Users Guide
BitLocker Manager v8.9.1
● Volumes with Unicode strings in their serial numbers are now correctly reported in inventory. [DDPC-1899]
Technical Advisories v1.0.1
Advanced Threat Protection v1.0.1
● Advanced Threat Protection cannot be upgraded in place from v1.0 to v1.0.1. To work around this issue, uninstall Advanced
Threat Protection v1.0 and install Advanced Threat Protection v1.0.1:
1. Run the following command line to uninstall Advanced Threat Protection:
msiexec.exe /X {6AD61075-1F1F-4F95-8D57-E62AEE41A60F} /norestart
If uninstallation does not succeed, follow these steps:
a. Enter the following powershell command to get the product code for the currently installed version:
Get-WmiObject win32_product | Where-object {$_.Name -like "*Cyl*"} | FT
IdentifyingNumber, Name, Version
The product code displays.
b. From an administrative command prompt, run the following command:
Msiexec.exe /x <productcodehere> /norestart
2. Extract the Endpoint Security Suite Enterprise installer:
DDPSuite.exe /z"\"EXTRACT_INSTALLERS=C:\Extracted\""
3. Run the following at a command prompt:
AdvancedThreatProtection_x64.msi /qn REBOOT=ReallySuppress ARPSYSTEMCOMPONENT=1 /l*v
"C:\ProgramData\Dell\Dell Data Protection\Installer Logs\ATP.log" APPFOLDER="C:\Program
Files\Dell\Dell Data Protection\Advanced Threat Protection"
[DDPKM-871]
New Features and Functionality v1.0
Endpoint Security Suite Enterprise includes the following components:
● Advanced Threat Prevention provides real-time threat detection by analyzing potential file executions for malware in both
the operating system and memory layers, to prevent the delivery of malicious payloads. Control of execution at the endpoint
allows for accurate and effective detection of malicious threats - even those that have never been seen before. Advanced
Threat Prevention uses machine learning techniques that allow detection of new malware, viruses, bots and unknown future
variants, where signatures and sandboxes fail. Memory protection strengthens basic operating system protection features by
providing an additional layer to detect and deny certain behaviors that are commonly used by exploits.
● The Dell Data Protection | Encryption client provides data-centric, policy-based protection of data on any device or external
media, allowing enterprises to manage encryption policies for multiple endpoints and operating systems from the DDP
Server. With the optional DDP | Hardware Crypto Accelerator, the Dell Data Protection | Encryption client offloads
encryption processing to hardware for enhanced performance over software encryption and supports the highest level of
FIPS 140-2 protection commercially available for system disks.
● Advanced Authentication fully integrates authentication options, including fingerprint, smart card, and contactless smart
card readers, with Dell ControlVault for secure hardware credential processing. For added security, the Dell FIPS 140-2
compliant TPM is available on select Dell Latitude laptops and select Dell Precision mobile workstations.
● The SED client provides centralized, secure management of local and remote self-encrypting drives across an organization
and seamlessly integrates with the other Endpoint Security Suite Enterprise components. All policy, authentication,
management tasks, and storage and retrieval of encryption keys are available from the DDP Server, reducing the work of
keeping critical data safe, and reducing the risk that systems are unprotected in the event of loss or attempts at
unauthorized access.
● BitLocker Manager seamlessly integrates with the other Endpoint Security Suite Enterprise components through the DDP
Server to provide flexible policy enforcement and TPM management, reducing the strain on an organization's IT resources.
64
Technical Advisories