Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Use Application
Protocol
Transport
Protocol
Port
Number
Destination Direction
All
Communication
HTTPS TCP 443 Allow all https traffic to *.cylance.com Outbound
For detailed information regarding the URLs in use, see KB article 127053.
BIOS Image Integrity Verification
If the Enable BIOS Assurance policy is selected in the Management Console, the Cylance tenant validates a BIOS hash on
endpoint computers to ensure that the BIOS has not been modified from the Dell factory version, which is a possible attack
vector. If a threat is detected, a notification is passed to the Dell Server and the IT administrator is alerted in the Management
Console. For an overview of the process, see BIOS Image Integrity Verification Process.
NOTE: A custom factory image cannot be used with this feature, as the BIOS has been modified.
Dell Computer Models supported with BIOS Image Integrity Verification
● Latitude 3470
● Latitude 3570
● Latitude 7275
● Latitude 7370
● Latitude E5270
● Latitude E5470
● Latitude E5570
● Latitude E7270
● Latitude E7470
● Latitude Rugged 5414
● Latitude Rugged 7214 Extreme
● Latitude Rugged 7414
● OptiPlex 3040
● OptiPlex 3240
● OptiPlex 5040
● OptiPlex 7040
● OptiPlex 7440
● Precision Mobile Workstation 3510
● Precision Mobile Workstation 5510
● Precision Workstation 3620
● Precision Workstation 7510
● Precision Workstation 7710
● Precision Workstation T3420
● Venue 10 Pro 5056
● Venue Pro 5855
● Venue XPS 12 9250
● XPS 13 9350
● XPS 9550
Compatibility
The following table details compatibility with Windows, Mac, and Linux.
n/a - Technology does not apply to this platform.
Blank field - Policy is not supported with Endpoint Security Suite Enterprise.
Features
Policies Windows macOS Linux
File Actions
Auto Quarantine (Unsafe)
x x x
Auto Quarantine (Abnormal)
x x x
Auto Upload
x x x
Policy Safe List
x x x
Memory Actions
Memory Protection x x x
Exploitation
Requirements 17