Administrator Guide
Chapter 1: Introduction................................................................................................................. 5
Overview................................................................................................................................................................................5
FileVault Encryption............................................................................................................................................................ 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Requirements.............................................................................................................. 6
Encryption Client................................................................................................................................................................. 6
Encryption Client Hardware........................................................................................................................................ 6
Encryption Client Software......................................................................................................................................... 6
Advanced Threat Prevention............................................................................................................................................ 7
Advanced Threat Prevention Hardware...................................................................................................................7
Advanced Threat Prevention Software....................................................................................................................8
Advanced Threat Prevention Ports...........................................................................................................................8
Compatibility................................................................................................................................................................... 8
Chapter 3: Tasks for the Encryption Client...................................................................................11
Install/Upgrade the Encryption Client........................................................................................................................... 11
Interactive Installation or Upgrade...........................................................................................................................12
Command Line Installation/Upgrade....................................................................................................................... 13
Enable Full Disk Access for Removable Media......................................................................................................15
Activate the Encryption Client........................................................................................................................................16
View Encryption Policy and Status................................................................................................................................16
View Policy and Status in the Management Console.......................................................................................... 19
System Volumes................................................................................................................................................................ 20
Enable Encryption........................................................................................................................................................20
Encryption Process......................................................................................................................................................21
Recycling FileVault Recovery Keys......................................................................................................................... 23
User Experience...........................................................................................................................................................24
Recovery............................................................................................................................................................................. 25
Mount Volume..............................................................................................................................................................25
FileVault Recovery...................................................................................................................................................... 26
Removable Media.............................................................................................................................................................. 30
Supported Formats..................................................................................................................................................... 30
Encryption External Media and Policy Updates................................................................................................... 30
Encryption Exceptions............................................................................................................................................... 30
Errors on the Removable Media Tab...................................................................................................................... 30
Audit Messages.............................................................................................................................................................31
Collect Log Files for Endpoint Security Suite Enterprise......................................................................................... 31
Uninstall the Encryption Client for Mac....................................................................................................................... 31
Activation as Administrator.............................................................................................................................................32
Activate..........................................................................................................................................................................32
Activate Temporarily...................................................................................................................................................32
Encryption Client Reference...........................................................................................................................................32
About Optional Firmware Password Protection...................................................................................................32
Contents
Contents 3