Install Guide

Table Of Contents
Chapter 1: Introduction................................................................................................................. 6
Before You Begin................................................................................................................................................................. 6
Using This Guide.................................................................................................................................................................. 7
Contact Dell ProSupport....................................................................................................................................................7
Chapter 2: Requirements.............................................................................................................. 8
All Clients............................................................................................................................................................................... 8
Encryption............................................................................................................................................................................. 9
Full Disk Encryption............................................................................................................................................................ 11
Encryption on Server Operating Systems............................................................................................................13
Advanced Threat Prevention.......................................................................................................................................... 16
Compatibility..................................................................................................................................................................17
Client Firewall and Web Protection............................................................................................................................... 19
SED Manager..................................................................................................................................................................... 20
BitLocker Manager............................................................................................................................................................24
Chapter 3: Registry Settings....................................................................................................... 26
Encryption...........................................................................................................................................................................26
Full Disk Encryption.......................................................................................................................................................... 29
Advanced Threat Prevention.......................................................................................................................................... 31
SED Manager......................................................................................................................................................................32
BitLocker Manager............................................................................................................................................................34
Chapter 4: Install Using the Master Installer............................................................................... 35
Install Interactively Using the Master Installer...........................................................................................................35
Install by Command Line Using the Master Installer.................................................................................................38
Chapter 5: Uninstall the Master Installer..................................................................................... 41
Uninstall the Endpoint Security Suite Enterprise Master Installer......................................................................... 41
Chapter 6: Install Using the Child Installers.................................................................................42
Install Drivers......................................................................................................................................................................43
Install Encryption............................................................................................................................................................... 43
Install Full Disk Encryption...............................................................................................................................................47
Install Encryption on Server Operating System.........................................................................................................48
Install Interactively...................................................................................................................................................... 49
Install Using the Command Line.............................................................................................................................. 52
Activate..........................................................................................................................................................................54
Install Advanced Threat Prevention Client................................................................................................................. 56
Install Client Firewall and Web Protection.................................................................................................................. 58
Install SED Manager and PBA Advanced Authentication........................................................................................ 59
Install BitLocker Manager............................................................................................................................................... 60
Chapter 7: Uninstall Using the Child Installers.............................................................................62
Contents
Contents 3