Siirry pääsisältöön
  • Tee tilauksia nopeasti ja helposti
  • Tarkastele tilauksia ja seuraa lähetyksen tilaa
  • Luo tuoteluettelo ja käytä sitä

Policy Templates in Dell Encryption Personal

Yhteenveto: Compare policy template options in Dell Encryption Personal (formerly known as Dell Data Protection Personal Edition).

Tämä artikkeli koskee tuotetta Tämä artikkeli ei koske tuotetta Tämä artikkeli ei liity tiettyyn tuotteeseen. Tässä artikkelissa ei yksilöidä kaikkia tuoteversioita.

Ohjeet

Learn about policy template options in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Operating Systems:

  • Windows

When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.

This provides an overview of what the templates are designed to encrypt.

Caution: Changing policy templates or applying custom policy settings impacts both the scope of encrypted data and the way that it is encrypted. Dell Technologies recommends contacting Dell ProSupport with any questions before making modifications.
  • Aggressive Protection for All Fixed Drives and External Drives1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Three Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: High
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
  • PCI Data Security Standard Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Data Breach Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • HIPAA Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives and External Drives (Default)
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for System Drive Only
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for External Drives
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Encryption Disabled
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: No Overwrite
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf

1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Tuotteet, joihin vaikutus kohdistuu

Dell Encryption
Artikkelin ominaisuudet
Artikkelin numero: 000125500
Artikkelin tyyppi: How To
Viimeksi muutettu: 27 elok. 2024
Versio:  8
Etsi vastauksia kysymyksiisi muilta Dell-käyttäjiltä
Tukipalvelut
Tarkista, kuuluuko laitteesi tukipalveluiden piiriin.