Reference Guide
Data Guardian Technical Advisories
This document provides information about Data Guardian features and changes in each major release, any issues resolved from a prior
release, and any technical advisories in the current release.
Data Guardian provides security, authority, and forensic visibility - all through a single solution. The product is available from Windows,
Mac, or iOS and Android mobile devices with cross-platform compatibility. The Data Guardian web portal, if set up by the administrator,
allows internal and external users to view or edit encrypted files in a web browser, without installing the Data Guardian client.
Protect - Based on policies, Data Guardian can encrypt data in many file types to protect data at rest, data in motion, and data in use.
• Basic File Protection - The enterprise administrator defines non-Office file extensions to protect. A sweep encrypts those file types.
• Office documents (.docx, .pptx, .xlsx, .docm, .pptm, .xlsm, .pdf) - Policies determine the level of security:
• Opt-in protection - The user chooses which Office documents to protect.
• Forced protection - A sweep protects all Office documents stored on the local computer, providing a higher level of security.
If an unauthorized user tries to open the file, only a cover page displays. However, users can grant access to an external user, and the
cover page provides information for viewing the encrypted file on a mobile device or the Data Guardian web portal.
Protected Office documents are supported with Mozy as well as other cloud, email, and NFS storage products.
• Data Classification (Windows with opt-in mode) - For users who classify Office documents that contain sensitive information, like
credit card numbers, a Data Guardian sweep can encrypt specified classification types to prevent unauthorized access.
• Outlook email protection (Windows) - Based on policy, users can protect email attachments or the entire email. If sent to an
external person, the internal user can later revoke access of the key so the external user can no longer open it.
• Cloud protection - Documents uploaded to the cloud from Android or iOS mobile devices are protected.
Control - This product provides authority and Digital Rights Management (DRM) to the administrator to define access and usage control:
• Enforcement of full access lists/blacklists of email domains and addresses for control over file sharing.
• Management of encryption key expirations and polling periods.
Monitor - To support forensic needs, file monitoring provides detailed data usage visibility. Based on policy, it can include:
• Auditing and reporting on file activity, files synced, files accessed by whom, where and when, and compliance reporting.
• Geolocation with map visualization as well as multiple filtering options for audit events.
• A callback beacon can be inserted into each protected Office file if the beacon server is installed as part of the Dell Server Front End.
• Ability to monitor all known IP addresses for cloud service providers and centrally manage encryption keys and data recovery.
Topics:
• Contact Dell ProSupport
• New Features and Functionality v2.8
• Technical Advisories v2.8
• New Features and Functionality v2.7
• Technical Advisories v2.7
• New Features and Functionality v2.6
• Resolved Technical Advisories v2.6
• Technical Advisories v2.6
• New Features and Functionality v2.5
• Resolved Technical Advisories v2.5
• Technical Advisories v2.5
• New Features and Functionality v2.4
• Resolved Technical Advisories v2.4
• Technical Advisories v2.4
• New Features and Functionality v2.3
• Resolved Technical Advisories v2.3
• Technical Advisories v2.3
• New Features and Functionality v2.2
• Resolved Technical Advisories v2.2
1
Data Guardian Technical Advisories 5