This guide gives a brief description on the functions and features of Dell Encryption Personal.
Dell Encryption Personal can be downloaded from https://www.dell.com/support. For more information, reference How to Download Dell Encryption Enterprise or Dell Encryption Personal.
The master installer version may be identified to verify system requirements and more. For more information, reference How to Identify the Version of the Dell Data Security Master Installer.
Child installers may be extracted from the master installer to install Dell Encryption Personal. For more information, reference How to Extract Child Installers from the Dell Data Security Master Installer.
The version of Dell Encryption Personal can be identified using the UI or the installer. For more information, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.
Dell Encryption Personal system requirements differ between versions. For more information, reference Dell Encryption Personal System Requirements.
For supported Windows 10 feature updates, reference Dell Data Security Windows Version Compatibility.
Dell Encryption Personal can be installed on Windows. For more information, reference How to Install Dell Encryption Personal.
When Dell Encryption Personal is initially activated, a policy template must be chosen. Policy templates contain a baseline assortment of different policy settings. For more information, reference Policy Templates in Dell Encryption Personal / Dell Data Protection Personal Edition.
When Dell Encryption Personal is initially activated, a policy template must be chosen. After activation, the policy template may be modified. For more information, reference How to Modify Policy in Dell Encryption Personal / Dell Data Protection Personal Edition.
Backing up the keys, also known as escrowing the keys, can be manually performed within Dell Encryption Personal. For more information, reference How to Manually Back Up Encryption Keys in Dell Encryption Personal.
The recovery bundle may be downloaded through the local management console. For more information, reference How to Download the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle.
The recovery bundle version may be identified in the file properties. For more information, reference How to Identify the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle Version.
The recovery bundle may be run with a user interface or command line. For more information, reference Dell LSA Recovery Guide for Dell Encryption Enterprise and Dell Encryption Personal.
Encrypted files may be identified with Windows System Scan (WSScan). For more information, reference How to Use WSScan for Dell Data Security.
Dell Data Security signing certificate information is made available along with the version in which each signing certificate is used. For more information, reference Dell Data Security Signing Certificate Updates.
Secure hash algorithm 1 (SHA1) code-signing certificates are no longer valid. For more information, reference SHA-1 Signing Certificate Expiration and Deprecation on Dell Data Security Products.
The log collection process for Dell Encryption Personal uses an application that is called DiagnosticInfo.exe. For more information, reference How to Collect Logs for Dell Data Security Using DiagnosticInfo.
Dell Encryption Personal can be uninstalled using the Dell Data Security Uninstaller. For more information, reference How to Run the Dell Data Security Uninstaller.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.