Dell Data Protection

16 Administrator Guide
View Encryption Policy and Status
You can view the encryption policy and status on the local computer or in the
Dell Remote Management Console
.
View Policy and Status on the Local Computer
To view encryption policy and encryption status on the local computer, follow the steps below.
1
Launch
System Preferences
and click
Dell Data Protection
.
2
Click
Policies
to view the current policy set for this computer. Use this view to confirm the specific encryption policies in
effect for this computer.
TIP: Click Refresh to contact the Dell Remote Management Console to check for policy updates.
The
Policies
pane contains the following information.
General Settings
Encryption Enabled
True or Fa ls
e
This is the “master policy” for all other General Settings policies. This policy must be set to
True
for any other General Settings policies to be applied.
True
enables encryption and will initiate encryption for unencrypted volumes, per the
Volumes
Targeted for Encryption
or
Encrypt Using FileVault for Mac
policy.
False disables encryption and will initiate a decryption sweep for any fully or partially
encrypted volumes.
Encrypt Using FileVault for Mac
True or Fa ls
e
True
uses FileVault to encrypt the System Volume, including fusion drives. You cannot encrypt
volumes other than the System Volume if you choose this policy. If all fixed volumes (which
includes the System Volume) must be encrypted, set this policy to
False
and use the
Volumes
Targeted for Encryption
policy instead.
Encryption Algorithm
AES 256 or AES 128
Encryption algorithm used for encrypting Mac volumes.
Volumes Targeted for Encryption
System Volume Only or All Fixed Drives
System Volume Only
secures only the currently running system volume.
All Fixed Volumes
secures all Mac OS Extended Volumes on all fixed disks, along with the
currently running system volume.
This policy and
Encrypt Using FileVault for Mac
cannot be used together.
Select either one or the other for encryption.
Workstation Scan Priority
Highest, High, Normal, Low, or Lowest
This policy specifies the relative priority of the encryption scanning process.
High and Highest prioritize scanning speed over computer responsiveness. Low and Lowest
prioritize computer responsiveness over scanning speed. Normal balances the two.