Administrator Guide
Chapter 1: Introduction................................................................................................................. 5
Before You Begin.................................................................................................................................................................5
Using This Guide.................................................................................................................................................................. 6
Contact Dell ProSupport....................................................................................................................................................6
Chapter 2: Requirements...............................................................................................................7
All Clients............................................................................................................................................................................... 7
Encryption............................................................................................................................................................................. 8
Full Disk Encryption........................................................................................................................................................... 10
Encryption on Server Operating Systems............................................................................................................12
SED Manager...................................................................................................................................................................... 15
BitLocker Manager............................................................................................................................................................ 18
Chapter 3: Registry Settings....................................................................................................... 20
Encryption...........................................................................................................................................................................20
SED Manager......................................................................................................................................................................23
Full Disk Encryption.......................................................................................................................................................... 25
BitLocker Manager............................................................................................................................................................27
Chapter 4: Install Using the Master Installer............................................................................... 28
Install Interactively Using the Master Installer........................................................................................................... 28
Install by Command Line Using the Master Installer................................................................................................. 31
Chapter 5: Uninstall the Master Installer..................................................................................... 34
Uninstall the Master Installer..........................................................................................................................................34
Chapter 6: Install Using the Child Installers.................................................................................35
Install Drivers......................................................................................................................................................................36
Install Encryption...............................................................................................................................................................36
Install Full Disk Encryption.............................................................................................................................................. 40
Install Encryption on Server Operating System..........................................................................................................41
Install Interactively...................................................................................................................................................... 42
Install Using the Command Line...............................................................................................................................45
Activate..........................................................................................................................................................................47
Install SED Manager and PBA Advanced Authentication........................................................................................ 49
Install BitLocker Manager............................................................................................................................................... 50
Chapter 7: Uninstall Using the Child Installers.............................................................................52
Uninstall Encryption and Encryption on Server Operating System ..................................................................... 53
Uninstall Full Disk Encryption......................................................................................................................................... 55
Uninstall SED Manager.................................................................................................................................................... 56
Uninstall BitLocker Manager...........................................................................................................................................57
Chapter 8: Data Security Uninstaller........................................................................................... 58
Contents
Contents 3