Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.0
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Encryption
The following example installs Encryption External Media with Silent installation, no progress bar, automatic restart, installed
in the default location of C:\Program Files\Dell\Dell Data Protection\Encryption.
DDPE_XXbit_setup.exe /s /v"SERVERHOSTNAME=server.organization.com
POLICYPROXYHOSTNAME=rgk.organization.com MANAGEDDOMAIN=ORGANIZATION
DEVICESERVERURL=https://server.organization.com:8443/xapi/ EME=1 /qn"
Then:
Encryption Management Agent
The following example installs remotely managed Full Disk Encryption and allows installation on a Dell Encryption protected
computer (silent installation, no reboot, no entry in the Control Panel Programs list, installed in the default location of
C:\Program Files\Dell\Dell Data Protection\Encryption).
EMAgent_64bit_setup.exe /s /v"CM_EDITION=1 ENABLE_FDE_LM=1
FEATURE=FDE SERVERHOST=server.organization.com SERVERPORT=8888
SECURITYSERVERHOST=server.organization.com SECURITYSERVERPORT=8443 /norestart /qn"
Install Encryption on Server Operating System
There are two methods available to install Encryption on server operating system. Choose one of the following methods:
● Install Encryption on server operating system Interactively
Encryption on server operating system can be installed interactively only on computers running server operating
systems. Installation on computers running non-server operating systems must be performed by command line, with the
SERVERMODE=1 parameter specified.
● Install Encryption on server operating system Using the Command Line
Virtual User Account
● As part of the installation, a virtual server user account is created for the exclusive use of Encryption on server operating
system. Password and DPAPI authentication are disabled so that only the virtual server user can access encryption keys.
Before You Begin
● The user account performing the installation must be a domain user with administrator-level permissions.
● To override this requirement, or to run Encryption on server operating system on non-domain or multi-domain servers, set
the ssos.domainadmin.verify property to false in the application.properties file. The file is stored in the following file paths,
based on the Dell Server you are using:
Security Management Server - <installation dir>/Security Server/conf/application.properties
Security Management Server Virtual - /opt/dell/server/security-server/conf/application.properties
● The server must support port controls.
Port Control System policies affect removable media on protected servers, for example, by controlling access and usage of
the server's USB ports by USB devices. USB port policy applies to external USB ports. Internal USB port functionality is not
affected by USB port policy. If USB port policy is disabled, a USB keyboard and mouse do not function and the user cannot
use the computer unless a Remote Desktop Connection is set up before the policy is applied.
● To successfully activate, the computer must have network connectivity.
● When the Trusted Platform Module (TPM) is available, it is used for sealing the General Purpose Key on Dell hardware. If a
TPM is not available, Microsoft's Data Protection API (DPAPI) is used to protect the General Purpose Key.
When installing a new operating system on a Dell computer with TPM that is running Server Encryption, clear the TPM in the
BIOS. See this article for instructions.
● The installation log file is located in the user's %temp% directory, located at C:\Users\<user
name>\AppData\Local\Temp. To locate the correct log file, find the file name that begins with MSI and ends with
a .log extension. The file includes a date/time stamp matching the time when the installer was run.
● Encryption is not supported on servers that are part of distributed file systems (DFS).
Extract the Child Installer
48
Install Using the Child Installers