Administrator Guide

Table Of Contents
Kapitel 1: Einleitung........................................................................................................................ 6
Vor der Installation.................................................................................................................................................................6
Verwendung des Handbuchs............................................................................................................................................... 7
Kontaktieren des Dell ProSupports......................................................................................................................................7
Kapitel 2: Anforderungen.................................................................................................................8
Alle Clients.............................................................................................................................................................................. 8
Verschlüsselung..................................................................................................................................................................... 9
Vollständige Datenträgerverschlüsselung..........................................................................................................................11
Encryption auf Serverbetriebssystemen...................................................................................................................13
SED Manager........................................................................................................................................................................16
BitLocker Manager...............................................................................................................................................................19
Kapitel 3: Registrierungseinstellungen............................................................................................ 22
Verschlüsselung................................................................................................................................................................... 22
SED Manager.......................................................................................................................................................................26
Vollständige Datenträgerverschlüsselung........................................................................................................................ 28
BitLocker Manager..............................................................................................................................................................30
Kapitel 4: Installation unter Verwendung des Master-Installationsprogramms.....................................31
Aktive Installation unter Verwendung des Master-Installationsprogramms................................................................. 31
Installation durch Befehlszeile mit dem Master Installationsprogramm........................................................................34
Kapitel 5: Deinstallation des Master-Installationsprogramms............................................................ 36
Deinstallieren des Master-Installationsprogramms für .................................................................................................. 36
Kapitel 6: Installation unter Verwendung der untergeordneten Installationsprogramme.......................37
Treiber installieren............................................................................................................................................................... 38
Encryption installieren.........................................................................................................................................................38
Full Disk Encryption installieren..........................................................................................................................................42
Encryption auf Serverbetriebssystem installieren........................................................................................................... 43
Interaktiv installieren......................................................................................................................................................44
Über die Befehlszeile installieren..................................................................................................................................48
Aktivieren........................................................................................................................................................................50
SED Manager und PBA Advanced Authentication installieren...................................................................................... 52
BitLocker Manager installieren.......................................................................................................................................... 53
Kapitel 7: Deinstallation unter Verwendung der untergeordneten Installationsprogramme...................55
Encryption und Encryption auf einem Serverbetriebssystem deinstallieren................................................................56
Full Disk Encryption deinstallieren..................................................................................................................................... 58
SED Manager deinstallieren............................................................................................................................................... 59
BitLocker Manager deinstallieren...................................................................................................................................... 60
Kapitel 8: Data Security-Deinstallationsprogramm............................................................................61
Inhaltsverzeichnis
Inhaltsverzeichnis 3