What is disk encryption?
disk encryption encryption
Volume level disk encryption protects your customers' data due to theft or accidental loss, by rendering information on hard drives unreadable to unauthorized users. Disk encryption is ideally suited where data is a critical asset or governed by compliance regulations such as GDPR, PII, PCI DSS and there is a risk of data loss. Using disk encryption, data cannot be accessed and information stolen. Even if the thief removes the disk dive from the computer, the information remains encrypted and cannot be recovered.
Disk encryption is integrated into Security Manager | AV Defender. Deployment is simple on one or multiple devices through Security Manager settings, or using rules.
Security options
There are three security options (Key Protector Strengths) available when using Disk Encryption Manager:
- Trusted Platform Module (TPM) - This is a hardware level security available on some computers. When enabled, the user does not need to enter a password when starting their computer. They are presented the Windows login screen. No password is required.
- Trusted Platform Module and PIN - With TPM and PIN, the user must enter a PIN to unlock the disk and proceed to the login screen. This is the most secure method of encrypting and protecting data. Microsoft recommends this security option with disk encryption.
- Password - The password option is the default security when a system does not have TPM available, or TPM is not enabled. When the user logs into their computer, they must enter a password to unlock the disk and proceed to the Windows login screen.
N-able does not save historical recovery keys for trials or paid contracts after moving on from N-able N-central. It is highly recommended that you run a the Recovery Key report store it in a safe location. If you choose to use Disk Encryption Manager after the trial has ended you will not be able to access the recovery keys from N-able N-central or from Technical Support.
What do you want to do?
- Review permissions for using Disk Encryption Manager
- Review the supported operating systems
- Install Disk Encryption Manager on a device
- Install Disk Encryption Manager on multiple devices
- Install Disk Encryption Manager using a rule
- Review a user experience of disk encryption
- Monitor and report on disk encryption
- Add multiple services for an encrypted disk volume
- Obtain a recovery key for a device
- Remove a device and decrypt an encrypted disk
- Frequently Asked Questions