Anyone have any experience in using the Dell Data Protection Enterprise?

We recently bought some staff laptops with the DDP/E enabled and I set up the server and can get the laptops to connect to it just fine but I ran into an issue where my domain user accounts cannot log in when the laptop is on the wireless.  If I plug it into a wire they can log in fine and once there is a local profile created they can log in again just fine and be connected to the wireless.

If there is no local profile created for a user the computer gives an error that states "The Specified Account Does Not Exist" and I have no idea why that could be happening.   I am not sure if it has something to do with our radius authentication that is tied to our wireless or what I can do to fix this.
1 Comment   [ + ] Show Comment

Comments

  • I've never seen this, however when we trialed this product, it would encrypt one model of laptop OK, however wouldn't encrypt another. The support technician said he'd never seen anything like it.

    I found the product to be very clunky indeed, and personally wouldn't touch it. Perhaps not helpful with respect to your question, however thought I'd just add in our experience of the product!
  • This content is currently hidden from public view.
    Reason: Removed by member request
    For more information, visit our FAQ's.
Please log in to comment

Answers

This content is currently hidden from public view.
Reason: Removed by member request
For more information, visit our FAQ's.

This content is currently hidden from public view.
Reason: Removed by member request
For more information, visit our FAQ's.

0

BWilkerson,

You did not mention what kind of encryption you are using, however, a couple of cases I can think of are:

1) SED - this is working as designed.  DDPE doesn't support activation via wireless for SED devices.  The Linux PBA partition doesn't do wireless at all.  After you are activated and have a locally cached user account, things work either way, wired/wireless.

2) File based encryption.  This depends on the encryption policy.  Sounds like to me something that uses the wireless for authentication/profile creation is Common key encrypted.  The user gets activated and has access to the Common encryption key and so it works after that.

Answered 05/05/2015 by: jsheard
White Belt

Please log in to comment
Answer this question or Comment on this question for clarity

Share