When a Data Encryption policy is applied to a device, the Endpoint Security Agent uses encryption keys to encrypt and decrypt files. The following sections explain encryption key concepts and provide instructions for managing encryption keys:
Section 28.0, About Data Encryption Keys
Section 29.0, Generating a New Encryption Key
Section 30.0, Exporting Encryption Keys
Section 31.0, Importing Encryption Keys