Reference Guide
Table of Contents
Allow PBA Login Bypass ........................................................................................................................ 90
Unlock a Self-Encrypting Drive ............................................................................................................. 90
Remove Users from Endpoint with Self-Encrypting Drive .................................................................... 91
Lock a Self-Encrypting Drive................................................................................................................. 91
Send Wipe Command to Self-Encrypting Drive ..................................................................................... 91
Set the Dell Server Connection Retry Interval ..................................................................................... 92
Administrators .............................................................................................................................................. 92
Assign or Modify Administrator Roles ....................................................................................................... 92
Administrator Roles .................................................................................................................................. 93
Delegate Administrator Rights ................................................................................................................. 96
Reporting ......................................................................................................................................................... 97
Manage Reports ............................................................................................................................................ 97
Manage Reports ........................................................................................................................................ 97
View or Modify an Existing Report ........................................................................................................ 98
Create a New Report ............................................................................................................................ 98
View Report .............................................................................................................................................. 98
Query using Search and More... to filter .............................................................................................. 99
Export File ............................................................................................................................................ 99
Add Schedule ............................................................................................................................................ 99
Compliance Reporter ................................................................................................................................. 100
Export Events to a SIEM/Syslog Server ...................................................................................................... 100
Export Audit Events with TLS/SSL over TCP .......................................................................................... 100
Advanced Threat Prevention Syslog Event Types ...................................................................................... 102
Advanced Threat Prevention Syslog IP Addresses ..................................................................................... 105
Management .................................................................................................................................................. 105
Commit Policies ......................................................................................................................................... 106
View Pending Commit(s) ............................................................................................................................ 106
Log Analyzer............................................................................................................................................... 106
Recovery .................................................................................................................................................... 107
Recover Data - Encryption External Media Authentication Failure ....................................................... 107
Encryption External Media Recovery for User "Removed" from Database ............................................. 110
Enable Federated Key Recovery ............................................................................................................ 110
Recover Data - BitLocker Manager ......................................................................................................... 111
Recover Endpoint ................................................................................................................................... 111
vi