You can use the Dell Data Protection Encryption software to protect the confidentiality of data on your computer. This software encrypts all files in selected folders, making them unreadable by unauthorized users while continuing to make them available for you or other authorized users.
Dell Data Protection Encryption is a security application that enables you to encrypt folders and files with AES encryption algorithms.
Benefits of Dell Data Protection Encryption
- This software uses AES encryption algorithms to encrypt all files in selected folders, making them unreadable by unauthorized users while making them available for you or other authorized users.
- The encryption process is transparent without performance impact on the computer and can be managed centrally through Active Directory policies or Group Policy (GPO).
- Encrypted files are accessible only when using an account granted access to the file encryption key (FEK), controlled by Dell Data Protection |Security Tools management software.
- The decryption process requires user authentication each time a folder or file is accessed, decreasing any chances of unintended access.
- You can easily integrate this product with your existing enterprise security infrastructure upon deployment.
- Dell Data Protection Security Tools can be centrally managed through Active Directory policies or Group Policy (GPO).
- Decreases the risk of unauthorized access to your files and folders by encrypting them with AES encryption algorithms widely used in today’s IT infrastructures & software suites.
- Protects data confidentiality against possible physical attacks on servers, workstations, laptops, and removable media by ensuring that all stored data is encrypted at rest using vital cryptography keys under management control.
- A centralized management console enables rapid deployment across enterprise systems for enhanced security of sensitive information assets stored on endpoint devices like desktop PCs, laptops/notebooks, USB drives, etc., for complete peace of mind.
- Completexible deployment options allow administrators to quickly encrypt files and folders on a single machine or an entire network in a few simple steps via a pre-boot interactive wizard.
- Full management control gives IT administrators the ability to centrally manage all aspects of this security solution across large networks through Active Directory policies or Group Policy (GPO).
- Data protection is controlled by providing users with access to encryption keys generated and maintained by the Dell Encryption Management Server (EMS). Using the EMS console, users can be granted different access levels based on their job roles and responsibilities. External media such as USB drives and other removable media can also be protected with this technology once configured for use with the EMS console.
Installation of Dell Data Protection Encryption
- When you install Dell Data Protection. You can either
- Allow Always as this will give the best performance
- Only allow access on Demand which ensures that communication is only made when required.
- You will then be asked whether or not you would like to participate in the Customer Experience Improvement Program. If you wish to participate, click Yes and if not, click No and continue with the installation of Dell Data Protection.
- After reading and accepting the license agreement, click Next to begin installing Dell Data Protection.
- You will then see the Dell Data Protection Status screen showing whether or not your system is compliant or non-compliant.
- Click Finish to complete the installation of Dell Data Protection.
- If you are prompted to reboot, please do so immediately. When your computer restarts, you will be prompted to say that Dell Data Protection has been installed successfully and ask if you wish to configure it now.
Uninstallation of Dell Data Protection Encryption
- Click on Start, Control Panel
- Type ” Dell Data Protection ” in the search box and press Enter. A list of programs will be displayed with Dell Data Protection Encryption highlighted in the results below.
- Right-click on Dell Data Protection and select Uninstall.
- When you are prompted to uninstall or change a program, click Yes. The uninstallation of Dell Data Protection begins at this point again following the screens displayed on your screen when installing it initially with one exception – when asked if you would like to participate in the Customer Experience Improvement Program, please click NO & continue with the removal process.
- Once complete, reboot if required and successfully removed!
- If you are prompted to reboot, please do so immediately.
- Repeat the above process on all remaining computers on your network that have Dell Data Protection installed.
Domain Controller (PDC)
Once complete, follow these steps on the Primary Domain Controller (PDC) only:
- Click on Start, Control Panel
- Type ” group policy editor ” in the search box and press Enter. A list of programs will be displayed with Group Policy Editor highlighted in the results below.
- Right-click on Group Policy Editor and select Run as Administrator to open it up for editing
- When Group Policy Editor opens up, click Browse under Computer Configuration in the left column.
- In the pane named console tree, double click on Windows Settings
- Double click on Security Settings
- Double click on Encrypting File System (EFS). You will see a pane with all of the settings for this option.
- In the pane named details, double click on Configure EFS Certificate Handling. The dialog box that opens up will display two options – Allow private keys to be exported and Automatically release certificates When encryption is turned off. Ensure that neither of these options is selected by clicking OK to save changes made & close Group Policy Editor.
- Reboot your computer to ensure that no further prompts appear when logging in again!
- If you are prompted to reboot, please do so immediately!
Dell Data Protection Encryption software contains several products that detect data security risks, protect data, and manage data. It has many benefits, including that this software uses AES encryption and that the tools can be ordered through Active Directory policies or Group Policy (GPO).