Reference Guide

Navigate the Dell Server
PBA Device Control (Windows only)
Current State of the Endpoint - Unlocked or Locked
Commands:
PBA commands for a specific endpoint are carried out in the PBA Device Control area. Each command
has a priority ranking. A command with a higher priority rank cancels commands of lower priorities in the
enforcement queue. For a list of command priority rankings, see
Priority of Commands for Self-
Encrypting Drives.
Lock - Locks the PBA screen and prevents any user from logging into the computer.
Unlock - Unlocks the PBA screen after it has been locked on this endpoint, either by sending a Lock
command or by exceeding the maximum number of authentications attempts allowed by policy.
Remove Users - Removes all users from the PBA.
Bypass Login - Bypasses the PBA screen one time to allow a user into the computer without
authenticating. The user will still need to login to Windows after PBA has been bypassed.
Wipe - The Wipe command functions as a “restore to factory state” for the SED drive. The Wipe
command can be used to re-purpose a computer or, in an emergency situation, wipe the computer,
making the data permanently unrecoverable. When the wipe command is consumed by the client, all
history and details about this endpoint are removed from the Dell Server. Ensure that this is the desired
behavior before invoking this command.
The PBA Device Control
Lists the commands most recently sent to the PBA device.
To sort, click a column header.
Protected Status
Protected status is indicated if any of the following criteria are met:
Advanced Threat Prevention is installed and enabled.
Self-Encrypting Drive Management is installed, enabled, and the PBA is enabled.
BitLocker Manager is installed, enabled, and encryption has completed.
Dell Encryption (Mac) is installed and enabled, and policy-based encryption has been enforced.
Dell Encryption (Windows) is installed, enabled, Policy-Based Encryption has been set for the
endpoint, and the most recent policy has been applied for the last logged on user.
To check Protected Status of an endpoint:
1. In the left pane, click Populations > Endpoints.
2. Click a hostname in the list or enter a filter to search for available endpoints. The wildcard
character (*) is supported.
For Windows and Mac, if you know the endpoint hostname, enter it in the Search field. Leave
the field blank to display all Windows and Mac endpoints.
Click a hostname or endpoint serial number to display the Endpoint Detail page.
3. A green check mark displays in the Protected column if any of the criteria for Protected status
are met.
82