The purpose of this document is to describe best practices to create encryption and decryption certificates to enable filevault setup. This implementation assumes that the administrator knows how to apply this configuration to the devices using a Policy in step C. Following these best practices, admins can successfully create and manage FileVault encryption and decryption certificates. This will facilitate the setup of FileVault, improving the security of their organization's data.