Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.1
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Features Policies Windows macOS Linux
Auto Upload
x x x
Policy Safe List
x x x
Memory Actions
Memory Protection x x x
Exploitation
Stack Pivot x x x
Stack Protect x x x
Overwrite Code x n/a
RAM Scraping x n/a
Malicious Payload x
Process Injection
Remote Allocation of Memory x x n/a
Remote Mapping of Memory x x n/a
Remote Write to Memory x x n/a
Remote Write PE to Memory
x n/a n/a
Remote Overwrite Code x n/a
Remote Unmap of Memory x n/a
Remote Thread Creation x x
Remote APC Scheduled x n/a n/a
DYLD Injection x x
Escalation
LSASS Read x n/a n/a
Zero Allocate x x
Protection Settings
Execution Control x x x
Prevent service shutdown from device x x
Kill unsafe running processes and their
sub processes
x x x
Background Threat Detection x x x
Watch for New Files x x x
Maximum archive file size to scan x x x
Exclude Specific Folders x x x
Copy File Samples x
Application Control
Change Window x x
Folder Exclusions x
Agent Settings
Enable auto-upload of log files x x x
18 Requirements