Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
d. For the name, type CompatibilityMode.
e. Open the registry setting and change the value to 01.
f. Click OK, then close Registry Editor.
To add the registry value with a command, you can use one of the following command line options to run on the client
computer:
○ (For one computer) Psexec:
psexec -s reg add HKEY_LOCAL_MACHINE\SOFTWARE\Cylance\Desktop /v
CompatibilityMode /t REG_BINARY /d 01
○ (For multiple computers) Invoke-Command cmdlet:
$servers = "testComp1","testComp2","textComp3"
$credential = Get-Credential -Credential {UserName}\administrator
Invoke-Command -ComputerName $servers -Credential $credential -ScriptBlock {New-Item
-Path HKCU:\Software\Cylance\Desktop -Name CompatibilityMode -Type REG_BINARY -Value
01}
3. In the Management Console, re-enable the Memory Protection Enabled policy. If the Script Control policy was previously
enabled, re-enable it.
SED Manager
● To set the retry interval when the Dell Server is unavailable to communicate with SED Manager, add the following registry
value.
[HKLM\System\CurrentControlSet\Services\DellMgmtAgent\Parameters]
"CommErrorSleepSecs"=DWORD:300
This value is the number of seconds SED Manager waits to attempt to contact the Dell Server if it is unavailable to
communicate. The default is 300 seconds (5 minutes).
● If a self-signed certificate is used on the Dell Server for SED Manager, SSL/TLS trust validation must remain disabled on
the client computer (SSL/TLS trust validation is disabled by default with SED Manager). Before enabling SSL/TLS trust
validation on the client computer, the following requirements must be met.
○ A certificate signed by a root authority, such as EnTrust or Verisign, must be imported into Dell Server.
○ The full chain of trust of the certificate must be stored in the Microsoft keystore on the client computer.
○ To enable SSL/TLS trust validation for SED Manager, change the value of the following registry entry to 0 on the client
computer.
[HKLM\System\CurrentControlSet\Services\DellMgmtAgent\Parameters]
"DisableSSLCertTrust"=DWORD:0
0 = Enabled
1 = Disabled
● To determine if the PBA is activated, ensure that the following value is set:
[HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent\Parameters]
"PBAIsActivated"=DWORD (32-bit):1
A value of 1 means that the PBA is activated. A value of 0 means the PBA is not activated.
● To determine if a smart card is present and active, ensure the following value is set:
HKLM\SOFTWARE\Dell\Dell Data Protection\
"SmartcardEnabled"=DWORD:1
If SmartcardEnabled is missing or has a value of zero, the Credential Provider will display only Password for authentication.
If SmartcardEnabled has a non-zero value, the Credential Provider will display options for Password and smart card
authentication.
● The following registry value indicates whether Winlogon should generate a notification for logon events from smart cards.
32
Registry Settings