Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Voir les commandes et de suivre l'état de votre expédition
  • Profitez membres seulement récompenses et des remises
  • Créez et accédez à une liste de vos produits
Certains numéros d’article peuvent avoir changé. Si ce n’est pas ce que vous cherchez, essayez de rechercher tous les articles. Rechercher des articles

Policy Templates in Dell Encryption Personal

Sommaire: Compare policy template options in Dell Encryption Personal (formerly known as Dell Data Protection Personal Edition).

Cet article s’applique à Cet article ne s’applique pas à Cet article n’est lié à aucun produit spécifique. Toutes les versions de produits ne sont pas identifiées dans cet article.

Instructions

Learn about policy template options in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Operating Systems:

  • Windows

When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.

This provides an overview of what the templates are designed to encrypt.

Caution: Changing policy templates or applying custom policy settings impacts both the scope of encrypted data and the way that it is encrypted. Dell Technologies recommends contacting Dell ProSupport with any questions before making modifications.
  • Aggressive Protection for All Fixed Drives and External Drives1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Three Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: High
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
  • PCI Data Security Standard Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Data Breach Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • HIPAA Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives and External Drives (Default)
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for System Drive Only
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for External Drives
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Encryption Disabled
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: No Overwrite
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf

1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Produits touchés

Dell Encryption
Propriétés de l’article
Numéro d’article: 000125500
Type d’article: How To
Dernière modification: 27 août 2024
Version:  8
Obtenez des réponses à vos questions auprès d’autre utilisateurs de Dell
Services de soutien
Vérifiez si votre appareil est couvert par les services de soutien.