How the "Encrypt Temp Files" policy works in Dell Encryption
Summary: This article describes how the Encrypt Temp Files policy works.
Symptoms
Affected Products:
- Dell Encryption
- Dell Data Protection | Encryption
Cause
Not Applicable
Resolution
When this policy is selected, the paths that are listed in the environment variables TEMP and TMP are encrypted. TEMP and TMP for the operating system are encrypted with the Common Encryption Key. TEMP and TMP for the User are encrypted with the User Data Encryption Key.
To reduce encryption sweep time, the Shield clears the contents of the TEMP and TMP folders for initial encryption, and updates to this policy. However, if your organization uses a third-party application that requires the file structure within the \temp directory to be preserved, you should prevent this deletion.
To disable temporary file deletion, create DeleteTempFiles (REG_DWORD) and set its value to 0 in the registry at:
HKLM\SOFTWARE\Dell\CMGShield
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.