Is anyone using policy rules to enforce Encryption?
- Content Protection Strength IT policy rule
- External File System Encryption Level IT policy rule
- Force Content Protection of Master Keys IT policy rule
What have been some experiences after applying?