Install Guide
Web Protection 및 Firewall 제거....................................................................................................................................... 61
Advanced Threat Prevention 설치 제거...........................................................................................................................61
Full Disk Encryption을 설치 제거합니다.......................................................................................................................... 61
SED Manager 설치 제거.................................................................................................................................................... 62
Encryption 및 서버 운영 체제의 Encryption 제거......................................................................................................... 63
BitLocker Manager 제거.................................................................................................................................................... 65
장 8: Data Security 제거 프로그램....................................................................................................66
장 9: 일반적으로 사용되는 시나리오.................................................................................................. 71
Encryption 클라이언트 및 Advanced Threat Prevention.............................................................................................. 72
SED Manager 및 Encryption External Media...................................................................................................................73
BitLocker Manager 및 Encryption External Media..........................................................................................................73
BitLocker Manager 및 Advanced Threat Prevention......................................................................................................73
장 10: 테넌트 프로비저닝.................................................................................................................75
테넌트 프로비저닝.............................................................................................................................................................75
장 11: Advanced Threat Prevention 에이전트 자동 업데이트 구성......................................................... 79
장 12: SED UEFI 및 BitLocker Manager용 설치 전 구성....................................................................... 80
TPM 초기화.........................................................................................................................................................................80
UEFI 컴퓨터의 사전 설치 구성.........................................................................................................................................80
BitLocker PBA 파티션 설정을 위한 사전 설치 구성......................................................................................................81
장 13: 레지스트리를 통해 Dell Server 지정......................................................................................... 82
장 14: 하위 설치 프로그램 추출.........................................................................................................85
장 15: Key Server 구성....................................................................................................................86
서비스 패널 - 도메인 계정 사용자 추가........................................................................................................................ 86
Key Server 구성 파일 - Security Management Server 통신을 위한 사용자 추가.................................................... 87
서비스 패널 - Key Server 서비스 다시 시작..................................................................................................................88
Management Console - 포렌식 관리자 추가..................................................................................................................88
장 16: Administrative Download Utility(CMGAd) 사용....................................................................... 90
Forensic 모드 사용............................................................................................................................................................. 90
관리 모드 사용.....................................................................................................................................................................91
장 17: 서버 운영 체제에 Encryption 구성........................................................................................... 93
장 18: 지연된 활성화 구성................................................................................................................96
지연된 활성화 사용자 지정..............................................................................................................................................96
설치를 위한 컴퓨터 준비.................................................................................................................................................. 96
지연된 활성화로 Encryption 설치....................................................................................................................................97
지연된 활성화로 Encryption 활성화................................................................................................................................97
지연된 활성화 문제 해결.................................................................................................................................................. 98
4 목차