Issue
- Algorithms and encryption methods supported in ESET Endpoint Encryption (EEE)
- Full Disk Encryption (FDE)
- Removable Media Encryption (RME)
- Password encryption
- Managed users
- Other encryption methods
- FIPS Approved
Solution
Full Disk Encryption (FDE)
When using FDE to encrypt a computer disk, ESET Endpoint Encryption uses the Advanced Encryption Standard (AES) algorithm with a 256-bit key. This encryption key is generated when FDE is started.
Removable Media Encryption (RME)
All data on removable media is encrypted by the AES algorithm with a 256-bit key, whether using Full Disk Encryption or File & Folder RME.
When you encrypt removable media, you choose an encryption key from your key-file using either AES, 3DES, or Blowfish algorithms. An AES 256-bit key that will encrypt the data is then derived from the key you choose. It is preferred to use an encryption key to generate the AES 256-bit key. This method is more secure than a password or a pass-phrase as it and enables EEE to provide seamless access to data on encrypted removable media when the end-user is logged into the key file.
Password encryption
Password encryption uses a 192-bit AES key, not to be confused with Removable Media Encryption (RME) above.
Managed users
If you are a managed user, you can only view encryption keys that have been made available to you by your ESET Endpoint Encryption Server Administrator. New keys can be created and allocated by your administrator through the EEE Server.
Other encryption methods
For all other encryption types, the user can choose between AES, 3DES, or Blowfish algorithms. AES and Blowfish keys have a length of 128-bits and 3DES has a key length of 112-bits. The key type used selects the algorithm. To view which encryption keys your product is using, follow the instructions below:
- Right-click the EEE icon in the notification area and click Key Manager.

- Encryption Key Manager displays the Type of key. Stand-alone users can create new encryption keys.

FIPS Approved
The encryption used by our software is FIPS approved. See FIPS 140-2 level 1.