Reference Guide

Navigate the Dell Server
68
Windows Encryption Self-Encrypting Drive (SED)
Self
-Encrypting Drive (SED) Off Off
Windows Encryption
Hardware Crypto Accelerator
(HCA)
Hardware Crypto Accelerator
(HCA)
Off Off
Windows Encryption Policy-Based Encryption
SDE Encryption Enabled
Not Selected Not Selected
Windows Encryption
Policy-Based Encryption
Common Encrypted Folders
<retain default settings>
<retain default settings>
Windows Encryption
Policy-Based Encryption
Encrypt Windows Paging File
Not Selected
Not Selected
Windows Encryption
Policy-Based Encryption
Secure Windows Credentials
Not Selected
Not Selected
Windows Encryption Policy-Based Encryption
Block Unmanaged Access to
Domain Credentials
Not Selected Not Selected
Windows Encryption Policy-Based Encryption
Secure Windows Hibernation
File
Not Selected Not Selected
Windows Encryption Policy-Based Encryption
Prevent Unsecured
Hibernation
Not Selected Not Selected
Windows Encryption Policy-Based Encryption
Enable Software Auto
Updates
Not Selected Not Selected
Windows Encryption BitLocker Encryption
BitLocker Encryption
Off Off
Windows Encryption Server Encryption
Server Encryption
Off Off
Threat Prevention
Advanced Threat Protection
Advanced Threat Protection
On
On
Removable Media Encryption
Mac Media Encryption
Mac Media Encryption
Off
Off
Port Control
Windows Port Control
Port Control System
Disabled
Disabled
Persistent vs. Non-Persistent VDI
Persistent and Non-Persistent VDI endpoints differ in the following ways:
Persistent VDI Non-Persistent VDI
Persistent
endpoints may
exist for many days
to years.
Non-persistent
endpoints usually
exist only for a few
days or weeks.
Persistent
endpoints retain the
configurations that
are set for the VM,
until the VM clone
pool is removed
and rebuilt.
Non-persistent
endpoints revert to
baseline settings
after a user logs
off.
A persistent
After reverting to