How the "Encrypt Temp Files" policy works in Dell Encryption

Summary: This article describes how the Encrypt Temp Files policy works.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Affected Products:

  • Dell Encryption
  • Dell Data Protection | Encryption

Cause

Not Applicable

Resolution

When this policy is selected, the paths that are listed in the environment variables TEMP and TMP are encrypted. TEMP and TMP for the operating system are encrypted with the Common Encryption Key. TEMP and TMP for the User are encrypted with the User Data Encryption Key.

To reduce encryption sweep time, the Shield clears the contents of the TEMP and TMP folders for initial encryption, and updates to this policy. However, if your organization uses a third-party application that requires the file structure within the \temp directory to be preserved, you should prevent this deletion.

To disable temporary file deletion, create DeleteTempFiles (REG_DWORD) and set its value to 0 in the registry at:

HKLM\SOFTWARE\Dell\CMGShield

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Affected Products

Dell Encryption
Article Properties
Article Number: 000128889
Article Type: Solution
Last Modified: 09 Mar 2023
Version:  7
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.