How Does Dell Encryption Enterprise and Dell Encryption Personal Encrypt Files?
Summary: Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) and Dell Encryption Personal (formerly Dell Data Protection | Personal) use policies to encrypt specific files and directories of a computer. This article outlines the workflow for the encryption process. ...
Symptoms
Affected Products:
- Dell Encryption Enterprise
- Dell Data Protection | Enterprise Edition
- Dell Encryption Personal
- Dell Data Protection | Personal Edition
Affected Versions:
- v4.0 and Later
Cause
Not Applicable
Resolution
Dell Encryption Enterprise and Dell Encryption Personal Encryption workflow uses the following acronyms and terminology:
File_A: Example of a file.
File_A_Copy: Example of a copied file (File_A)
CMGShield: The encryption agent service running on the computer
Point to Record (PTR): A point to record connects point A to point B. In relation to the workflow, it connects the original file with the copied file.
Credant Encryption Filter (CEF): CREDDB.CEF is a hidden file exclusive to Dell Encryption Enterprise \ Dell Encryption Personal that is in the directory where at least (1) encrypted file resides.
Metadata: Data that resides in data. In relation to the workflow, it is data within the CEF.
(To be Deleted) TBD: A file marked for deletion

Figure 1: (English Only) Encryption Workflow
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.