Administrator Guide
Table Of Contents
- Dell Encryption Enterprise Advanced Installation Guide v11.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Download the Software
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Chapter 1: Introduction................................................................................................................. 5
Before You Begin.................................................................................................................................................................5
Using This Guide.................................................................................................................................................................. 6
Contact Dell ProSupport....................................................................................................................................................6
Chapter 2: Requirements...............................................................................................................7
All Clients............................................................................................................................................................................... 7
Encryption............................................................................................................................................................................. 8
Full Disk Encryption........................................................................................................................................................... 10
Encryption on Server Operating Systems............................................................................................................12
SED Manager...................................................................................................................................................................... 15
BitLocker Manager............................................................................................................................................................ 18
Chapter 3: Registry Settings....................................................................................................... 20
Encryption...........................................................................................................................................................................20
SED Manager......................................................................................................................................................................23
Full Disk Encryption.......................................................................................................................................................... 25
BitLocker Manager............................................................................................................................................................27
Chapter 4: Install Using the Master Installer............................................................................... 28
Install Interactively Using the Master Installer........................................................................................................... 28
Install by Command Line Using the Master Installer................................................................................................. 31
Chapter 5: Uninstall the Master Installer..................................................................................... 33
Uninstall the Master Installer..........................................................................................................................................33
Chapter 6: Install Using the Child Installers.................................................................................34
Install Drivers......................................................................................................................................................................35
Install Encryption...............................................................................................................................................................35
Install Full Disk Encryption.............................................................................................................................................. 39
Install Encryption on Server Operating System.........................................................................................................40
Install Interactively....................................................................................................................................................... 41
Install Using the Command Line...............................................................................................................................44
Activate..........................................................................................................................................................................46
Install SED Manager and PBA Advanced Authentication........................................................................................ 48
Install BitLocker Manager................................................................................................................................................49
Chapter 7: Uninstall Using the Child Installers............................................................................. 51
Uninstall Encryption and Encryption on Server Operating System ..................................................................... 52
Uninstall Full Disk Encryption......................................................................................................................................... 54
Uninstall SED Manager.................................................................................................................................................... 55
Uninstall BitLocker Manager.......................................................................................................................................... 56
Chapter 8: Data Security Uninstaller........................................................................................... 57
Contents
Contents 3