Administrator Guide

See the Dell Encrypt Help to learn how to use the features of Encryption. Access the help from <Install dir>
\Program Files\Dell\Dell Data Protection\Encryption\Help.
See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from
<Install dir>\Program Files\Dell\Dell Data Protection\Encryption\EMS.
See the Encryption Enterprise to learn how to use the features of PBA authentication . Access the help from <Install
dir>\Program Files\Dell\Dell Data Protection\Client Security Framework\Help.
Install Drivers
Drivers and firmware for ControlVault, fingerprint readers and smart cards are not included in the master installer or child
installer executable files. The drivers and firmware must be kept up-to-date, and can be downloaded from http://
www.dell.com/support and selecting your computer model. Download the appropriate drivers and firmware based on your
authentication hardware.
ControlVault
NEXT Biometrics Fingerprint Driver
Validity Fingerprint Reader 495 Driver
O2Micro Smart Card Driver
If installing on non-Dell hardware, download updated drivers and firmware from that vendor's website.
Install Encryption
Review Encryption Requirements if your organization is using a certificate signed by a root authority, such as EnTrust or
Verisign. A registry setting change is needed on the client computer to enable certificate validation.
Users should update their policies by right-clicking the Dell Encryption icon in the notification area and selecting Check for
Policy Updates after installation completes.
The Encryption installer can be located at:
From dell.com/support - If needed, Obtain the Software from dell.com/support and then Extract the Child Installers
from the Master Installer. After extraction, locate the file at C:\extracted\Encryption.
From Your Dell FTP Account - Locate the installation bundle at Encryption-Enterprise-10.x.x.xxx.zip and then Extract
the Child Installers from the Master Installer. After extraction, locate the file at C:\extracted\Encryption.
NOTE: Dell Encryption logs do not specify if insufficient disk storage caused installation failure.
Command Line Installation
The following table details the parameters available for the installation.
Parameters
SERVERHOSTNAME=<ServerName> (FQDN of the Dell Server for re-activation)
POLICYPROXYHOSTNAME=<RGKName> (FQDN of the default Policy Proxy)
MANAGEDDOMAIN=<MyDomain> (Domain to be used for the device)
DEVICESERVERURL=<DeviceServerName/SecurityServerName> (URL used for activation; usually includes server name,
port, and xapi)
GKPORT=<NewGKPort> (Gatekeeper port)
MACHINEID=<MachineName> (Computer name)
RECOVERYID=<RecoveryID> (Recovery ID)
36 Install Using the Child Installers