What rules/policies does Laptop Data Encryption use to determine if an unauthorised person is trying to access a device?
Dell Laptop Data Encryption comes with pre-configured policy settings for the following five rules: Invalid Login, Out of Contact, Unrecoverable, Device Reported Lost/Stolen, and Optional, Configurable Date & Time Rule. There are four actions taken when thresholds are reached for each policy based upon escalating risk. These are 1) Warning Message (optional), 2) Device Shutdown, 3) Persistent Device Shutdown, and 4) Encryption Key Destruction. You can obtain additional details on policy rules and actions taken from Dell Services.