VI Data Encryption Key Management

When a Data Encryption policy is applied to a device, the Endpoint Security Agent uses encryption keys to encrypt and decrypt files. The following sections explain encryption key concepts and provide instructions for managing encryption keys: