28.0 About Data Encryption Keys

When a Data Encryption policy is applied to a device, the Endpoint Security Agent uses encryption keys to encrypt and decrypt files. The following sections explain concepts that can help you better manage the encryption keys for your Management Zone: