Reference Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise for Mac Technical Advisories v2.9
- Endpoint Security Suite Enterprise for Mac Technical Advisories
- Contact Dell ProSupport
- Technical Advisories and Documentation
- New Features and Functionality v2.9
- Resolved Technical Advisories v2.9
- Technical Advisories v2.9
- New Features and Functionality v2.8
- Resolved Technical Advisories v2.8
- Technical Advisories v2.8
- New Features and Functionality v2.6
- Technical Advisories v2.6
- New Features and Functionality v2.5
- Technical Advisories v2.5
- New Features and Functionality v2.3
- Resolved Technical Advisories v2.3
- New Features and Functionality v2.2
- Resolved Technical Advisories v2.2
- Technical Advisories v2.2
- New Features and Functionality v2.1
- Resolved Technical Advisories v2.1
- Technical Advisories v2.1
- New Features and Functionality v2.0.1
- Resolved Technical Advisories v2.0.1
- Technical Advisories v2.0.1
- New Features and Functionality v2.0
- Resolved Technical Advisories v2.0
- Technical Advisories v2.0
- New Features and Functionality v1.5
- Resolved Technical Advisories v1.5
- Technical Advisories v1.5
- New Features and Functionality v1.4.1
- Resolved Technical Advisories v1.4.1
- Technical Advisories v1.4.1
- New Features and Functionality v1.4
- Resolved Technical Advisories v1.4
- Technical Advisories v1.4
- New Features and Functionality v1.3
- Technical Advisories v1.3
- New Features and Functionality v1.2
- Resolved Technical Advisories v1.2
- Technical Advisories v1.2
- New Features and Functionality v1.1
- Resolved Technical Advisories v1.1
- Technical Advisories v1.1
- New Features and Functionality v1.0
- Resolved Technical Advisories v1.0
- Technical Advisories v1.0
- Previous Technical Advisories
- Workarounds

Workarounds
Before you begin, be aware of the following workarounds that have been identified during testing.
● Modifying the system RAM configuration will invalidate the security protection profile of an encrypted volume. This will
prevent the computer from booting on the following restart. To validate the new configuration and restore the bootability
of the encrypted system volume, apply the Accept new system configuration operation in the Dell Recovery Utility. See the
Online Help for instructions. [15665]
● When using Boot Camp on an encrypted Mac computer, and the computer is booted to Windows, the Mac OS X system
volume is displayed as a separate drive letter in Windows Explorer. Since this volume is encrypted, Windows displays a dialog
indicating it cannot open this volume.
2
Workarounds 21