Dell Data Protection Encryption Endpoint Inventory Options

摘要: This article discusses Dell Data Protection | Encryption endpoint computer inventory options.

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

症状

Affected Products:

  • Dell Data Protection | Encryption

Use the following registry settings to:

  • Allow the Shield to send an optimized inventory to the Server.
  • Send a full inventory to the Server.
  • Send a full inventory for all users to the Server.

原因

Not Applicable

解决方案

Create or modify the registry setting as follows:

Warning: The next step is a Windows Registry edit:
  • Send Optimized Inventory to Server:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield
REG_DWORD: OnlySendInvChanges
Value: 1

The section above is the default for our product. This triggers the policy-based encryption client to only send inventory data to the Dell Security Management Server (formerly Dell Data Protection server) when any data has changed. When data does change, only the items that have changed on the device are collected and sent to the Dell Server. No other data is updated.

  • Send Full Inventory to Server:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield
REG_DWORD: OnlySendInvChanges
Value: 0

The section above indicates that every time a device with Dell Encryption's Policy-Based Encryption attempts to check-in to a Dell Security Management Server, a full inventory is sent, this means that all data that could be reported back is regenerated and sent to the Dell Server.

Note: This may cause bandwidth issues due to the larger amounts of data that would be moving throughout the network. This can be offset by increasing the "Policy Proxy Polling Interval" within the Policy-Based Encryption policy set on the Dell Security Management Server.
  • Send Full Inventory for All Users:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield
REG_DWORD: RefreshInventory
Value: 1

The above section indicates that only on the next check-in to the Dell Security Management Server that this endpoint regenerates all inventory data, and send that data to the Dell Security Management Server.

  • If no entry is present, an optimized inventory is sent to the Server.
Note: This entry is deleted from the registry when it is processed. The value is saved in the vault, so even if the computer is rebooted before the inventory upload takes place, the Shield still honors this request after the next successful inventory upload.

This entry supersedes the OnlySendInvChanges registry value.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

其他信息

For more information about getting Inventory information, reference How to have the Shield dump the inventory that it is uploading to the Policy Proxy out to a file.

受影响的产品

Dell Encryption
文章属性
文章编号: 000124874
文章类型: Solution
上次修改时间: 03 10月 2023
版本:  8
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。