|Modules / Location-based File Encryption|
As multiple File Encryption policies can be assigned to a user/computer, conflicts may occur. Two rules are considered as conflicting, if they have the same values for path, mode and subdirectory, but the key to be used is different. In this case the rule from the File Encryption policy with the higher priority applies. The other rule is discarded.