Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Créez et accédez à une liste de vos produits
Certains numéros d’article ont peut-être changé. Si ce n’est pas ce que vous recherchez, essayez de faire une recherche sur tous les articles. Rechercher des articles

How to Use WSScan for Dell Data Security

Résumé: WSScan can be run on Dell Data Security applications by following these instructions.

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Symptômes

Windows System Scan (WSScan.exe) is a tool that is used by Dell Data Security (formerly Dell Data Protection) to determine what files and folders are encrypted with data-centric encryption.


Affected Products:

Dell Encryption Enterprise
Dell Data Protection | Enterprise Edition
Dell Encryption Personal
Dell Data Protection | Personal Edition
Dell Encryption External Media
Dell Data Protection | External Media Edition
Dell Data Protection | Server Encryption

Affected Operating Systems:

Windows


WSScan can be used on endpoints running:

  • Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition)
  • Dell Encryption Personal (formerly Data Protection | Enterprise Edition for Mac)
  • Dell Encryption Enterprise for Server (formerly Dell Data Protection | Server Encryption)
  • Dell Encryption External Media (formerly Dell Data Protection | External Media Edition)

These Dell Data Security applications create a file that is called CREDDB.cef and/or CREDDB2.cef (post v8.16) in every folder where at least one encrypted file resides. WSScan searches file directories that contain CREDDB.cef and/or CREDDB2.cef to determine:

  • What files are encrypted by Dell Data Security in that directory?
  • What encryption type do the files use?
  • What key is associated to an encrypted file?
  • What encryption cipher is the file encrypted with?

Cause

Not applicable.

Résolution

Click the Execution or Analysis of WSScan for more information.

WSScan can be run through the user interface (UI) or command-line interface (CLI) switches. Click the appropriate method for more information.

UI
Note: Administrator privileges are required to run WSScan.

To run WSScan:

  1. Double-click WSScan.exe at C:\Program Files\Dell\Dell Data Protection\Encryption.

WSScan.exe

Note: The directory may differ if the product path was modified during installation.
  1. If User Account Control (UAC) is enabled, click Yes and then go to Step 3. If UAC is not enabled, go to Step 3.

User Account Control prompt

  1. Optionally change Drive Types to Search to either:
    • Fixed Drives = Volumes internal to the computer
    • Removable Drives = Volumes external to the computer
    • All Drives = Both Fixed and Removable Drives
    • CDROMS/DVDROMS

Drive Types to Search

  1. Optionally change Encryption Report Type to:
    • Encrypted Files
    • Unencrypted Files
    • All Files = Encrypted & Unencrypted
    • Unencrypted Files in Violation = Files that should be encrypted

Encryption Report Type

Note: Encryption Report Type is only available in version 8.10 or later.
  1. Click Search to begin the scan.

Search

Note:
  • A user can click Stop Searching to stop the scan.
  • A user can click Clear to remove the search results from the WSScan UI. These results remain available in the WSScan report.
CLI
 
Note: Administrator privileges are required to run WSScan.
 
Scan Parameter Purpose
-ta Scan all drives
-tf Scans all fixed drives. Default value if not defined
-tr Scans all removable media
-tc Scans CD/DVD ROM drives
[DIRECTORY] Scans the specified directory. Enclose directories with spaces in quotation marks ("").
-x[DIRECTORY] Excludes directory from scan. Multiple excluded directories are allowed.
-s Runs scan silently
-y Sleep time (in milliseconds) between directory scans. Results in slower scan, but more responsive CPU.
 
Report Parameter Purpose
-u Reports encrypted and unencrypted files
-u- Reports unencrypted files
-ua Reports encrypted files and unencrypted files (with encryption validation)
-ua- Reports unencrypted files (with encryption validation)
-uv Reports unencrypted files for policy violation
-uav Reports unencrypted files for policy violation using all user policies
 
Output Parameter Purpose
-o[DIRECTORY] Specifies the output report location. Extension must be .cmg, .csv, .txt, or .log. Defaults to %TEMP%\WSScan.log if parameter is not defined.
-a Appends to previously created output report (if available).
-f[FORMAT] Output report format (Report/Fixed/Delimited). Defaults to Report if parameter is not defined.
-d Specifies value separator for delimited reports
-q Specifies values that should be enclosed in quotes for delimited reports
-e Include extended encryption fields for delimited reports.
 

Example #1

WSScan.exe -x"%SYSTEMROOT%" -x"C:\Program Files" -s -o" C:\Reports\WSScan_Output.txt" -fFixed

Example #1 contains:

  • Installer = WSScan.exe
  • Silent install = Yes
  • Scanned directories = All fixed drives
    • Default value since not defined.
  • Excluded directories = Yes
    • %SYSTEMROOT% (C:\Windows)
    • C:\Program Files
  • Report data = Encrypted files
    • Default value since not defined
  • Output report = C:\Reports\WSScan_Output.txt
  • Overwrite previous output (if applicable) = Yes
    • Default value since not defined.
  • Report Format = Fixed

Example #2

WSScan.exe "%USERPROFILE%" -s uv -a

Example #2 contains:

  • Installer = WSScan.exe
  • Silent install = Yes
  • Scanned directories = %USERPROFILE% (C:\Users\[USERNAME])
  • Excluded directories = No
    • Default value since not defined
  • Report data = Unencrypted
    • Default value since not defined
  • Overwrite previous output (if applicable) = No
  • Output report = %Temp%
    • Default value since not defined
  • Report Format = Report
    • Default value since not defined

Example #3

WSScan.exe -tr -ua -s -o"%USERPROFILE%\desktop\Media_Scan.cmg"

Example #3 contains:

  • Installer = WSScan.exe
  • Silent install = Yes
  • Scanned directories = All removable media
  • Excluded directories = No
    • Default value since not defined
  • Report data = Encrypted and unencrypted files with encryption validation.
  • Overwrite previous output (if applicable) = Yes
    • Default value since not defined
  • Output report = %USERPROFILE%\desktop\Media_Scan.cmg
    • (C:\Users\[ActiveUser]\desktop\Media_Scan.cmg)
  • Report Format = Report
    • Default value since not defined

A user can analyze the WSScan results through:

  • WSScan user interface (UI)
  • WSScan.log, located by default at %temp%
Note: WSScan.log output location can be modified in the WSScan UI Advanced menu.

An example WSScan UI output:

Example WSScan UI output

Below is a line from WSScan output:

WSScan example line

Time of Scan

Time WSScan scanned the file.

Key

Data Centric can contain five type of keys depending on how policies are configured:

  • SDE Key

This is a file that is encrypted under the "Fixed Disk" policies. This key is unlocked during boot. We unlock this key by validating the hardware profile, and validating checksums on some operating systems files to prevent hacking attempts. Each partition is assigned Key Computer ID (KCID) that is tied to the same SDE bundle.

Example of a SDE key in WSScan:
[2015-08-28 14:01:48] SysData.1gx8z64b._SDENCR_: "C:\Windows\Web\Wallpaper\Theme2\img7.jpg" is still AES256 encrypted.

  • SDUser

This is a subkey of SDE that is unlocked when an authenticated user logs in. This is treated similarly to Common and how it is unlocked. Namely, files in any user's My Documents folder that are encrypted by SDE cannot be opened unless there is a user that is logged into the computer interactively. Files that fall under this definition are labeled as SDUSER encrypted. Situations that warrant the use of SDUSER encryption are, for example, an unmanaged user's My Documents folder or all users' My Documents folder if the policy is SDE only. Although the name could be interpreted to imply that User encryption is in play, it is not.

Example of a SDUser key in WSScan:
[2015-08-28 14:00:25] User.1gx8z64b._SDUSER_: "C:\Users\Public\Documents\desktop.ini" is still AES256 encrypted.

  • Common

Common key is unlocked when a managed user successfully authenticates to an endpoint. A managed user is someone who has activated successfully against the Dell Data Security product. Only one common key exists.

Example of a Common key in WSScan:
[2015-08-28 15:17:19] Common.G4FHL19J._DEVICE_: "C:\Users\UserName\Desktop\Access Encrypted Files (Mac).dmg" is still AES256 encrypted.

  • User

User keys are unlocked when a specific managed user successfully authenticates to an endpoint. Only that specific user has access to files protected with their User key. User keys have the UID populated.

Example of a User key in WSScan:
[2015-08-28 15:17:19] User.G4FHL19J.4N5A97MG: "C:\Users\UserName\Desktop\Test.txt" is still AES256 encrypted.

  • UserRoaming

UserRoaming keys are unlocked when a specific user successfully authenticates to a device. Unlike User key, the UserRoaming key may be used on multiple endpoints. UserRoaming keys have the UID populated.

[2015-08-28 15:17:19] UserRoaming.X8FDSH9A.5D4VHGN2: "E:\Sample\Example.docx" is still AES256 encrypted.

DCID

Device Computer ID. This is the ID that the Dell Security Management Server assigns to a unique Machine ID (MCID).

Note: A DCID is not populated when using WSScan to scan a mapped network drive.

UID

User ID of the managed user. The UID is a unique identifier that is associated to a UserRoaming or User Key for a specific user.

Encryption Type

Algorithm being used to encrypt the files. Data Centric Encryption may use:

  • RIJNDAEL 128
    • Deprecated as of client v8.6.1
  • RIJNDAEL 256
    • Deprecated as of client v8.6.1
  • AES 128
  • AES 256
  • 3DES
    • Deprecated as of client v8.0

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Informations supplémentaires

 

Vidéos

 

Produits concernés

Dell Encryption
Propriétés de l’article
Numéro d’article: 000131891
Type d’article: Solution
Dernière modification: 19 Dec 2022
Version:  11
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.