This guide gives a brief description on the functions and features of Dell Full Disk Encryption.
The following are common questions that are asked about Dell Full Disk Encryption:
Dell Full Disk Encryption is in the download for Dell Encryption Enterprise and can be downloaded from https://www.dell.com/support. For more information, reference How to Download Dell Encryption Enterprise or Dell Encryption Personal.
The master installer version may be identified to verify system requirements and more. For more information, reference How to Identify the Version of the Dell Data Security Master Installer.
Child installers may be extracted from the master installer to install Dell Full Disk Encryption. For more information, reference How to Extract Child Installers from the Dell Data Security Master Installer.
The version of Dell Full Disk Encryption is identified using the UI or the installer. For more information, reference How to Identify the Dell Full Disk Encryption Version.
Dell Full Disk Encryption system requirements differ between versions. For more information, reference Dell Full Disk Encryption System Requirements.
For supported Windows 10 feature updates, reference Dell Data Security Windows Version Compatibility.
Dell Full Disk Encryption can be installed on Windows. For more information, reference How to Install Dell Full Disk Encryption.
Dell Full Disk Encryption can manually check for policy updates. For more information, reference How to Check for Policy Updates for Dell Data Security.
The log collection process for Dell Full Disk Encryption uses an application that is called DiagnosticInfo to collect the logs. For more information, reference How to Collect Logs for Dell Data Security Using DiagnosticInfo.
The log collection process for the preboot authentication (PBA) environment differs depending on whether the endpoint uses the UEFI or Legacy BIOS mode. For more information, reference How to Collect Logs for the Dell Data Security Pre-Boot Authentication Environment.
Dell Full Disk Encryption can be removed using the Dell Data Security Uninstaller. For more information, reference How to Run the Dell Data Security Uninstaller.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.