Deployment Guide

Table Of Contents
Chapter 1: Overview...................................................................................................................... 5
Encryption Personal............................................................................................................................................................ 5
Advanced Authentication.................................................................................................................................................. 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Requirements.............................................................................................................. 6
Encryption............................................................................................................................................................................. 6
SED Management................................................................................................................................................................9
Chapter 3: Download the Software.............................................................................................. 12
Chapter 4: Installation................................................................................................................. 14
Import Entitlement.............................................................................................................................................................14
Choose an Installation Method....................................................................................................................................... 14
Interactive Installation.......................................................................................................................................................14
Command-Line Installation...............................................................................................................................................17
Chapter 5: Advanced Authentication and Encryption Personal Setup Wizards.............................. 19
Chapter 6: Configure Console Settings........................................................................................27
Change the Administrator Password and Backup Location.................................................................................... 27
Configure Pre-Boot Authentication..............................................................................................................................29
Change SED Management and PBA Settings....................................................................................................... 31
Manage Users and Users' Authentication................................................................................................................... 32
Add User........................................................................................................................................................................ 32
Delete User................................................................................................................................................................... 32
Remove All of a User's Enrolled Credentials.........................................................................................................32
Chapter 7: Uninstall the Master Installer..................................................................................... 33
Choose an Uninstallation Method................................................................................................................................. 33
Uninstall Interactively................................................................................................................................................. 33
Uninstall from the Command Line........................................................................................................................... 33
Chapter 8: Uninstall Using the Child Installers.............................................................................34
Uninstall Encryption.......................................................................................................................................................... 34
Choose an Uninstallation Method............................................................................................................................34
Uninstall Interactively................................................................................................................................................. 34
Uninstall from the Command-Line.......................................................................................................................... 35
Uninstall Encryption Management Agent.................................................................................................................... 36
Choose an Uninstallation Method............................................................................................................................36
Uninstall Interactively................................................................................................................................................. 36
Uninstall from the Command-Line...........................................................................................................................37
Contents
Contents 3