Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Policy Templates in Dell Encryption Personal

Resumen: Compare policy template options in Dell Encryption Personal (formerly known as Dell Data Protection Personal Edition).

Este artículo se aplica a: Este artículo no se aplica a: Este artículo no está vinculado a ningún producto específico. En este artículo no se identifican todas las versiones de los productos.

Instrucciones

Learn about policy template options in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Operating Systems:

  • Windows

When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.

This provides an overview of what the templates are designed to encrypt.

Caution: Changing policy templates or applying custom policy settings impacts both the scope of encrypted data and the way that it is encrypted. Dell Technologies recommends contacting Dell ProSupport with any questions before making modifications.
  • Aggressive Protection for All Fixed Drives and External Drives1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Three Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: High
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
  • PCI Data Security Standard Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Data Breach Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • HIPAA Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives and External Drives (Default)
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for System Drive Only
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for External Drives
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Encryption Disabled
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: No Overwrite
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf

1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Productos afectados

Dell Encryption
Propiedades del artículo
Número de artículo: 000125500
Tipo de artículo: How To
Última modificación: 27 ago 2024
Versión:  8
Encuentra las respuestas que necesitas con la ayuda de otros usuarios de Dell
Servicios de asistencia
Comprueba si tu dispositivo está cubierto por los servicios de asistencia.