Install Guide
Output Meaning
If you are scanning a mapped network drive, the scanning report does not return a
KCID.
UCID The User ID.
As shown in the example above, "_SDENCR_"
The UCID is shared by all the users of that computer.
File The path of the encrypted file.
As shown in the example above, "c:\temp\Dell - test.log"
Algorithm The encryption algorithm being used to encrypt the file.
As shown in the example above, "is still AES256 encrypted"
RIJNDAEL 128
RIJNDAEL 256
AES-128
AES-256
3DES
Use WSProbe
The Probing Utility is for use with all versions of Encryption, with the exception of Encryption External Media policies. Use the
Probing Utility to:
● Scan or schedule scanning of an encrypted computer. The Probing Utility observes the Workstation Scan Priority policy.
● Temporarily disable or re-enable the current user Application Data Encryption List.
● Add or remove process names on the privileged list.
● Troubleshoot as instructed by Dell ProSupport.
Approaches to Data Encryption
If you specify policies to encrypt data on Windows devices, you can use any of the following approaches:
● The first approach is to accept the default behavior of the client. If you specify folders in Common Encrypted Folders or
User Encrypted Folders, or set Encrypt "My Documents", Encrypt Outlook Personal Folders, Encrypt Temporary Files,
Encrypt Temporary Internet Files, or Encrypt Windows Paging File to selected, affected files are encrypted either when they
are created, or (after being created by an unmanaged user) when a managed user logs on. The client also scans folders
specified in or related to these policies for possible encryption/decryption when a folder is renamed, or when the client
receives changes to these policies.
● You can also set Scan Workstation on Logon to Selected. If Scan Workstation on Logon is Selected, when a user logs on, the
client compares how files in currently- and previously-encrypted folders are encrypted to the user policies, and makes any
necessary changes.
● To encrypt files that meet your encryption criteria but were created prior to your encryption policies going into effect, but do
not want the performance impact of frequent scanning, you can use this utility to scan or schedule scanning of the
computer.
Prerequisites
● The Windows device to work with must be encrypted.
● The user to work with must be logged on.
Use the Probing Utility
WSProbe.exe is located in the installation media.
Syntax
wsprobe [path]
Troubleshooting
111