Users Guide
• Rare instances of computers failing to resume after hibernation have been addressed. [24571]
• When running the Shield on a computer that has recently updated to the latest version of McAfee Virus Scan 8.7 Patch 5, McAfee
Virus Scan 8.8 Patch 1, or McAfee HIPS 8.0 Patch 1, les can become corrupted.
The issue is that the McAfee driver is being injected below Dell Data Protection | Encryption in the lter stack. Microsoft has conrmed
that there is an problem in the automatic ordering of the drivers when mini-lters and legacy le system lter drivers are present.
Microsoft has also approved our approach of introducing a pass-through mini-lter driver at higher altitude/class to resolve the issue.
This issue is not specic to Dell and was reproduced at Microsoft using only the samples from the Driver Development Kit. Other
backup and encryption vendors aected by McAfee's patches are also using the same approach to resolve the issue.
To resolve this issue, remove the McAfee software patches listed above, restart the computer, and install Dell Data Protection |
Encryption v7.2.3. [24085]
• Previously, when waking from a sleep state, a "No xed storage is found" message was displayed in the local console under the System
Storage tab on some X4 and ACER platforms. This issue has been resolved. [24581]
Technical Advisories v7.2.3
Encryption
• Under some circumstances, the local console "compliance status" displayed for the eSATA port may be dierent than the actual status.
To resolve the issue, reboot the computer.
• On some Dell platforms, the desktop background turns black after the computer wakes from a sleep state. To work around this issue,
go to display settings and reset the desktop background. [24574]
Technical Advisories v7.2.1
Encryption
• When using a desktop computer and attempting to block SD card ports by using the "Port: SD" policy, blocking SD ports will not be
successful. For desktop computers, the "Storage Class: External Drive Control" policy must be used to eectively block SD ports. The
use of the "Storage Class: External Drive Control" policy blocks access to all external storage devices irrespective of what bus they are
on. When using a laptop computer, SD ports can be blocked using the "Port: SD" policy. [23530]
• The F8 "discard the hibernation data" option MUST be used on the rst system restart after software HCA decryption (using the
recovery tool/bundle) is performed on a system drive that contains a valid hibernation le. HCA maintains a drive state value that
identies what drives are encrypted. Because of this, during hibernation resume, HCA attempts to decrypt data that is read from the
disk and encrypt data that is written to the disk (this transition in the hibernation le causes disk corruption). Instructions: 1. Allow HCA
decryption to complete. 2. During the rst reboot after HCA decryption, before the operating system loads, press F8 and select "discard
the hibernation data". The user can now resume normal operation of the computer.
• When using a computer equipped with a Hardware Crypto Accelerator, the Preboot Password Requirement dialog that is displayed is
misleading regarding Hardware Crypto Accelerator usage. The message will be changed in the next major release to display: "A recent
policy update requires the initial setup of the preboot authentication system. To enter the BIOS setup, reboot and click F2 during the
Dell splash screen. Go to the "Security" option and select Preboot Authentication > Set System Password. Enter a password and exit
the BIOS setup." [23205]
• When the Hardware Crypto Accelerator has used all of its lifecycles, the Shield erroneously asks the user for their Hardware Crypto
Accelerator Password and Preboot Password. The message should notify the user that the computer does not have any remaining
lifecycles and to contact their Administrator to get a replacement Hardware Crypto Accelerator. We expect this scenario to rarely occur.
[22492]
• Amended 01/2014 - When using VMware, if the host computer is Shielded (essentially meaning that the port control drivers are
installed on the host), when a user connects a USB device to their computer, and forces it to connect to the OS running on the
VMware computer instead of the host OS, the VMware OS will not be able to access the les on the USB. The Dell port control driver
is a lter driver running on USB stack. VMware is not compatible with USB lter drivers. For more information, see VMware KB article:
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1016809. [20280, 22820,
28522]
• When using Windows Vista (x86 or x64), the Shield failed to load the user's prole. To workaround this issue, reboot the computer.
[23496]
Dell Data Protection | Personal Edition Technical Advisories
Technical Advisories
33