Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
6. Click Next to install the product in the default location of C:\Program Files\Dell\Dell Data Protection\.
Dell recommends installing in the default location only, as problems may arise when installing in other
locations.
7. Select the components to be installed.
Security Framework installs the underlying security framework.
BitLocker Manager installs the BitLocker Manager client, designed to enhance the security of BitLocker deployments by
simplifying and reducing the cost of ownership through centralized management of BitLocker encryption policies.
Encryption installs the Encryption client, the component that enforces security policy, whether a computer is connected to
the network, disconnected from the network, lost, or stolen.
Advanced Threat Prevention installs the Advanced Threat Prevention client, which is next-generation antivirus protection
that uses algorithmic science and machine learning to identify, classify, and prevent both known and unknown cyberthreats
from executing or harming endpoints.
Web Protection and Firewall installs Web Protection and Firewall. The Client Firewall checks all incoming and outgoing traffic
against its list of rules. Web Protection monitors web browsing and downloads to identify threats and enforce action set by
policy when a threat is detected, based on ratings for websites.
Encryption External Media installs the component that enforces Encryption External Media.
Full Disk Encryption installs the component that enforces Full Disk Encryption.
Click Next when your selections are complete.
36
Install Using the Master Installer