Reference Guide

Table of Contents
vi
Allow PBA Login Bypass ........................................................................................................................ 90
Unlock a Self-Encrypting Drive ............................................................................................................. 90
Remove Users from Endpoint with Self-Encrypting Drive .................................................................... 91
Lock a Self-Encrypting Drive ................................................................................................................. 91
Send Wipe Command to Self-Encrypting Drive ..................................................................................... 91
Set the Dell Server Connection Retry Interval ..................................................................................... 92
Administrators.............................................................................................................................................. 92
Assign or Modify Administrator Roles ....................................................................................................... 92
Administrator Roles .................................................................................................................................. 93
Delegate Administrator Rights ................................................................................................................. 96
Reporting ......................................................................................................................................................... 96
Manage Reports ............................................................................................................................................ 97
Manage Reports ........................................................................................................................................ 97
View or Modify an Existing Report ........................................................................................................ 97
Create a New Report ............................................................................................................................ 97
View Report .............................................................................................................................................. 97
Query using Search and More... to filter .............................................................................................. 98
Export File ............................................................................................................................................ 99
Add Schedule ............................................................................................................................................ 99
Compliance Reporter ................................................................................................................................. 100
Export Events to a SIEM/Syslog Server ...................................................................................................... 100
Export Audit Events with TLS/SSL over TCP .......................................................................................... 100
Advanced Threat Prevention Syslog Event Types ...................................................................................... 102
Advanced Threat Prevention Syslog IP Addresses ..................................................................................... 105
Management .................................................................................................................................................. 105
Commit Policies ......................................................................................................................................... 105
Log Analyzer............................................................................................................................................... 106
Recovery .................................................................................................................................................... 106
Recover Data - Encryption External Media Authentication Failure ....................................................... 106
Encryption External Media Recovery for User "Removed" from Database ............................................. 109
Enable Federated Key Recovery ............................................................................................................ 110
Recover Data - BitLocker Manager ......................................................................................................... 110
Recover Endpoint ................................................................................................................................... 110
Windows Recovery .............................................................................................................................. 110