Setting Up Data Defense

Setting Up Data Defense

After completing the installation and activating your account, you can proceed to set up Data Defense.  Log in to your account and follow the on-screen wizard, which will guide you through:
  1. Setting up a Secure Drive (if available).
  2. Configuring folder protection to safeguard your data.
  1. Click the Data Defense Dashboard icon on your desktop.
  2. Sign in to your Data Defense account.
    1. The setup wizard will scan the system.
  3. Accept or change the secure drive size as needed.
  4. Change the protection mode to NOT During threats, to ensure the drive remains Always secure for this tutorial. 
  5. Click Confirm to proceed.
  6. You can optionally add protected folders by selecting from the predefined list or specifying your own custom locations. However, this article does not cover this protection feature.
  7. Select Skip to bypass this step.
  8. To review or modify your selections, click the Change buttons.
  9. Click Confirm to complete the setup wizard.
Notes
It may take a few minutes to initialize the secure drive. During this process, Windows may display notifications indicating that a new drive is available.
Once the initialization is complete, you will see an Always On drive (typically labeled as L:) in File Explorer.

    • Related Articles

    • Understanding the Three Layers of Data Protection in Data Defense

      This article explores the first three layers of data protection offered by Data Defense when used with a supported SED to create Secure Drives, detailing how each layer protects sensitive information against various threats. It also covers the key ...
    • Strengthening Data Protection Against Advanced Threats

      While the first three layers of data protection provided by Data Defense are robust, they are primarily software-based, which a skilled adversary might attempt to bypass or exploit. For instance, if a threat actor gains administrative control of the ...
    • Viewing and Setting Incident Severity Levels

      About Incident Severity Each incident, issue, or event on ThinkShield Firmware Assurance (TSFA) is assigned a Severity Level, which indicates the level of importance and suggests potential actions needed for a specific device. These severity levels ...
    • Running On-demand Measurements

      This feature introduces the ability to perform on-demand measurements on the device, run the measurement (verify firmware integrity) of each component, and display the latest logs on the Cloud UI. It also enables a two-step attestation of ...
    • Setting Incident Notifications

      Incidents This feature allows users to customize their alert preferences based on the severity level of incidents: Low and higher, Moderate and higher, or High only. When an incident matches the selected severity level, users are promptly notified ...