Full Disk Encryption provides robust protection for devices by encrypting entire hard drives, safeguarding sensitive data against unauthorised access, loss, or theft. You can learn more about the capabilities of this feature in this overview.
β
Enabling the module
To enable the Full Disk Encryption module, this must first be installed on the devices running Endpoint Protection and then be enabled in the policy running on these devices. To kick-start the process, simply chat with us or raise a ticket including the host/computer names you'd like to encrypt.
Our team will then make the necessary policy changes for you. Once complete, any endpoints with the Full Disk Encryption module enabled will present the following pop-up to the end user.
Selecting a PIN
The user must then choose a PIN which meets the requirements outlined in the screenshot below.
Important β the user will need to enter this PIN each time the host is booted or restarted.
Once a PIN has been selected, the encryption process will run in the background. Once this is complete, the disk is encrypted
And that's it! You've set up Full Disk Encryption π
What if a user forgets their PIN, or I want to decrypt a device?
In either case, reach out to Defense.com by chat or ticket and provide the hostname of the endpoint you wish to decrypt.
Our team will apply an updated policy with decrypt enabled, which will trigger the decryption of the drive.