Windows System Scan (WSScan.exe
) is a tool that is used by Dell Data Security (formerly Dell Data Protection) to determine what files and folders are encrypted with data-centric encryption.
Affected Products:
Dell Encryption Enterprise
Dell Data Protection | Enterprise Edition
Dell Encryption Personal
Dell Data Protection | Personal Edition
Dell Encryption External Media
Dell Data Protection | External Media Edition
Dell Data Protection | Server Encryption
Affected Operating Systems:
Windows
WSScan
can be used on endpoints running:
These Dell Data Security applications create a file that is called CREDDB.cef
and/or CREDDB2.cef
(post v8.16) in every folder where at least one encrypted file resides. WSScan
searches file directories that contain CREDDB.cef
and/or CREDDB2.cef
to determine:
Not applicable.
Click the Execution or Analysis of WSScan
for more information.
WSScan
can be run through the user interface (UI) or command-line interface (CLI) switches. Click the appropriate method for more information.
WSScan
.
WSScan
:WSScan.exe
at C:\Program Files\Dell\Dell Data Protection\Encryption
.WSScan
UI. These results remain available in the WSScan
report.WSScan
.
Scan Parameter | Purpose |
---|---|
-ta |
Scan all drives |
-tf |
Scans all fixed drives. Default value if not defined |
-tr |
Scans all removable media |
-tc |
Scans CD/DVD ROM drives |
[DIRECTORY] |
Scans the specified directory. Enclose directories with spaces in quotation marks (""). |
-x[DIRECTORY] |
Excludes directory from scan. Multiple excluded directories are allowed. |
-s |
Runs scan silently |
-y |
Sleep time (in milliseconds) between directory scans. Results in slower scan, but more responsive CPU. |
Report Parameter | Purpose |
---|---|
-u |
Reports encrypted and unencrypted files |
-u- |
Reports unencrypted files |
-ua |
Reports encrypted files and unencrypted files (with encryption validation) |
-ua- |
Reports unencrypted files (with encryption validation) |
-uv |
Reports unencrypted files for policy violation |
-uav |
Reports unencrypted files for policy violation using all user policies |
Output Parameter | Purpose |
---|---|
-o[DIRECTORY] |
Specifies the output report location. Extension must be .cmg, .csv, .txt, or .log. Defaults to %TEMP%\WSScan.log if parameter is not defined. |
-a |
Appends to previously created output report (if available). |
-f[FORMAT] |
Output report format (Report/Fixed/Delimited). Defaults to Report if parameter is not defined. |
-d |
Specifies value separator for delimited reports |
-q |
Specifies values that should be enclosed in quotes for delimited reports |
-e |
Include extended encryption fields for delimited reports. |
Example #1
WSScan.exe -x"%SYSTEMROOT%" -x"C:\Program Files" -s -o" C:\Reports\WSScan_Output.txt" -fFixed
Example #1 contains:
WSScan.exe
%SYSTEMROOT% (C:\Windows)
C:\Program Files
C:\Reports\WSScan_Output.txt
Example #2
WSScan.exe "%USERPROFILE%" -s uv -a
Example #2 contains:
WSScan.exe
%USERPROFILE% (C:\Users\[USERNAME])
%Temp%
Example #3
WSScan.exe -tr -ua -s -o"%USERPROFILE%\desktop\Media_Scan.cmg"
Example #3 contains:
WSScan.exe
%USERPROFILE%\desktop\Media_Scan.cmg
(C:\Users\[ActiveUser]\desktop\Media_Scan.cmg)
A user can analyze the WSScan results through:
WSScan
user interface (UI)WSScan.log
, located by default at %temp%
WSScan.log
output location can be modified in the WSScan
UI Advanced menu.
An example WSScan
UI output:
Below is a line from WSScan
output:
Time of Scan
Time WSScan
scanned the file.
Key
Data Centric can contain five type of keys depending on how policies are configured:
This is a file that is encrypted under the "Fixed Disk" policies. This key is unlocked during boot. We unlock this key by validating the hardware profile, and validating checksums on some operating systems files to prevent hacking attempts. Each partition is assigned Key Computer ID (KCID) that is tied to the same SDE bundle.
Example of a SDE key in WSScan
:[2015-08-28 14:01:48] SysData.1gx8z64b._SDENCR_: "C:\Windows\Web\Wallpaper\Theme2\img7.jpg" is still AES256 encrypted
.
SDUser
This is a subkey of SDE that is unlocked when an authenticated user logs in. This is treated similarly to Common and how it is unlocked. Namely, files in any user's My Documents folder that are encrypted by SDE cannot be opened unless there is a user that is logged into the computer interactively. Files that fall under this definition are labeled as SDUSER encrypted. Situations that warrant the use of SDUSER
encryption are, for example, an unmanaged user's My Documents folder or all users' My Documents folder if the policy is SDE only. Although the name could be interpreted to imply that User encryption is in play, it is not.
Example of a SDUser
key in WSScan
:[2015-08-28 14:00:25] User.1gx8z64b._SDUSER_: "C:\Users\Public\Documents\desktop.ini" is still AES256 encrypted
.
Common key is unlocked when a managed user successfully authenticates to an endpoint. A managed user is someone who has activated successfully against the Dell Data Security product. Only one common key exists.
Example of a Common key in WSScan
:[2015-08-28 15:17:19] Common.G4FHL19J._DEVICE_: "C:\Users\UserName\Desktop\Access Encrypted Files (Mac).dmg" is still AES256 encrypted
.
User keys are unlocked when a specific managed user successfully authenticates to an endpoint. Only that specific user has access to files protected with their User key. User keys have the UID populated.
Example of a User key in WSScan
:[2015-08-28 15:17:19] User.G4FHL19J.4N5A97MG: "C:\Users\UserName\Desktop\Test.txt" is still AES256 encrypted
.
UserRoaming keys are unlocked when a specific user successfully authenticates to a device. Unlike User key, the UserRoaming key may be used on multiple endpoints. UserRoaming keys have the UID populated.
[2015-08-28 15:17:19] UserRoaming.X8FDSH9A.5D4VHGN2: "E:\Sample\Example.docx" is still AES256 encrypted
.
DCID
Device Computer ID. This is the ID that the Dell Security Management Server assigns to a unique Machine ID (MCID).
WSScan
to scan a mapped network drive.
UID
User ID of the managed user. The UID is a unique identifier that is associated to a UserRoaming or User Key for a specific user.
Encryption Type
Algorithm being used to encrypt the files. Data Centric Encryption may use:
RIJNDAEL 128
RIJNDAEL 256
AES 128
AES 256
3DES
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.