Administrator Guide

If a self-signed certificate is used on the Dell Server for Full Disk Encryption, SSL/TLS trust validation must remain disabled
on the client computer (SSL/TLS trust validation is disabled by default with Full Disk Encryption). Before enabling SSL/TLS
trust validation on the client computer, the following requirements must be met.
A certificate signed by a root authority, such as EnTrust or Verisign, must be imported into Dell Server.
The full chain of trust of the certificate must be stored in the Microsoft keystore on the client computer.
To enable SSL/TLS trust validation for Dell Encryption management, change the value of the following registry entry to 0
on the client computer.
[HKLM\System\CurrentControlSet\Services\DellMgmtAgent\Parameters]
"DisableSSLCertTrust"=DWORD:0
0 = Enabled
1 = Disabled
To determine if the PBA is activated, ensure that the following value is set:
[HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent\Parameters]
"PBAIsActivated"=DWORD (32-bit):1
A value of 1 means that the PBA is activated. A value of 0 means the PBA is not activated.
NOTE: Manually deleting this key can create unintended results for users syncing with the PBA resulting in the need for
manual recovery.
To determine if a smart card is present and active, ensure the following value is set:
HKLM\SOFTWARE\Dell\Dell Data Protection\
"SmartcardEnabled"=DWORD:1
If SmartcardEnabled is missing or has a value of zero, the Credential Provider will display only Password for authentication.
If SmartcardEnabled has a non-zero value, the Credential Provider will display options for Password and smart card
authentication.
The following registry value indicates whether Winlogon should generate a notification for logon events from smart cards.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
"SmartCardLogonNotify"=DWORD:1
0 = Disabled
1 = Enabled
The Security Server host may be changed from the original installation location if needed. The host information is read by the
client computer every time a policy poll occurs. Change the following registry value on the client computer:
[HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent]
"ServerHost"=REG_SZ:<newname>.<organization>.com
The Security Server port may be changed from the original installation location if needed. This value is read by the client
computer every time a policy poll occurs. Change the following registry value on the client computer:
[HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent]
ServerPort=REG_SZ:8888
(With pre-boot authentication only) If you do not want PBA advanced authentication to change the services associated with
smart cards and biometric devices to a startup type of "automatic", disable the service startup feature. Disabling this feature
also suppresses warnings associated with the required services not running.
When disabled, PBA advanced authentication does not attempt to start these services:
SCardSvr - Manages access to smart cards read by the computer. If this service is stopped, this computer is unable to
read smart cards. If this service is disabled, any services that explicitly depend on it fail to start.
SCPolicySvc - Allows the system to be configured to lock the user desktop upon smart card removal.
WbioSrvc - The Windows biometric service gives client applications the ability to capture, compare, manipulate, and store
biometric data without gaining direct access to any biometric hardware or samples. The service is hosted in a privileged
SVCHOST process.
By default, if the registry key does not exist or the value is set to 0, this feature is enabled.
26
Registry Settings