Administrator Guide
Activate Encryption Enterprise for Mac
The activation process associates network user accounts in the Dell Server to the Mac computer and retrieves each account's
security policies, sends inventory and status updates, enables recovery workflows, and provides comprehensive compliance
reporting. The client software performs the activation process for each user account it finds on the computer as each user logs
in to their user account.
After the client software has been installed and the Mac has restarted, the user logs in:
1. Enter the user name and password managed by Active Directory.
If the password dialog times out, click Refresh on the Policies tab. In View Policy and Status on the Local Computer, see
step 1.
2. Select the Domain to log on to.
If the Dell Server is configured for multi-domain support and a different domain must be used for activation, use the User
Principle Name (UPN), which is of the form <username>@<domain>.
3. Options are:
● Click Activate.
○ If activation succeeds, a message displays to indicate successful activation. Encryption Enterprise for Mac is now fully
operational and managed by the Dell Server.
NOTE:
If an alert displays regarding an Encryption External Media required resource, click the Go to Security and
Privacy button and then click Allow for any system extension required by your organization. You must allow this
extension for Encryption External Media to function properly.
○ If activation fails, the client software allows three attempts to enter correct domain credentials. If all three attempts
fail, the prompt for domain credentials displays again at the next user login.
● Click Not Now to dismiss the dialog, which displays again at the next user login.
NOTE:
When the administrator needs to decrypt a drive on a Mac computer, whether from a remote location, by running a
script, or in person, the client software prompts the user to allow the administrator access and requires the user to
enter their password.
NOTE:
If you set the computer for FileVault encryption and the files are encrypted, be sure to log into an account from
which you can later boot the system.
4. Do one of these:
● If encryption was not enabled prior to activation, continue to Encryption Process.
● If encryption was enabled prior to activation, continue to View Encryption Policy and Status.
Collect Log Files for Encryption Enterprise
In System Preferences > Dell Encryption Enterprise > System Volumes, a Collect Logs button at the bottom right allows an
administrator to pre-generate logs for support. This action may impact performance while logs are collected.
Tasks for the Encryption Client
13