prohibit access to the raw volume by the applications of your choice.

A single rule may suffice in whitelist mode to allow access to certain applications and block it for all other applications. You must create several rules if you want to select different log settings. In this case, define “Block” as the default behavior in only the last rule.

EXAMPLE
Example of a rule prohibiting all applications, except legitimate applications, from accessing the volume.