Controlling access to the volume

This protection prevents applications from bypassing security checks that the file system of the system disk conducts, and makes it possible to access the raw volume directly.

In the rules, you can allow or prohibit access to the raw volume by the applications of your choice.

In whitelist mode, a single rule may be enough to authorize access for some applications and block it for all others. You must create several rules if you want to select different log settings. In this case, define “Block” as the default behavior in only the last rule.

EXAMPLE
Example of a rule prohibiting all applications, except legitimate applications, from accessing the volume.