Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Registry Settings
● This section details all Dell ProSupport approved registry settings for local client computers, regardless of the reason for the
registry setting. If a registry setting overlaps two products, it is listed in each category.
● These registry changes should be done by administrators only and may not be appropriate or function in all scenarios.
Encryption
● If a self-signed certificate is used on the Dell Server. For Windows, certificate trust validation must remain disabled on
the client computer (trust validation is disabled by default with Dell Server). Before enabling trust validation on the client
computer, the following requirements must be met.
○ A certificate signed by a root authority, such as EnTrust or Verisign, must be imported into Dell Server.
○ The full chain of trust of the certificate must be stored in the Microsoft keystore on the client computer.
○ To enable trust validation for Encryption, change the value of the following registry entry to 0 on the target computer.
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield]
"IgnoreCertErrors"=DWORD:00000000
0 = Fail if a certificate error is encountered
1= Ignores errors
● To create an Encryption Removal Agent log file, create the following registry entry on the computer targeted for decryption.
See (Optional) Create an Encryption Removal Agent Log File.
[HKLM\Software\Credant\DecryptionAgent]
"LogVerbosity"=DWORD:2
0: no logging
1: logs errors that prevent the service from running
2: logs errors that prevent complete data decryption (recommended level)
3: logs information about all decrypting volumes and files
5: logs debugging information
● To disable prompting the user to reboot their computer after the Encryption Removal Agent finishes its final state in the
decryption process, modify the following registry value or modify the Force Reboot on Update policy in the Management
Console.
[HKLM\Software\Dell\Dell Data Protection]
"ShowDecryptAgentRebootPrompt"=DWORD
1 = enabled (displays prompt)
0 = disabled (hides prompt)
● By default, during installation, the notification area icon is displayed. Use the following registry setting to hide the notification
area icon for all managed users on a computer after the original installation. Create or modify the registry setting:
[HKLM\Software\CREDANT\CMGShield]
"HIDESYSTRAYICON"=DWORD:1
● By default, all temporary files in the c:\windows\temp directory are automatically deleted during installation. Deletion of
temporary files speeds initial encryption and occurs before the initial encryption sweep.
However, if your organization uses a third-party application that requires the file structure within the \temp directory to be
preserved, you should prevent this deletion.
To disable temporary file deletion, create or modify the registry setting as follows:
3
26 Registry Settings