Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

Configure Deferred Activation

The Encryption client with Deferred Activation differs from the Encryption client activation in two ways:

Device-based Encryption policies

The Encryption client policies are user-based; the Encryption client with Deferred Activation's encryption policies are device-based. User encryption is converted to Common encryption. This difference allows the user to bring a personal device to use within the organization's domain, while the organization maintains its security by centrally managing encryption policies.

Activation

With the Encryption client, activation is automatic. When Endpoint Security Suite Enterprise with Deferred Activation is installed, automatic activation is disabled. Instead, the user chooses whether to activate encryption, and when to activate it.

NOTE:

Before a user permanently leaves the organization and while his email address is still active, the user must run the Encryption Removal Agent and uninstall the Encryption client from his personal computer.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\