Install Guide

Table Of Contents
Web Protection Firewall 제거.......................................................................................................................................62
Advanced Threat Prevention 설치 제거.......................................................................................................................... 62
Full Disk Encryption 설치 제거합니다......................................................................................................................... 62
SED Manager 설치 제거.................................................................................................................................................... 63
Encryption 서버 운영 체제의 Encryption 제거......................................................................................................... 64
BitLocker Manager 제거.................................................................................................................................................... 66
8: Data Security 제거 프로그램....................................................................................................67
9: 일반적으로 사용되는 시나리오..................................................................................................72
Encryption 클라이언트 Advanced Threat Prevention.............................................................................................. 73
SED Manager Encryption External Media...................................................................................................................74
BitLocker Manager Encryption External Media..........................................................................................................74
BitLocker Manager Advanced Threat Prevention......................................................................................................74
10: 테넌트 프로비저닝.................................................................................................................76
테넌트 프로비저닝.............................................................................................................................................................76
11: Advanced Threat Prevention 에이전트 자동 업데이트 구성.........................................................80
12: SED UEFI BitLocker Manager 설치 구성........................................................................81
TPM 초기화..........................................................................................................................................................................81
UEFI 컴퓨터의 사전 설치 구성......................................................................................................................................... 81
BitLocker PBA 파티션 설정을 위한 사전 설치 구성.....................................................................................................82
13: 레지스트리를 통해 Dell Server 지정......................................................................................... 83
14: 하위 설치 프로그램 추출.........................................................................................................86
15: Key Server 구성....................................................................................................................87
서비스 패널 - 도메인 계정 사용자 추가.........................................................................................................................87
Key Server 구성 파일 - Security Management Server 통신을 위한 사용자 추가....................................................88
서비스 패널 - Key Server 서비스 다시 시작..................................................................................................................89
Management Console - 포렌식 관리자 추가..................................................................................................................89
16: Administrative Download Utility(CMGAd) 사용........................................................................91
Forensic 모드 사용.............................................................................................................................................................. 91
관리 모드 사용....................................................................................................................................................................92
17: 서버 운영 체제에 Encryption 구성........................................................................................... 94
18: 지연된 활성화 구성................................................................................................................ 97
지연된 활성화 사용자 지정.............................................................................................................................................. 97
설치를 위한 컴퓨터 준비.................................................................................................................................................. 97
지연된 활성화로 Encryption 설치....................................................................................................................................98
지연된 활성화로 Encryption 활성화............................................................................................................................... 98
지연된 활성화 문제 해결.................................................................................................................................................. 99
4 목차