Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell PowerProtect Cyber Recovery 19.12 Security Configuration Guide

PDF

Authenticity and integrity of Cyber Recovery code

Digital signing and cryptographic checksums ensure the authenticity and integrity of product modules.

The Cyber Recovery software uses code signing to guarantee the integrity and authenticity of binaries that Dell Technologies provides. Code signing adds a digital signature to product artifacts such as drivers, binary files, or configuration files to authenticate the origin of the artifact and provide a claim of integrity by Dell Technologies.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\