Install Guide

Uninstall Web Protection and Firewall......................................................................................................................... 63
Uninstall Advanced Threat Prevention........................................................................................................................ 63
Uninstall Full Disk Encryption......................................................................................................................................... 63
Uninstall SED Manager.................................................................................................................................................... 64
Uninstall Encryption and Encryption on Server Operating System ..................................................................... 65
Uninstall BitLocker Manager...........................................................................................................................................67
Chapter 8: Data Security Uninstaller........................................................................................... 68
Chapter 9: Commonly Used Scenarios......................................................................................... 73
Encryption Client and Advanced Threat Prevention.................................................................................................74
SED Manager and Encryption External Media........................................................................................................... 75
BitLocker Manager and Encryption External Media..................................................................................................75
BitLocker Manager and Advanced Threat Prevention............................................................................................. 75
Chapter 10: Provision a Tenant.................................................................................................... 77
Provision a Tenant.............................................................................................................................................................77
Chapter 11: Configure Advanced Threat Prevention Agent Auto Update....................................... 81
Chapter 12: Pre-Installation Configuration for SED UEFI, and BitLocker Manager........................82
Initialize the TPM...............................................................................................................................................................82
Pre-Installation Configuration for UEFI Computers..................................................................................................82
Pre-Installation Configuration to Set Up a BitLocker PBA Partition.................................................................... 83
Chapter 13: Designate the Dell Server through Registry.............................................................. 84
Chapter 14: Extract Child Installers............................................................................................. 87
Chapter 15: Configure Key Server................................................................................................88
Services Panel - Add Domain Account User...............................................................................................................88
Key Server Config File - Add User for Security Management Server Communication....................................89
Services Panel - Restart Key Server Service.............................................................................................................90
Management Console - Add Forensic Administrator................................................................................................90
Chapter 16: Use the Administrative Download Utility (CMGAd)................................................... 92
Use Forensic Mode........................................................................................................................................................... 92
Use Admin Mode............................................................................................................................................................... 93
Chapter 17: Configure Encryption on a Server Operating System................................................ 96
Chapter 18: Configure Deferred Activation.................................................................................. 99
Deferred Activation Customization...............................................................................................................................99
Prepare the Computer for Installation......................................................................................................................... 99
Install Encryption with Deferred Activation.............................................................................................................. 100
Activate Encryption with Deferred Activation......................................................................................................... 100
Troubleshoot Deferred Activation................................................................................................................................101
4
Contents