Administrator Guide
Table Of Contents
- Dell Endpoint Security Suite Enterprise for Mac Administratorhandbuch v2.9
- Einleitung
- Anforderungen
- Aufgaben für den Encryption Client
- Installation/Upgrade von dem Encryption Client
- Aktivieren von Encryption Client
- Verschlüsselungsrichtlinie und Status anzeigen
- Systemlaufwerke
- Wiederherstellung
- Wechselmedien
- Sammeln von Protokolldateien für Endpoint Security Suite Enterprise
- Deinstallieren von dem Encryption Client for Mac
- Aktivierung als Administrator
- Encryption Client – Referenzdokument
- Aufgaben
- Installieren von Advanced Threat Prevention for Mac
- Prüfen der Advanced Threat Prevention Installation
- Sammeln von Protokolldateien für Endpoint Security Suite Enterprise
- Details zu Advanced Threat Prevention anzeigen
- Bereitstellung eines Mandanten
- Konfigurieren der automatischen Aktualisierung des Advanced Threat Prevention Agenten
- Advanced Threat Prevention – Fehlerbehebung
- Glossar
um einer solchen Situation Rechnung zu tragen. Sobald Apple eine neue Version veröffentlicht, beginnt Dell mit dem Testen dieser
Versionen, um sicherzustellen, dass sie mit dem Encryption Client for Mac kompatibel sind.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/
PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>NoAuthenticateUsers</key> [In this sample code, after one user activates the
computer against the Dell Server, other users can log in without being prompted to
activate.]
<dict>
<key>dsAttrTypeStandard:AuthenticationAuthority</key>
<array>
<string>*</string>
</array>
</dict>
<key>NoAuthenticateUsers</key> [In this sample code, users from a specific domain name
can log in without being prompted to activate against the Dell Server.]
<dict>
<key>dsAttrTypeStandard:AuthenticationAuthority</key>
<array>
<string>;Kerberosv5;;*@domainName.com;domainName.com*</string>
</array>
</dict>
<key>NoAuthenticateUsers</key> [In this sample code, specific users can log in without
being prompted to authenticate against the Dell Server.]
<dict>
<key>dsAttrTypeStandard:AuthenticationAuthority</key>
<array>
<string>;Kerberosv5;;username1@domainName.com;domainName.com*</string>
<string>;Kerberosv5;;username2@domainName.com;domainName.com*</string>
</array>
</dict>
<key>AllowedOSVersions</key> [AllowedOSVersions is not present in the default .plist
file, it must be added to the file. Add from <key> through </array> to allow a newer
version of operating system to be used. See Note above.]
<array>
<string>10.<x.x></string> [Operating system version]
</array>
<key>UseRecoveryKey</key>
<false/> [This value is obsolete since current versions can use both personal and
institutional recovery keys for FileVault encryption.]
<key>SecurityServers</key>
<array>
<dict>
<key>Host</key>
<string>securityserver.organization.com</string> [Replace this value with your
Security Server URL]
<key>Port</key>
<integer>8443</integer> [Beginning in v8.0, the default port number is 8443. However,
port number 8081 will still allow activations. In general, if your Dell Server is v8.0 or
later, use port 8443. If your Dell Server is pre-v8.0, use port 8081.]
<key>UseSSL</key>
<true/> [Dell recommends a true value]
</dict>
</array>
<key>ReuseUniqueIdentifier</key>
<false/> [When this value is set to true, the computer identifies itself to the Dell
Server by the same hostname it was activated with, regardless of changes to the computer
hostname.]
<key>Domains</key>
<array>
<dict>
<key>DisplayName</key>
<string>COMPANY</string>
<key>Domain</key>
<string>department.organization.com</string> [Replace this value with the Domain URL
that users will activate against]
</dict>
14
Aufgaben für den Encryption Client