Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Chapter 1: Introduction................................................................................................................. 6
Before You Begin................................................................................................................................................................. 6
Using This Guide.................................................................................................................................................................. 7
Contact Dell ProSupport....................................................................................................................................................7
Chapter 2: Requirements.............................................................................................................. 8
All Clients............................................................................................................................................................................... 8
Encryption............................................................................................................................................................................. 9
Full Disk Encryption............................................................................................................................................................ 11
Encryption on Server Operating Systems............................................................................................................13
Advanced Threat Prevention.......................................................................................................................................... 16
Compatibility..................................................................................................................................................................17
Client Firewall and Web Protection............................................................................................................................... 19
SED Manager..................................................................................................................................................................... 20
BitLocker Manager............................................................................................................................................................24
Chapter 3: Registry Settings....................................................................................................... 26
Encryption...........................................................................................................................................................................26
Full Disk Encryption.......................................................................................................................................................... 29
Advanced Threat Prevention.......................................................................................................................................... 31
SED Manager......................................................................................................................................................................32
BitLocker Manager............................................................................................................................................................34
Chapter 4: Install Using the Master Installer............................................................................... 35
Install Interactively Using the Master Installer...........................................................................................................35
Install by Command Line Using the Master Installer.................................................................................................38
Chapter 5: Uninstall the Master Installer..................................................................................... 41
Uninstall the Endpoint Security Suite Enterprise Master Installer......................................................................... 41
Chapter 6: Install Using the Child Installers.................................................................................42
Install Drivers......................................................................................................................................................................43
Install Encryption............................................................................................................................................................... 43
Install Full Disk Encryption...............................................................................................................................................47
Install Encryption on Server Operating System.........................................................................................................48
Install Interactively...................................................................................................................................................... 49
Install Using the Command Line.............................................................................................................................. 52
Activate..........................................................................................................................................................................54
Install Advanced Threat Prevention Client................................................................................................................. 56
Install Client Firewall and Web Protection.................................................................................................................. 58
Install SED Manager and PBA Advanced Authentication........................................................................................ 59
Install BitLocker Manager............................................................................................................................................... 60
Chapter 7: Uninstall Using the Child Installers.............................................................................62
Contents
Contents 3