Setting Up Data Defense

Setting Up Data Defense

After completing the installation and activating your account, you can proceed to set up Data Defense.  Log in to your account and follow the on-screen wizard, which will guide you through:
  1. Setting up a Secure Drive (if available).
  2. Configuring folder protection to safeguard your data.
  1. Click the Data Defense Dashboard icon on your desktop.
  2. Sign in to your Data Defense account.
    1. The setup wizard will scan the system.
  3. Accept or change the secure drive size as needed.
  4. Change the protection mode to NOT During threats, to ensure the drive remains Always secure for this tutorial. 
  5. Click Confirm to proceed.
  6. You can optionally add protected folders by selecting from the predefined list or specifying your own custom locations. However, this article does not cover this protection feature.
  7. Select Skip to bypass this step.
  8. To review or modify your selections, click the Change buttons.
  9. Click Confirm to complete the setup wizard.
Notes
It may take a few minutes to initialize the secure drive. During this process, Windows may display notifications indicating that a new drive is available.
Once the initialization is complete, you will see an Always On drive (typically labeled as L:) in File Explorer.

    • Related Articles

    • Understanding the Three Layers of Data Protection in Data Defense

      This article explores the first three layers of data protection offered by Data Defense when used with a supported SED to create Secure Drives, detailing how each layer protects sensitive information against various threats. It also covers the key ...
    • Strengthening Data Protection Against Advanced Threats

      While the first three layers of data protection provided by Data Defense are robust, they are primarily software-based, which a skilled adversary might attempt to bypass or exploit. For instance, if a threat actor gains administrative control of the ...
    • Getting Started: Drive Eraser

      This guide provides the essential steps for initiating a secure data erasure session using Lenovo | Blancco Drive Eraser bootable media. Use this procedure to permanently sanitize storage devices (HDDs, SSDs, NVMe) in preparation for asset ...
    • Viewing and Setting Incident Severity Levels

      About Incident Severity Each incident, issue, or event on ThinkShield Firmware Assurance (TSFA) is assigned a Severity Level, which indicates the level of importance and suggests potential actions needed for a specific device. These severity levels ...
    • Running On-demand Measurements

      This feature introduces the ability to perform on-demand measurements on the device, run the measurement (verify firmware integrity) of each component, and display the latest logs on the Cloud UI. It also enables a two-step attestation of ...