Administrator Guide

Tasks for the Encryption Client
Topics:
Install/Upgrade Encryption Enterprise for Mac
Activate Encryption Enterprise for Mac
Collect Log Files for Encryption Enterprise
View Encryption Policy and Status
System Volumes
Recovery
Removable Media
Uninstall Encryption Enterprise for Mac
Uninstall Encryption External Media
Install/Upgrade Encryption Enterprise for Mac
This section guides you through the Encryption Enterprise for Mac installation/upgrade and activation process.
There are two methods to install/upgrade Encryption Enterprise for Mac. Select one of the following:
Interactive Installation/Upgrade and Activation - This method is the easiest method to install or upgrade the client software
package. However, this method does not allow any customizations. If you intend to use Boot Camp or a version of operating
system that is not yet fully supported by Dell (through .plist modification), you must use the command line installation/
upgrade method. For information about using Boot Camp, see Using Boot Camp.
Command Line Installation/Upgrade - This is an advanced installation/upgrade method that should only be used by
administrators experienced with command line syntax. If you intend to use Boot Camp or a version of operating system that
is not yet fully supported by Dell (through .plist modification), you must use this method to install or upgrade the client
software package. For information about using Boot Camp, see Using Boot Camp.
For more information on the Installer Command options, see the Mac OS X Reference Library at http://developer.apple.com.
Dell highly recommends using remote deployment tools, such as Apple Remote Desktop, to distribute the client installation
package.
NOTE:
Apple often releases new versions of operating systems between releases of Encryption Enterprise for Mac. To support
as many customers as possible, a modification of the com.dell.ddp.plist file is allowed to support these cases. Testing of
these versions begins as soon as Apple releases a new version, to ensure that they are compatible with Encryption
Enterprise for Mac.
Prerequisites
Dell recommends that IT best practices are followed during the deployment of client software. This includes, but is not limited
to, controlled test environments for initial tests and staggered deployments to users.
Before beginning this process, ensure the following prerequisites are met:
Ensure that the Dell Server and its components are already installed.
If you have not yet installed the Dell Server, follow the instructions in the appropriate guide below.
Security Management Server Installation and Migration Guide
Security Management Server Virtual Quick Start Guide and Installation Guide
Ensure that you have the Security Server and Policy Proxy URLs handy. Both are needed for client software installation and
activation.
3
8 Tasks for the Encryption Client