How Does Dell Encryption Enterprise and Dell Encryption Personal Encrypt Files?

Summary: Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) and Dell Encryption Personal (formerly Dell Data Protection | Personal) use policies to encrypt specific files and directories of a computer. This article outlines the workflow for the encryption process. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Affected Products:

  • Dell Encryption Enterprise
  • Dell Data Protection | Enterprise Edition
  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Versions:

  • v4.0 and Later

Cause

Not Applicable

Resolution

Dell Encryption Enterprise and Dell Encryption Personal Encryption workflow uses the following acronyms and terminology:

File_A: Example of a file.

File_A_Copy: Example of a copied file (File_A)

CMGShield: The encryption agent service running on the computer

Point to Record (PTR): A point to record connects point A to point B. In relation to the workflow, it connects the original file with the copied file.

Credant Encryption Filter (CEF): CREDDB.CEF is a hidden file exclusive to Dell Encryption Enterprise \ Dell Encryption Personal that is in the directory where at least (1) encrypted file resides.

Metadata: Data that resides in data. In relation to the workflow, it is data within the CEF.

(To be Deleted) TBD: A file marked for deletion

Encryption Workflow
Figure 1: (English Only) Encryption Workflow


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

 

Affected Products

Dell Encryption
Article Properties
Article Number: 000129796
Article Type: Solution
Last Modified: 21 Mar 2024
Version:  9
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.