Install Guide
Using This Guide
Use this guide in the following order.
● See Requirements for client prerequisites, computer hardware and software information, limitations, and special registry
modifications needed for features.
● If needed, see Pre-Installation Configuration for SED UEFI, and BitLocker.
● If your clients will be entitled using Dell Digital Delivery, see Set GPO on Domain Controller to Enable Entitlements.
● If installing clients using the Endpoint Security Suite Enterprise master installer, see:
○ Install Interactively Using the Master Installer
or
○ Install by Command Line Using the Master Installer
● If installing clients using the child installers, the child installer executable files must be extracted from the master installer.
See Extract the Child Installers from the Master Installer, then return here.
○ Install Child Installers by Command line:
■ Install Encryption - use these instructions to install Encryption, which is the component that enforces security policy,
whether a computer is connected to the network, disconnected from the network, lost, or stolen.
■ Install Full Disk Encryption Client - use these instructions to install the Full Disk Encryption, which is a component that
enforces security policy, whether a computer is connected to the network, disconnected from the network, lost, or
stolen.
■ Install Advanced Threat Prevention - use these instructions to install the Advanced Threat Prevention, which is next-
generation antivirus protection that uses algorithmic science and machine learning to identify, classify, and prevent
both known and unknown cyberthreats from executing or harming endpoints.
■ Install Web Protection and Firewall - use these instructions to install the optional Web Protection and Firewall
features. The Client Firewall is a stateful firewall that checks all incoming and outgoing traffic against its list of rules.
Web Protection monitors web browsing and downloads to identify threats and enforce action set by policy when a
threat is detected, based on ratings for websites.
■ Install SED Manager - use these instructions to install encryption software for SEDs. Although SEDs provide their own
encryption, they lack a platform to manage their encryption and policies. With SED Manager, all policies, storage, and
retrieval of encryption keys are available from a single console, reducing the risk that computers are unprotected in
the event of loss or unauthorized access.
■ Install BitLocker Manager - use these instructions to install BitLocker Manager, designed to improve the security of
BitLocker deployments and to simplify and reduce the cost of ownership.
NOTE:
Most child installers can be installed interactively, but are not described in this guide. However, the Advanced
Threat Prevention and Full Disk Encryption child installers can be installed by command line only.
● See Commonly Used Scenarios for scripts of our most commonly used scenarios.
Contact Dell ProSupport
Call 877-459-7304, extension 4310039 for 24x7 phone support for your Dell product.
Additionally, online support for Dell products is available at dell.com/support. Online support includes drivers, manuals, technical
advisories, FAQs, and emerging issues.
Be sure to help us quickly connect you to the right technical expert by having your Service Tag or Express Service Code
available when you call.
For phone numbers outside of the United States, see Dell ProSupport International Phone Numbers.
Introduction
7