What rules/policies does Laptop Data Encryption use to determine if an unauthorized person is trying to access a device?
Dell Laptop Data Encryption comes with pre-configured policy settings for the following five rules: Invalid Login, Out of Contact, Unrecoverable, Device Reported Lost/Stolen, and Optional, Configurable Date & Time Rule. There are four actions taken when thresholds are reached for each policy based upon escalating risk. These are 1) Warning Message (optional), 2) Device Shutdown, 3) Persistent Device Shutdown, and 4) Encryption Key Destruction. You can obtain additional details on policy rules and actions taken from Dell Services.
Related Questions
- What rules/policies does Laptop Data Encryption use to determine if an unauthorised person is trying to access a device?
- How can I make sure that an unauthorized user does not uninstall the Dell Laptop Data Encryption Agent?
- How can I make sure that an unauthorised user does not uninstall the Dell Laptop Data Encryption Agent?