Hopp til hovedinnhold
  • Legg inn bestillinger raskt og enkelt
  • Vis bestillinger og spor forsendelsesstatus
  • Opprett og få tilgang til en liste over produktene dine
  • Administrer Dell EMC-områder, produkter og kontakter for produktnivå ved hjelp av virksomhetsadministrering.
Det kan hende at noen artikkelnumre er endret. Hvis dette ikke er det du ser etter, kan du prøve å søke i alle artikler. Søk i artikler

What is Dell Encryption Personal?

Sammendrag: Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) is a client application that manages policy locally.

Det kan hende at denne artikkelen er oversatt automatisk. Hvis du har tilbakemeldinger angående kvaliteten, kan du gi oss beskjed ved hjelp av skjemaet nederst på denne siden.

Artikkelinnhold


Instruksjoner

This guide gives a brief description on the functions and features of Dell Encryption Personal.

Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Versions:

  • v8.0.0 and Later

Affected Operating Systems:

  • Windows

Dell Encryption Personal can be downloaded from https://www.dell.com/support. For more information, reference How to Download Dell Encryption Enterprise or Dell Encryption Personal.

The master installer version may be identified to verify system requirements and more. For more information, reference How to Identify the Version of the Dell Data Security Master Installer.

Child installers may be extracted from the master installer to install Dell Encryption Personal. For more information, reference How to Extract Child Installers from the Dell Data Security Master Installer.

The version of Dell Encryption Personal can be identified using the UI or the installer. For more information, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

Dell Encryption Personal system requirements differ between versions. For more information, reference Dell Encryption Personal System Requirements.

For supported Windows 10 feature updates, reference Dell Data Security Windows Version Compatibility.

Dell Encryption Personal can be installed on Windows. For more information, reference How to Install Dell Encryption Personal.

When Dell Encryption Personal is initially activated, a policy template must be chosen. Policy templates contain a baseline assortment of different policy settings. For more information, reference Policy Templates in Dell Encryption Personal / Dell Data Protection Personal Edition.

When Dell Encryption Personal is initially activated, a policy template must be chosen. After activation, the policy template may be modified. For more information, reference How to Modify Policy in Dell Encryption Personal / Dell Data Protection Personal Edition.

Backing up the keys, also known as escrowing the keys, can be manually performed within Dell Encryption Personal. For more information, reference How to Manually Back Up Encryption Keys in Dell Encryption Personal.

The recovery bundle may be downloaded through the local management console. For more information, reference How to Download the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle.

The recovery bundle version may be identified in the file properties. For more information, reference How to Identify the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle Version.

The recovery bundle may be run with a user interface or command line. For more information, reference Dell LSA Recovery Guide for Dell Encryption Enterprise and Dell Encryption Personal.

Encrypted files may be identified with Windows System Scan (WSScan). For more information, reference How to Use WSScan for Dell Data Security.

Dell Data Security signing certificate information is made available along with the version in which each signing certificate is used. For more information, reference Dell Data Security Signing Certificate Updates.

Secure hash algorithm 1 (SHA1) code-signing certificates are no longer valid. For more information, reference SHA-1 Signing Certificate Expiration and Deprecation on Dell Data Security Products.

The log collection process for Dell Encryption Personal uses an application that is called DiagnosticInfo.exe. For more information, reference How to Collect Logs for Dell Data Security Using DiagnosticInfo.

Dell Encryption Personal can be uninstalled using the Dell Data Security Uninstaller. For more information, reference How to Run the Dell Data Security Uninstaller.

Warning: Dell highly recommends backing up the encryption key before removal to prevent any potential data loss. For more information, reference How to Manually Back Up Encryption Keys in Dell Encryption Personal.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Artikkelegenskaper


Berørt produkt

Dell Encryption

Dato for siste publisering

18 jun. 2024

Versjon

15

Artikkeltype

How To