Install Guide

Table Of Contents
Kapitel 1: Einleitung........................................................................................................................ 6
Vor der Installation.................................................................................................................................................................6
Verwendung des Handbuchs............................................................................................................................................... 7
Kontaktieren des Dell ProSupports......................................................................................................................................7
Kapitel 2: Anforderungen.................................................................................................................9
Alle Clients.............................................................................................................................................................................. 9
Verschlüsselung....................................................................................................................................................................10
Vollständige Datenträgerverschlüsselung......................................................................................................................... 12
Encryption auf Serverbetriebssystemen...................................................................................................................14
Advanced Threat Prevention..............................................................................................................................................17
Kompatibilität.................................................................................................................................................................. 19
Client Firewall und Web Protection................................................................................................................................... 21
SED Manager.......................................................................................................................................................................22
BitLocker Manager..............................................................................................................................................................25
Kapitel 3: Registrierungseinstellungen............................................................................................ 27
Verschlüsselung................................................................................................................................................................... 27
Vollständige Datenträgerverschlüsselung......................................................................................................................... 31
Advanced Threat Prevention.............................................................................................................................................33
SED Manager.......................................................................................................................................................................34
BitLocker Manager..............................................................................................................................................................36
Kapitel 4: Installation unter Verwendung des Master-Installationsprogramms.................................... 37
Aktive Installation unter Verwendung des Master-Installationsprogramms.................................................................37
Installation durch Befehlszeile mit dem Master Installationsprogramm....................................................................... 40
Kapitel 5: Deinstallation des Master-Installationsprogramms............................................................ 43
Deinstallieren des Master-Installationsprogramms für Endpoint Security Suite Enterprise...................................... 43
Kapitel 6: Installation unter Verwendung der untergeordneten Installationsprogramme.......................44
Treiber installieren............................................................................................................................................................... 45
Encryption installieren.........................................................................................................................................................45
Full Disk Encryption installieren..........................................................................................................................................49
Encryption auf Serverbetriebssystem installieren...........................................................................................................50
Interaktiv installieren...................................................................................................................................................... 51
Über die Befehlszeile installieren................................................................................................................................. 55
Aktivieren........................................................................................................................................................................57
Advanced Threat Prevention-Client installieren..............................................................................................................59
Installieren von Client Firewall und Web Protection........................................................................................................ 61
SED Manager und PBA Advanced Authentication installieren...................................................................................... 63
BitLocker Manager installieren...........................................................................................................................................63
Kapitel 7: Deinstallation unter Verwendung der untergeordneten Installationsprogramme...................65
Inhaltsverzeichnis
Inhaltsverzeichnis 3