Install Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.1
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Provision a Tenant
- Configure Advanced Threat Prevention Agent Auto Update
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
● The computer must have a wired network connection for a smart card user to log in through pre-boot authentication for the
first time.
● Third-party credential providers will not function with SED Manager installed and all third-party credential providers will be
disabled when the PBA is enabled.
● IPv6 is not supported.
● SED Manager is not currently supported within virtualized host computers.
● Dell Encryption utilizes Intel's encryption instruction sets, Integrated Performance Primitives (IPP). For more information,
see KB article 126015.
● Be prepared to shut down and restart the computer after you apply policies and are ready to begin enforcing them.
● Computers equipped with self-encrypting drives cannot be used with HCA cards. Incompatibilities exist that prevent the
provisioning of the HCA. Dell does not sell computers with self-encrypting drives that support the HCA module. This
unsupported configuration would be an after-market configuration.
● If the computer targeted for encryption is equipped with a self-encrypting drive, ensure that the Active Directory option,
User Must Change Password at Next Logon, is disabled. Pre-boot authentication does not support this Active Directory
option.
● Dell recommends that you do not change the authentication method after the PBA has been activated. If you must switch to
a different authentication method, you must either:
○ Remove all the users from the PBA.
or
○ Deactivate the PBA, change the authentication method, and then re-activate the PBA.
● Configuration of self-encrypting drives for SED Manager differ between NVMe and non-NVMe (SATA) drives, as follows.
○ Any NVMe drive that is being leveraged for PBA:
■ If the Dell device was manufactured in 2018 or later: Either RAID ON or AHCI may be leveraged with NVMe drives.
■ If the Dell device was manufactured in 2017 or earlier: The BIOS's SATA operation must be set to RAID ON, as Dell's
PBA manager does not support AHCI on NVMe drives.
■ The BIOS boot mode must be set to Unified Extensible Firmware Interface (UEFI). Legacy operation ROMs must be
disabled.
○ Any non-NVMe drive that is being leveraged for PBA:
■ BIOS SATA operation must be set to AHCI.
■ RAID ON is not supported because access to read and write RAID-related data (at a sector that is not available on a
locked non-NVMe drive) is not accessible at start-up, and cannot wait to read this data until after the user is logged
on.
■ The operating system will crash when switched from RAID ON > AHCI if the AHCI controller drivers are not pre-
installed. For instructions on how to switch from RAID > AHCI (or vice versa), see KB article 124714.
Supported OPAL compliant SEDs require updated Intel Rapid Storage Technology Drivers, located at www.dell.com/support.
Dell recommends Intel Rapid Storage Technology Driver version 15.2.0.0 or later, with NVMe drives.
NOTE:
The Intel Rapid Storage Technology Drivers are platform dependent. You can find your system's driver at the link
above based on your computer model.
● The master installer installs these components if not already installed on the target computer. When using the child
installer, you must install these components before installing the clients.
Prerequisite
○ Visual C++ 2017 or later Redistributable Package (x86 or x64)
Visual C++ 2017 requires Windows Update KB2999226 if installed on Windows 7.
○ In January 2020, SHA1 signing certificates are no longer valid and cannot be renewed. Devices running Windows
7 or Windows Server 2008 R2 must install Microsoft KBs https://support.microsoft.com/help/4474419 and
https://support.microsoft.com/help/4490628 to validate SHA256 signing certificates on applications and installation
packages.
Applications and installation packages signed with SHA1 certificates will function but an error will display on the
endpoint during installation or execution of the application without these updates installed
● SED Manager is not supported with Encryption on server operating systems or Advanced Threat Prevention on a server
operating system.
Requirements
21