Reference Guide
Security Management Server v10.2.10 AdminHelp
125
Policy-Based Encryption
This technology uses Dell's proprietary data centric encryption to allow user data and computer
encryption. This allows greater protection over individual data than traditional full disk encryption, by
limiting access on a computer to only what a user is authorized to view.
Policy-Based Encryption
Off
On
Off
Toggle to ON to enable
all policy-based
encryption policies. If
this policy is toggled
to OFF, no policy-
based
encryption takes place,
regardless of other
policy values.
On means that all
Policy-
Based Encryption
policies are enabled.
Changing the value of
this policy triggers a
new sweep to
encrypt/decrypt files.
Application Data
Encryption Key
Common
Common, User, User
Roaming
Choose a key to
indicate who can access
files encrypted by
Application Data
Encryption List, and
where.
More...
Common for these files
to be accessible to all
managed users on the
computer where they
were created (the same
level of access as
Common Encrypted
Folders), and encrypted
with the Common
encryption algorithm.
User for these files to
be accessible only to
the user who created
them, only on the
computer where they
were created (the same
level of access as User
Encrypted Folders), and
encrypted with the user
encryption algorithm.
User Roaming for these
files to be accessible
only to the user who
created them, on any
encrypted Windows
computer, and encrypted
with the User
encryption algorithm.
Changes to this policy
do not affect files
already encrypted