Install Guide

Table Of Contents
Configure Deferred Activation
The Encryption client with Deferred Activation differs from the Encryption client activation in two ways:
Device-based Encryption policies
The Encryption client policies are user-based; the Encryption client with Deferred Activation's encryption policies are device-
based. User encryption is converted to Common encryption. This difference allows the user to bring a personal device to use
within the organization's domain, while the organization maintains its security by centrally managing encryption policies.
Activation
With the Encryption client, activation is automatic. When Endpoint Security Suite Enterprise with Deferred Activation is
installed, automatic activation is disabled. Instead, the user chooses whether to activate encryption, and when to activate
it.
NOTE:
Before a user permanently leaves the organization and while his email address is still active, the user must run the
Encryption Removal Agent and uninstall the Encryption client from his personal computer.
Deferred Activation Customization
These client-side tasks allow Deferred Activation customization.
Add a disclaimer to the Activation Logon dialog box
Disable automatic re-activation (optional)
Add a disclaimer to the Activation Logon dialog box
The Activation Logon dialog displays at these times:
When an unmanaged user logs on.
When the user selects Activate Dell Encryption from the Encryption icon's menu, located in the notification area.
Prepare the Computer for Installation
If the data is encrypted with a non-Dell encryption product, before installing the Encryption client, decrypt data using the
existing encryption software, and then uninstall the existing encryption software. If the computer does not restart automatically,
restart the computer.
Create a Windows Password
18
Configure Deferred Activation 99