Reference Guide
Encryption on Server Operating Systems
Encryption of server operating systems is intended for use on computers running in server mode, particularly le servers.
• Encryption on server operating systems is compatible only with Encryption Enterprise and Endpoint Security Suite Enterprise.
• Encryption on server operating systems provides:
– Software encryption
– Removable media encryption
– Port controls
NOTE:
The server must support port controls.
Port Control System policies aect removable media on protected servers, for example, by controlling access and usage
of the server's USB ports by USB devices. USB port policy applies to external USB ports. Internal USB port functionality
is not aected by USB port policy. If USB port policy is disabled, the client USB keyboard and mouse do not function
and the user cannot use the computer unless a Remote Desktop Connection is set up before the policy is applied.
Encryption of server operating systems is for use with:
• File servers with local drives
• Virtual Machine (VM) guests running a server operating system or non-server operating system as a simple le server
• Supported congurations:
– Servers equipped with RAID 5 or 10 drives; RAID 0 (striping) and RAID 1 (mirroring) are supported independent of each other.
– Servers equipped with multi TB RAID drives
– Servers equipped with drives that can be changed out without shutting down the computer
– Server Encryption is validated against industry-leading antivirus providers.. Hard-coded exclusions are in place for these anti-virus
providers to prevent incompatibilities between anti-virus scanning and encryption. If your organization uses an anti-virus provider
that is not listed, see KB article SLN298707 or contact Dell ProSupport for help.
Encryption of server operating systems is not for use with:
• Security Management Servers/Security Management Server Virtuals or servers running databases for Security Management Servers/
Security Management Server Virtual.
• Encryption Personal.
• SED management, PBA advanced authentication or BitLocker Manager.
• Servers that are part of distributed le systems (DFS).
• Migration to or from Encryption on a server operating system. Upgrade from External Media Edition to Encryption of server operating
systems requires that the previous product is uninstalled completely before installing Encryption on server operating systems.
• VM hosts (A VM Host typically contains multiple VM guests.)
• Domain Controllers
• Exchange Servers
• Servers hosting databases (SQL, Sybase, SharePoint, Oracle, MySQL, Exchange, etc.)
• Servers using any of the following technologies:
– Resilient le systems
– Fluid le systems
– Microsoft storage spaces
– SAN/NAS network storage solutions
– iSCSI connected devices
– Deduplication software
8
Requirements