Deployment Guide
Table Of Contents
- Dell Encryption Personal Installation Guide v11.1
- Contents
- Overview
- Requirements
- Download the Software
- Installation
- Advanced Authentication and Encryption Personal Setup Wizards
- Configure Console Settings
- Uninstall the Master Installer
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Policies and Template Descriptions
- Policies
- Template Descriptions
- Aggressive Protection for All Fixed Drives and External Drives
- PCI Regulation Targeted
- Data Breach Regulation Targeted
- HIPAA Regulation Targeted
- Basic Protection for All Fixed Drives and External Drives (Default)
- Basic Protection for All Fixed Drives
- Basic Protection for System Drive Only
- Basic Protection for External Drives
- Encryption Disabled
- Extract Child Installers
- Troubleshooting
- Glossary

Chapter 1: Overview...................................................................................................................... 5
Encryption Personal............................................................................................................................................................ 5
Advanced Authentication.................................................................................................................................................. 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Requirements.............................................................................................................. 6
Encryption............................................................................................................................................................................. 6
SED Management................................................................................................................................................................9
Chapter 3: Download the Software.............................................................................................. 12
Chapter 4: Installation................................................................................................................. 14
Import Entitlement.............................................................................................................................................................14
Choose an Installation Method....................................................................................................................................... 14
Interactive Installation.......................................................................................................................................................14
Command-Line Installation...............................................................................................................................................17
Chapter 5: Advanced Authentication and Encryption Personal Setup Wizards.............................. 19
Chapter 6: Configure Console Settings........................................................................................27
Change the Administrator Password and Backup Location.................................................................................... 27
Configure Pre-Boot Authentication..............................................................................................................................29
Change SED Management and PBA Settings....................................................................................................... 31
Manage Users and Users' Authentication................................................................................................................... 32
Add User........................................................................................................................................................................ 32
Delete User................................................................................................................................................................... 32
Remove All of a User's Enrolled Credentials.........................................................................................................32
Chapter 7: Uninstall the Master Installer..................................................................................... 33
Choose an Uninstallation Method................................................................................................................................. 33
Uninstall Interactively................................................................................................................................................. 33
Uninstall from the Command Line........................................................................................................................... 33
Chapter 8: Uninstall Using the Child Installers.............................................................................34
Uninstall Encryption.......................................................................................................................................................... 34
Choose an Uninstallation Method............................................................................................................................34
Uninstall Interactively................................................................................................................................................. 34
Uninstall from the Command-Line.......................................................................................................................... 35
Uninstall Encryption Management Agent.................................................................................................................... 36
Choose an Uninstallation Method............................................................................................................................36
Uninstall Interactively................................................................................................................................................. 36
Uninstall from the Command-Line...........................................................................................................................37
Contents
Contents 3