Administrator Guide
○ See the Dell Encrypt Help to learn how to use the features of Encryption. Access the help from <Install dir>
\Program Files\Dell\Dell Data Protection\Encryption\Help.
○ See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from
<Install dir>\Program Files\Dell\Dell Data Protection\Encryption\EMS.
○ See the Encryption Enterprise to learn how to use the features of PBA authentication . Access the help from <Install
dir>\Program Files\Dell\Dell Data Protection\Client Security Framework\Help.
Install Drivers
● Drivers and firmware for ControlVault, fingerprint readers and smart cards are not included in the master installer or child
installer executable files. The drivers and firmware must be kept up-to-date, and can be downloaded from http://
www.dell.com/support and selecting your computer model. Download the appropriate drivers and firmware based on your
authentication hardware.
○ ControlVault
○ NEXT Biometrics Fingerprint Driver
○ Validity Fingerprint Reader 495 Driver
○ O2Micro Smart Card Driver
If installing on non-Dell hardware, download updated drivers and firmware from that vendor's website.
Install Encryption
● Review Encryption Requirements if your organization is using a certificate signed by a root authority, such as EnTrust or
Verisign. A registry setting change is needed on the client computer to enable certificate validation.
● Users should update their policies by right-clicking the Dell Encryption icon in the notification area and selecting Check for
Policy Updates after installation completes.
● The Encryption installer can be located at:
○ From dell.com/support - If needed, Obtain the Software from dell.com/support and then Extract the Child Installers
from the Master Installer. After extraction, locate the file at C:\extracted\Encryption.
○ From Your Dell FTP Account - Locate the installation bundle at Encryption-Enterprise-10.x.x.xxx.zip and then Extract
the Child Installers from the Master Installer. After extraction, locate the file at C:\extracted\Encryption.
○
NOTE: Dell Encryption logs do not specify if insufficient disk storage caused installation failure.
Command Line Installation
● The following table details the parameters available for the installation.
Parameters
SERVERHOSTNAME=<ServerName> (FQDN of the Dell Server for re-activation)
POLICYPROXYHOSTNAME=<RGKName> (FQDN of the default Policy Proxy)
MANAGEDDOMAIN=<MyDomain> (Domain to be used for the device)
DEVICESERVERURL=<DeviceServerName/SecurityServerName> (URL used for activation; usually includes server name,
port, and xapi)
GKPORT=<NewGKPort> (Gatekeeper port)
MACHINEID=<MachineName> (Computer name)
RECOVERYID=<RecoveryID> (Recovery ID)
36 Install Using the Child Installers