Deployment Guide
Table Of Contents
- Dell Encryption Personal Installation Guide v11.0
- Contents
- Overview
- Requirements
- Download the Software
- Installation
- Advanced Authentication and Encryption Personal Setup Wizards
- Configure Console Settings
- Uninstall the Master Installer
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Policies and Template Descriptions
- Policies
- Template Descriptions
- Aggressive Protection for All Fixed Drives and External Drives
- PCI Regulation Targeted
- Data Breach Regulation Targeted
- HIPAA Regulation Targeted
- Basic Protection for All Fixed Drives and External Drives (Default)
- Basic Protection for All Fixed Drives
- Basic Protection for System Drive Only
- Basic Protection for External Drives
- Encryption Disabled
- Extract Child Installers
- Troubleshooting
- Glossary
Policy Aggre
ssive
Protec
tion
for All
Fixed
Drives
and
Extern
al
Drives
PCI
Regula
tion
Data
Breac
h
Regula
tion
HIPAA
Regula
tion
Basic
Protec
tion
for All
Fixed
Drives
and
Ext
Drives
(Defau
lt)
Basic
Protec
tion
for All
Fixed
Drives
Basic
Protec
tion
for
Syste
m
Drive
Only
Basic
Protec
tion
for
Extern
al
Drives
Encry
ption
Disabl
ed
Description
Prevent
Unsecure
d
Hibernatio
n
True False True False When enabled, the client
does not allow computer
hibernation if the client
is unable to encrypt the
hibernation data.
Workstati
on Scan
Priority
High Norm Highest, High, Normal,
Low, Lowest
Specifies the relative
Windows priority of
encrypted folder scanning.
User
Encrypted
Folders
String - maximum of 100
entries of 500 characters
each (up to a maximum of
2048 characters)
A list of folders on the
endpoint hard drive to be
encrypted with the User
data encryption key or
excluded from encryption.
This policy applies to
all drives classified by
Windows as Hard Disk
Drives. You cannot use this
policy to encrypt drives
or removable media whose
type displays as Removable
Disk, use EMS Encrypt
External Media instead.
User
Encryptio
n
Algorithm
AES256 AES 256, Rijndael 256,
AES 128, Rijndael 128
Encryption algorithm used
to encrypt data at the
individual user level. You
can specify different
values for different users
of the same endpoint.
User Data
Encryptio
n Key
User Common User Common User Common or User
Choose a key to indicate
who can access files
encrypted by the following
policies, and where:
• User Encrypted Folders
• Encrypt Outlook Personal
folders
Policies and Template Descriptions 49