When a Data Encryption policy is applied to a device, the Endpoint Security Agent uses encryption keys to encrypt and decrypt files. The following sections explain encryption key concepts and provide instructions for managing encryption keys:
Section 38.0, About Data Encryption Keys
Section 39.0, Generating a New Encryption Key
Section 40.0, Exporting Encryption Keys
Section 41.0, Importing Encryption Keys