Article Number: 000125500
This article provides an overview of policy templates in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).
Affected Products:
Dell Encryption Personal
Dell Data Protection | Personal Edition
Affected Operating Systems:
Windows
Not applicable.
When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.
This provides an overview of what the templates are designed to encrypt.
System Drive Encryption | Fixed Drive Encryption | External Drive Encryption | Template Differences | |
---|---|---|---|---|
Aggressive Protection for All Fixed Drives and External Drives1 | Yes | Yes | Required | Secure Post-Encryption Cleanup: Three Pass Overwrite |
User Data Encryption Key: User |
||||
Workstation Scan Priority: High |
||||
EMS Access to unShielded Media: Block |
||||
EMS Encryption Rules:R#:\ |
||||
PCI Data Security Standard Targeted1 | Yes | Yes | Required | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: Common |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Block |
||||
EMS Encryption Rules:R#:\ -R#:\Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
Data Breach Regulatory Targeted1 | Yes | Yes | Optional | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: Common |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Read Only |
||||
EMS Encryption Rules:R#:\ -R#:\Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
HIPAA Regulatory Targeted1 | Yes | Yes | Optional | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: User |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Read Only |
||||
EMS Encryption Rules:R#:\ -R#:\ Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
Basic Protection for All Fixed Drives and External Drives (Default) | Yes | Yes | Optional | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: Common |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Read Only |
||||
EMS Encryption Rules:R#:\ -R#:\ Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
Basic Protection for All Fixed Drives | Yes | Yes | No | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: Common |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Full Access |
||||
EMS Encryption Rules:R#:\ -R#:\ Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
Basic Protection for System Drive Only | Yes | No | No | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: Common |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Full Access |
||||
EMS Encryption Rules:R#:\ -R#:\ Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
Basic Protection for External Drives | No | No | Optional | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: Common |
||||
Workstation Scan Priority: Normal |
||||
EMS Access to unShielded Media: Read Only |
||||
EMS Encryption Rules:R#:\ -R#:\ Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
||||
Encryption Disabled | No | No | No | Secure Post-Encryption Cleanup: Single Pass Overwrite |
User Data Encryption Key: User |
||||
Workstation Scan Priority: No Overwrite |
||||
EMS Access to unShielded Media: Full Access |
||||
EMS Encryption Rules:R#:\ -R#:\ Black Berry ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf |
1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Dell Encryption, Secureworks
02 nov. 2022
7
Solution