Passer au contenu principal
  • Afficher les commandes et suivre l’état de votre expédition
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.
Certains numéros d’article ont peut-être changé. Si ce n’est pas ce que vous recherchez, essayez de faire une recherche sur tous les articles. Rechercher des articles

What is Dell Encryption Personal?

Résumé: Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) is a client application that manages policy locally.

Cet article a peut-être été traduit automatiquement. Si vous avez des commentaires concernant sa qualité, veuillez nous en informer en utilisant le formulaire au bas de cette page.

Contenu de l’article


Instructions

This guide gives a brief description on the functions and features of Dell Encryption Personal.

Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Versions:

  • v8.0.0 and Later

Affected Operating Systems:

  • Windows

Dell Encryption Personal can be downloaded from https://www.dell.com/support. For more information, reference How to Download Dell Encryption Enterprise or Dell Encryption Personal.

The master installer version may be identified to verify system requirements and more. For more information, reference How to Identify the Version of the Dell Data Security Master Installer.

Child installers may be extracted from the master installer to install Dell Encryption Personal. For more information, reference How to Extract Child Installers from the Dell Data Security Master Installer.

The version of Dell Encryption Personal can be identified using the UI or the installer. For more information, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

Dell Encryption Personal system requirements differ between versions. For more information, reference Dell Encryption Personal System Requirements.

For supported Windows 10 feature updates, reference Dell Data Security Windows Version Compatibility.

Dell Encryption Personal can be installed on Windows. For more information, reference How to Install Dell Encryption Personal.

When Dell Encryption Personal is initially activated, a policy template must be chosen. Policy templates contain a baseline assortment of different policy settings. For more information, reference Policy Templates in Dell Encryption Personal / Dell Data Protection Personal Edition.

When Dell Encryption Personal is initially activated, a policy template must be chosen. After activation, the policy template may be modified. For more information, reference How to Modify Policy in Dell Encryption Personal / Dell Data Protection Personal Edition.

Backing up the keys, also known as escrowing the keys, can be manually performed within Dell Encryption Personal. For more information, reference How to Manually Back Up Encryption Keys in Dell Encryption Personal.

The recovery bundle may be downloaded through the local management console. For more information, reference How to Download the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle.

The recovery bundle version may be identified in the file properties. For more information, reference How to Identify the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle Version.

The recovery bundle may be run with a user interface or command line. For more information, reference Dell LSA Recovery Guide for Dell Encryption Enterprise and Dell Encryption Personal.

Encrypted files may be identified with Windows System Scan (WSScan). For more information, reference How to Use WSScan for Dell Data Security.

Dell Data Security signing certificate information is made available along with the version in which each signing certificate is used. For more information, reference Dell Data Security Signing Certificate Updates.

Secure hash algorithm 1 (SHA1) code-signing certificates are no longer valid. For more information, reference SHA-1 Signing Certificate Expiration and Deprecation on Dell Data Security Products.

The log collection process for Dell Encryption Personal uses an application that is called DiagnosticInfo.exe. For more information, reference How to Collect Logs for Dell Data Security Using DiagnosticInfo.

Dell Encryption Personal can be uninstalled using the Dell Data Security Uninstaller. For more information, reference How to Run the Dell Data Security Uninstaller.

Warning: Dell highly recommends backing up the encryption key before removal to prevent any potential data loss. For more information, reference How to Manually Back Up Encryption Keys in Dell Encryption Personal.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Propriétés de l’article


Produit concerné

Dell Encryption

Dernière date de publication

18 juin 2024

Version

15

Type d’article

How To