Siirry pääsisältöön
  • Tee tilauksia nopeasti ja helposti
  • Tarkastele tilauksia ja seuraa lähetyksen tilaa
  • Luo tuoteluettelo ja käytä sitä
  • Hallitse Dell EMC-sivustoja, tuotteita ja tuote-tason yhteystietoja yrityksen hallinnan avulla.
Jotkin artikkelinumerot ovat saattaneet muuttua. Jos tämä ei vastaa odotuksiasi, yritä hakea kaikista artikkeleista. Hae artikkeleista

Policy Templates in Dell Encryption Personal / Dell Data Protection Personal Edition

Yhteenveto: This article contains a comparison of policy templates in Dell Encryption Personal / Dell Data Protection Personal Edition.

Tämä artikkeli on saatettu kääntää automaattisesti. Jos sinulla on palautetta sen laadusta, ilmoita siitä meille käyttämällä tämän sivun alareunassa olevaa lomaketta.

Artikkelin sisältö


Oireet

This article provides an overview of policy templates in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

Dell Encryption Personal
Dell Data Protection | Personal Edition

Affected Operating Systems:

Windows


Syy

Not applicable.

Tarkkuus

When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.

This provides an overview of what the templates are designed to encrypt.

Warning: Changing policy templates or applying custom policy settings impacts both the scope of encrypted data and the way that it is encrypted. Dell Technologies recommends contacting Dell ProSupport with any questions before making modifications.
 
  System Drive Encryption Fixed Drive Encryption External Drive Encryption Template Differences
Aggressive Protection for All Fixed Drives and External Drives1 Yes Yes Required Secure Post-Encryption Cleanup:
Three Pass Overwrite
User Data Encryption Key:
User
Workstation Scan Priority:
High
EMS Access to unShielded Media:
Block
EMS Encryption Rules:
R#:\
PCI Data Security Standard Targeted1 Yes Yes Required Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
Common
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Block
EMS Encryption Rules:
R#:\
-R#:\Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
Data Breach Regulatory Targeted1 Yes Yes Optional Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
Common
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Read Only
EMS Encryption Rules:
R#:\
-R#:\Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
HIPAA Regulatory Targeted1 Yes Yes Optional Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
User
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Read Only
EMS Encryption Rules:
R#:\
-R#:\ Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
Basic Protection for All Fixed Drives and External Drives (Default) Yes Yes Optional Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
Common
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Read Only
EMS Encryption Rules:
R#:\
-R#:\ Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
Basic Protection for All Fixed Drives Yes Yes No Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
Common
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Full Access
EMS Encryption Rules:
R#:\
-R#:\ Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
Basic Protection for System Drive Only Yes No No Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
Common
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Full Access
EMS Encryption Rules:
R#:\
-R#:\ Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
Basic Protection for External Drives No No Optional Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
Common
Workstation Scan Priority:
Normal
EMS Access to unShielded Media:
Read Only
EMS Encryption Rules:
R#:\
-R#:\ Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
Encryption Disabled No No No Secure Post-Encryption Cleanup:
Single Pass Overwrite
User Data Encryption Key:
User
Workstation Scan Priority:
No Overwrite
EMS Access to unShielded Media:
Full Access
EMS Encryption Rules:
R#:\
-R#:\ Black Berry
^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf

1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Artikkelin ominaisuudet


Tuote, johon asia vaikuttaa

Dell Encryption, Secureworks

Edellinen julkaisupäivä

02 marrask. 2022

Versio

7

Artikkelin tyyppi

Solution