Перейти к основному содержимому
  • Простое и быстрое размещение заказов
  • Просмотр заказов и отслеживание состояния доставки
  • Создание списка продуктов и доступ к нему

Policy Templates in Dell Encryption Personal

Сводка: Compare policy template options in Dell Encryption Personal (formerly known as Dell Data Protection Personal Edition).

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Инструкции

Learn about policy template options in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Operating Systems:

  • Windows

When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.

This provides an overview of what the templates are designed to encrypt.

Caution: Changing policy templates or applying custom policy settings impacts both the scope of encrypted data and the way that it is encrypted. Dell Technologies recommends contacting Dell ProSupport with any questions before making modifications.
  • Aggressive Protection for All Fixed Drives and External Drives1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Three Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: High
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
  • PCI Data Security Standard Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Data Breach Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • HIPAA Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives and External Drives (Default)
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for System Drive Only
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for External Drives
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Encryption Disabled
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: No Overwrite
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf

1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Затронутые продукты

Dell Encryption
Свойства статьи
Номер статьи: 000125500
Тип статьи: How To
Последнее изменение: 27 Aug 2024
Версия:  8
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.