The following table explains the policies governing installation privileges on devices with File Encryption installed.
|
Policy Name |
Description |
Value Range and Default |
|---|---|---|
| Allow User to Uninstall | This policy specifies whether a user other than an Administrator can uninstall the endpoint application. |
Yes, No Default: Yes |
