Administrator Guide

For kext consent, one or both of these dialogs display.
System Extension Blocked System Extension Blocked
a. Click OK.
b. Click OK.
c. To approve these extensions, select System
Preferences > Security & Privacy.
d. Click Allow next to System software from developer
Credant Technologies (Dell, Inc, formerly Credant
Technologies).
e. Click OK.
Complete these steps if the system extension for mounting
FDEEM volumes could not be loaded.
a. Click Open System Preferences.
b. Click OK.
c. Under the General tab, click Allow next to System
software from developer Credant Technologies (Dell, Inc,
formerly Credant Technologies).
d. Click OK.
The Allow button may be available for 30 minutes or less after installing. If you skip this step, the dialog continues to display
about every twenty-five minutes until you complete this.
18. Continue to Activate Encryption Enterprise for Mac.
macOS 10.15 and higher with removable media
If an enterprise uses removable media with macOS 10.15 and higher, users must enable full disk access for external media. For
more information, see Enable Full Disk Access for Removable Media.
Command Line Installation/Upgrade
To install the client software using the command line, follow these steps.
Command Line Installation
1. From the Dell installation media, mount the Dell-Encryption-Enterprise-<version>.dmg file.
2. Copy the Install Dell Encryption Enterprise package and the com.dell.ddp.plist file to the local drive.
3. In the Management Console, modify the following policies if needed. Policy settings override .plist file settings. Use .plist
settings if policies do not exist in the Management Console.
No Auth User List - In some cases, you may want to edit this policy so that specified users or classes of users do not
have to activate against the Dell Server. For example, in an educational facility, teachers would be prompted to activate
their computer against the Dell Server, but individual students using lab computers would not. The lab administrator could
use this policy and the account running the client tool so that student users could log in without being prompted to
activate. For information on the client tool, see Client Tool. If an enterprise needs to know which user account is
associated with each Mac computer, all users must activate against the Dell Server, so that enterprise would not edit this
property. However, if a user wants to provision Encryption External Media, the user must be authenticated against the
Dell Server.
4. Open the .plist file and edit any additional placeholder values:
NOTE:
Apple often releases new versions of operating systems between releases of Encryption Enterprise for Mac. To support
as many customers as possible, Dell allows a modification of the .plist file to support these cases. As soon as Apple
releases a new version, Dell begins testing these versions to ensure that they are compatible with Encryption Enterprise
for Mac.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/
PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>NoAuthenticateUsers</key> [In this sample code, after one user activates the
computer against the Dell Server, other users can log in without being prompted to
activate.]
<dict>
<key>dsAttrTypeStandard:AuthenticationAuthority</key>
<array>
<string>*</string>
</array>
</dict>
10
Tasks for the Encryption Client