Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
To enable or disable this feature, create a DWORD with the name SlottedActivation under the parent key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield\]
○ Activation Slot
To enable or disable this feature, create a subkey with the name ActivationSlot under the parent key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield\]
Activation Slot - a string that defines the period within which Encryption attempts to activate with the Dell Server. These
values are defined in seconds, and the syntax is defined by <lowervalue>,<uppervalue>. An example would be 120,300.
This means that Encryption attempts to activate at a random time between 2 minutes and 5 minutes after user login.
■ Calendar Repeat
To enable or disable this feature, create a subkey with the name CalRepeat under the parent key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield\ActivationSlot]
CalRepeat - A DWORD that defines the time period in seconds that the activation slot interval occurs. Use this
setting to override the time period in seconds that the activation slot interval occurs. 25200 seconds are available for
slotting activations during a seven-hour period. The default setting is 86400 seconds, which represents a daily repeat.
The suggested decimal value is 600, which represents 10 minutes.
■ Slot Interval
To enable or disable this feature, create a subkey with the name SlotInterval under the parent key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield\ActivationSlot]
Slot Interval - A string value that defines the intervals between slot activations. The suggested setting is 45,120. This
represents activation time being randomly assigned between 45 and 120 seconds.
■ Missed Threshold
To enable or disable this feature, create a subkey with the name MissThreshold under the parent key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\CMGShield\ActivationSlot]
MissThreshold - a DWORD value that contains a positive integer that defines the number of attempts to activate
before a log off is required. If the MissThreshold is reached, activation attempts cease until the next login for the
unactivated user. The count for MissThreshold is always reset on logoff.
The registry keys collect slotted activation user data:
[HKCU/Software/CREDANT/ActivationSlot] (per-user data)
Deferred time to attempt the slotted activation, which is set when the user logs onto the network for the first time
after slotted activation is enabled. The activation slot is recalculated for each activation attempt.
[HKCU/Software/CREDANT/SlotAttemptCount] (per-user data)
Number of failed or missed attempts, when the time slot arrives and activation is attempted but fails. When this
number reaches the value set in ACTIVATION_SLOT_MISSTHRESHOLD, the computer attempts one immediate
activation upon connecting to the network.
● To detect unmanaged users on the client computer, set the registry value on the client computer:
[HKLM\SOFTWARE\Credant\CMGShield\ManagedUsers\]
"UnmanagedUserDetected"=DWORD value:1
Detect unmanaged users on this computer=1
Do not detect unmanaged users on this computer=0
● To enable silent automatic reactivation in the rare case that a user becomes deactivated, the registry value must be set on
the client computer.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CMGShield]
"AutoReactivation"=DWORD:00000001
0=Disabled (default)
1=Enabled
● System Data Encryption (SDE) is enforced based on the policy value for SDE Encryption Rules. Additional directories are
protected by default when the SDE Encryption Enabled policy is Selected. For more information, search "SDE Encryption
28
Registry Settings