Install Guide

Table Of Contents
Kapitel 1: Einleitung........................................................................................................................ 6
Vor der Installation.................................................................................................................................................................6
Verwendung des Handbuchs............................................................................................................................................... 7
Kontaktieren des Dell ProSupports......................................................................................................................................7
Kapitel 2: Anforderungen.................................................................................................................9
Alle Clients.............................................................................................................................................................................. 9
Verschlüsselung....................................................................................................................................................................10
Vollständige Datenträgerverschlüsselung......................................................................................................................... 12
Encryption auf Serverbetriebssystemen...................................................................................................................14
Advanced Threat Prevention..............................................................................................................................................17
Kompatibilität.................................................................................................................................................................. 19
Client Firewall und Web Protection................................................................................................................................... 21
SED Manager.......................................................................................................................................................................22
BitLocker Manager..............................................................................................................................................................25
Kapitel 3: Registrierungseinstellungen............................................................................................ 28
Verschlüsselung...................................................................................................................................................................28
Vollständige Datenträgerverschlüsselung........................................................................................................................ 32
Advanced Threat Prevention.............................................................................................................................................34
SED Manager.......................................................................................................................................................................35
BitLocker Manager.............................................................................................................................................................. 37
Kapitel 4: Installation unter Verwendung des Master-Installationsprogramms.................................... 38
Aktive Installation unter Verwendung des Master-Installationsprogramms................................................................ 38
Installation durch Befehlszeile mit dem Master Installationsprogramm........................................................................ 41
Kapitel 5: Deinstallation des Master-Installationsprogramms............................................................ 44
Deinstallieren des Master-Installationsprogramms für Endpoint Security Suite Enterprise...................................... 44
Kapitel 6: Installation unter Verwendung der untergeordneten Installationsprogramme...................... 45
Treiber installieren............................................................................................................................................................... 46
Encryption installieren.........................................................................................................................................................46
Full Disk Encryption installieren......................................................................................................................................... 50
Encryption auf Serverbetriebssystem installieren............................................................................................................51
Interaktiv installieren......................................................................................................................................................52
Über die Befehlszeile installieren................................................................................................................................. 56
Aktivieren........................................................................................................................................................................58
Advanced Threat Prevention-Client installieren..............................................................................................................60
Installieren von Client Firewall und Web Protection........................................................................................................62
SED Manager und PBA Advanced Authentication installieren...................................................................................... 64
BitLocker Manager installieren...........................................................................................................................................64
Kapitel 7: Deinstallation unter Verwendung der untergeordneten Installationsprogramme...................66
Inhaltsverzeichnis
Inhaltsverzeichnis 3