Administrator Guide
Inhaltsverzeichni
s
1 Einleitung...................................................................................................................................................................5
Vor der Installation..................................................................................................................................................... 5
Verwendung des Handbuchs...................................................................................................................................5
Kontaktaufnahme mit dem Dell ProSupport.........................................................................................................5
2 Anforderungen.........................................................................................................................................................7
Alle Clients....................................................................................................................................................................7
Alle Clients - Voraussetzungen..........................................................................................................................7
Alle Clients - Hardware........................................................................................................................................8
Alle Clients - Sprachunterstützung...................................................................................................................8
Encryption-Client....................................................................................................................................................... 8
Encryption-Client-Anforderungen................................................................................................................... 9
Encryption-Client-Betriebssysteme................................................................................................................. 9
Externes Medien-Shield (EMS)-Betriebssysteme........................................................................................... 9
Threat Protection-Client.........................................................................................................................................10
Threat Protection-Client-Betriebssysteme...................................................................................................10
Threat Protection-Client-Ports....................................................................................................................... 10
SED-Client.................................................................................................................................................................. 11
SED-Client-Anforderungen.............................................................................................................................. 12
SED-Client-Betriebssysteme............................................................................................................................ 12
Internationale Tastaturen.................................................................................................................................. 12
Advanced Authentication-Client........................................................................................................................... 12
Advanced Authentication-Client-Hardware................................................................................................. 13
Advanced Authentication Client - Betriebssysteme....................................................................................13
BitLocker Manager-Client.......................................................................................................................................14
Voraussetzungen für den BitLocker Manager-Client..................................................................................14
BitLocker Manager Client-Betriebssysteme..................................................................................................14
3 Installation unter Verwendung des ESS-Master-Installationsprogramms.................................................15
Interaktive Installation unter Verwendung des ESS-Master Installationsprogramms................................ 15
Installation durch Befehlszeile mit dem ESS-Master Installationsprogramm..............................................16
4 Deinstallation unter Verwendung des ESS-Master-Installationsprogramms............................................18
ESS-Master-Installationsprogramm deinstallieren............................................................................................18
Deinstallation über die Befehlszeile................................................................................................................18
5 Deinstallation unter Verwendung der untergeordneten Installationsprogramme.................................. 19
Threat Protection-Clients deinstallieren.............................................................................................................20
Deinstallation über die Befehlszeile............................................................................................................... 20
Client für Verschlüsselung deinstallieren............................................................................................................20
Verfahren..............................................................................................................................................................20
Deinstallation über die Befehlszeile................................................................................................................ 21
Deinstallation der SED- und Advanced Authentication-Clients.....................................................................22
Contents
3