Deployment Guide

1: ........................................................................................................................................5
Encryption Personal.............................................................................................................................................................. 5
Advanced Authentication..................................................................................................................................................... 5
Dell ProSupport へのお問い合わせ................................................................................................................................... 5
2: 要件....................................................................................................................................... 6
.....................................................................................................................................................................................6
SED 管理................................................................................................................................................................................ 9
3: ソフトウェアのダウンロ.................................................................................................... 12
4: インスト.......................................................................................................................... 14
資格情報のインポ....................................................................................................................................................... 14
インストル方法の選...................................................................................................................................................14
話型インスト........................................................................................................................................................... 14
コマンド ラインでのインスト................................................................................................................................. 18
5: Encryption Personal...............................................................................................................19
6: コンソルの設定................................................................................................................... 27
管理者パスワドおよびバックアップ場所の.................................................................................................... 27
Pre-Boot 認証の設定......................................................................................................................................................... 29
SED 管理と PBA 設定の...................................................................................................................................... 31
およびユ認証の管理................................................................................................................................32
の追加..............................................................................................................................................................32
の削除..............................................................................................................................................................32
のすべての登録済み資格情報の削除........................................................................................................32
7: マスタインストラのアンインスト..................................................................................33
アンインストル方法の選..........................................................................................................................................33
話形式でのアンインスト................................................................................................................................33
コマンドラインからのアンインスト............................................................................................................... 33
8: 子インストラを使用したアンインスト.............................................................................. 34
Encryption のアンインスト.......................................................................................................................................34
アンインストル方法の選.................................................................................................................................... 34
Encryption Management Agent のアンインスト...................................................................................................36
アンインストル方法の選....................................................................................................................................36
9: Data Security Uninstaller....................................................................................................... 38
10: 「ポリシテンプレトの明」............................................................................................... 43
ポリシ............................................................................................................................................................................... 43
目次
目次 3