Administrator Guide

Table Of Contents
Chapter 1: Introduction................................................................................................................. 5
Before You Begin.................................................................................................................................................................5
Using This Guide.................................................................................................................................................................. 6
Contact Dell ProSupport....................................................................................................................................................6
Chapter 2: Requirements...............................................................................................................7
All Clients............................................................................................................................................................................... 7
Encryption............................................................................................................................................................................. 8
Full Disk Encryption........................................................................................................................................................... 10
Encryption on Server Operating Systems............................................................................................................12
SED Manager...................................................................................................................................................................... 15
BitLocker Manager............................................................................................................................................................ 18
Chapter 3: Registry Settings....................................................................................................... 20
Encryption...........................................................................................................................................................................20
SED Manager......................................................................................................................................................................23
Full Disk Encryption.......................................................................................................................................................... 25
BitLocker Manager............................................................................................................................................................27
Chapter 4: Install Using the Master Installer............................................................................... 28
Install Interactively Using the Master Installer........................................................................................................... 28
Install by Command Line Using the Master Installer................................................................................................. 31
Chapter 5: Uninstall the Master Installer..................................................................................... 33
Uninstall the Master Installer..........................................................................................................................................33
Chapter 6: Install Using the Child Installers.................................................................................34
Install Drivers......................................................................................................................................................................35
Install Encryption...............................................................................................................................................................35
Install Full Disk Encryption.............................................................................................................................................. 39
Install Encryption on Server Operating System.........................................................................................................40
Install Interactively....................................................................................................................................................... 41
Install Using the Command Line...............................................................................................................................44
Activate..........................................................................................................................................................................46
Install SED Manager and PBA Advanced Authentication........................................................................................ 48
Install BitLocker Manager................................................................................................................................................49
Chapter 7: Uninstall Using the Child Installers............................................................................. 51
Uninstall Encryption and Encryption on Server Operating System ..................................................................... 52
Uninstall Full Disk Encryption......................................................................................................................................... 54
Uninstall SED Manager.................................................................................................................................................... 55
Uninstall BitLocker Manager.......................................................................................................................................... 56
Chapter 8: Data Security Uninstaller........................................................................................... 57
Contents
Contents 3