6.0 Data Encryption Key Management

When a Data Encryption policy is applied to a device, the Endpoint Security Agent uses encryption keys to encrypt and decrypt files. These sections explain encryption key concepts and provide instructions for managing encryption keys.