
Self-Encrypting Drive Management | Wave Systems Corp. 2012
ESC 2.9.5 Client Manual
8. Self-Encrypting Drive Management
EMBASSY Security Center manages the hardware-based security functions of self-encrypting drives,
which have data encryption embedded in the drive hardware. This functionality is used to ensure that
only authorized users can access encrypted data (when drive locking is enabled, however drive locking is
selected by default when initializing the drive).
8.1 Initializing Drive Security
Although the self-encrypting drive data is always encrypted, data will not be protected from
unauthorized access until the drive is initialized and locked. To initialize the drive through ESC, follow
these steps:
1) Open ESC.
2) Select the Trusted Drive tab at the left.
3) Select the desired drive from the dropdown menu
4) Click Initialize”
5) ESC will notify you that Sleep/Standby is not supported with an initialized drive, and will change
your Windows settings from Sleep to Hibernate.
6) On the next screen, enter a valid Windows username.
• Only a domain user or a user that has previously logged into the computer can be
selected and added to the drive, unless the user is added to the drive remotely using the
ERAS server (sold separately).
• All available users who can be added to the drive can be found by clicking Select.
• The drive administrator can add additional users to the drive, disable the security of the
drive, or cryptographically erase the drive.
• The first user added will be the drive administrator.
• There may only be one drive administrator per drive.
• A password that meets the Windows password complexity requirements must be
entered.
• Password complexity requirements that are enforced for your system may be viewed
from the Windows Control Panel > Administrative Tools > Local Security Policy > Account
Policies > Password Policy.
• TPM Management Not Required – While both the TPM and SED use related
technology to secure authentication and data, the TPM does not need to be
configured or present to utilize the SED.
• Docking stations are supported for laptops with SEDs.
Comentarios a estos manuales