As you deploy Disk Encryption policies to devices, we strongly recommend that you implement the following practices to achieve the best results:
Section 6.1, Encryption Recommendations
Section 6.2, Pre-Boot Authentication Recommendations
Section 6.3, Image Devices Before Applying Policies
Section 6.4, Test Policies Before Assigning Them to Production Devices
Section 6.5, Control the Policy Assignments
Section 6.6, Do Not Encrypt SCSI or RAID Hard Disks
Section 6.7, Make Sure the ERI File is Uploaded to the ZENworks Server
Section 6.8, Remove and reapply the policy after adding a new disk drive or volume