Dell Data Protection Encryption Endpoint Inventory Options

摘要: This article discusses Dell Data Protection | Encryption endpoint computer inventory options.

本文章適用於 本文章不適用於 本文無關於任何特定產品。 本文未識別所有產品版本。

症狀

Affected Products:

  • Dell Data Protection | Encryption

Use the following registry settings to:

  • Allow the Shield to send an optimized inventory to the Server.
  • Send a full inventory to the Server.
  • Send a full inventory for all users to the Server.

原因

Not Applicable

解析度

Create or modify the registry setting as follows:

Warning: The next step is a Windows Registry edit:
  • Send Optimized Inventory to Server:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield
REG_DWORD: OnlySendInvChanges
Value: 1

The section above is the default for our product. This triggers the policy-based encryption client to only send inventory data to the Dell Security Management Server (formerly Dell Data Protection server) when any data has changed. When data does change, only the items that have changed on the device are collected and sent to the Dell Server. No other data is updated.

  • Send Full Inventory to Server:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield
REG_DWORD: OnlySendInvChanges
Value: 0

The section above indicates that every time a device with Dell Encryption's Policy-Based Encryption attempts to check-in to a Dell Security Management Server, a full inventory is sent, this means that all data that could be reported back is regenerated and sent to the Dell Server.

Note: This may cause bandwidth issues due to the larger amounts of data that would be moving throughout the network. This can be offset by increasing the "Policy Proxy Polling Interval" within the Policy-Based Encryption policy set on the Dell Security Management Server.
  • Send Full Inventory for All Users:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield
REG_DWORD: RefreshInventory
Value: 1

The above section indicates that only on the next check-in to the Dell Security Management Server that this endpoint regenerates all inventory data, and send that data to the Dell Security Management Server.

  • If no entry is present, an optimized inventory is sent to the Server.
Note: This entry is deleted from the registry when it is processed. The value is saved in the vault, so even if the computer is rebooted before the inventory upload takes place, the Shield still honors this request after the next successful inventory upload.

This entry supersedes the OnlySendInvChanges registry value.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

其他資訊

For more information about getting Inventory information, reference How to have the Shield dump the inventory that it is uploading to the Policy Proxy out to a file.

受影響的產品

Dell Encryption
文章屬性
文章編號: 000124874
文章類型: Solution
上次修改時間: 03 10月 2023
版本:  8
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。