Administrator Guide

Kapitel 1: Einleitung........................................................................................................................ 6
Vor der Installation.................................................................................................................................................................6
Verwendung des Handbuchs............................................................................................................................................... 7
Kontaktieren des Dell ProSupports......................................................................................................................................7
Kapitel 2: Anforderungen.................................................................................................................8
Alle Clients.............................................................................................................................................................................. 8
Verschlüsselung..................................................................................................................................................................... 9
Vollständige Datenträgerverschlüsselung..........................................................................................................................11
Encryption auf Serverbetriebssystemen...................................................................................................................13
SED Manager........................................................................................................................................................................16
BitLocker Manager...............................................................................................................................................................19
Kapitel 3: Registrierungseinstellungen............................................................................................ 22
Verschlüsselung................................................................................................................................................................... 22
SED Manager.......................................................................................................................................................................26
Vollständige Datenträgerverschlüsselung........................................................................................................................ 28
BitLocker Manager..............................................................................................................................................................30
Kapitel 4: Installation unter Verwendung des Master-Installationsprogramms.....................................31
Aktive Installation unter Verwendung des Master-Installationsprogramms................................................................. 31
Installation durch Befehlszeile mit dem Master Installationsprogramm....................................................................... 35
Kapitel 5: Deinstallation des Master-Installationsprogramms............................................................ 37
Deinstallieren des Master-Installationsprogramms für ...................................................................................................37
Kapitel 6: Installation unter Verwendung der untergeordneten Installationsprogramme.......................38
Treiber installieren............................................................................................................................................................... 39
Encryption installieren.........................................................................................................................................................39
Full Disk Encryption installieren..........................................................................................................................................43
Encryption auf Serverbetriebssystem installieren........................................................................................................... 44
Interaktiv installieren......................................................................................................................................................45
Über die Befehlszeile installieren..................................................................................................................................49
Aktivieren.........................................................................................................................................................................51
SED Manager und PBA Advanced Authentication installieren...................................................................................... 53
BitLocker Manager installieren.......................................................................................................................................... 54
Kapitel 7: Deinstallation unter Verwendung der untergeordneten Installationsprogramme...................56
Encryption und Encryption auf einem Serverbetriebssystem deinstallieren................................................................57
Full Disk Encryption deinstallieren..................................................................................................................................... 59
SED Manager deinstallieren............................................................................................................................................... 60
BitLocker Manager deinstallieren.......................................................................................................................................61
Kapitel 8: Data Security Deinstallationsprogramm............................................................................62
Inhaltsverzeichnis
Inhaltsverzeichnis 3