Install Guide

Table Of Contents
Encryption External Media and PCS Interactions
To Ensure Media is Not Read-Only and the Port is Not Blocked
The EMS Access to unShielded Media policy interacts with the Port Control System - Class: Storage > Subclass Storage:
External Drive Control policy. If you intend to set the EMS Access to unShielded Media policy to Full Access, ensure that the
Subclass Storage: External Drive Control policy is also set to Full Access to ensure that the media is not set to read-only and the
port is not blocked.
To Encrypt Data Written to CD/DVD
Set Windows Media Encryption = On.
Set EMS Exclude CD/DVD Encryption = not selected.
Set Subclass Storage: Optical Drive Control = UDF Only.
Use WSScan
WSScan allows you to ensure that all data is decrypted when uninstalling Encryption as well as view encryption status and
identify unencrypted files that should be encrypted.
Administrator privileges are required to run this utility.
NOTE: WSScan must be run in System Mode with the PsExec tool if a target file is owned by the system account.
Run WSScan
1. From the Dell installation media, copy WSScan.exe to the Windows computer to scan.
2. Launch a command line at the location above and enter wsscan.exe at the command prompt. WSScan launches.
3. Click Advanced.
4. Select the type of drive to scan: All Drives, Fixed Drives, Removable Drives, or CDROMs/ DVDROMs.
5. Select the Encryption Report Type: Encrypted FIles, Unencrypted FIles, All FIles, or Unencrypted FIles in Violation:
Encrypted FIles - To ensure that all data is decrypted when uninstalling Encryption. Follow your existing process for
decrypting data, such as issuing a decryption policy update. After decrypting data, but before performing a restart in
preparation for uninstall, run WSScan to ensure that all data is decrypted.
Unencrypted FIles - To identify files that are not encrypted, with an indication of whether the files should be encrypted
(Y/N).
All FIles - To list all encrypted and unencrypted files, with an indication of whether the files should be encrypted (Y/N).
Unencrypted FIles in Violation - To identify files that are not encrypted that should be encrypted.
6. Click Search.
Troubleshooting
107