Administrator Guide
목차
1 소개............................................................................................................................................................................. 5
시작하기 전에...............................................................................................................................................................5
이 안내서 사용..............................................................................................................................................................5
Dell ProSupport에 문의..............................................................................................................................................5
2 요구 사항.................................................................................................................................................................... 6
모든 클라이언트...........................................................................................................................................................6
모든 클라이언트 - 필수 구성 요소...................................................................................................................... 6
모든 클라이언트 - 하드웨어................................................................................................................................ 6
모든 클라이언트 - 언어 지원................................................................................................................................7
Encryption 클라이언트............................................................................................................................................... 7
Encryption 클라이언트 필수 구성 요소............................................................................................................. 8
Encryption 클라이언트 운영 체제.......................................................................................................................8
EMS(External Media Shield) 운영 체제.............................................................................................................. 8
Threat Protection 클라이언트.................................................................................................................................. 9
Threat Protection 클라이언트 운영 체제.......................................................................................................... 9
Threat Protection 클라이언트 포트................................................................................................................... 9
SED 클라이언트......................................................................................................................................................... 10
SED 클라이언트 필수 구성 요소........................................................................................................................10
SED 클라이언트 운영 체제................................................................................................................................. 10
국제 키보드............................................................................................................................................................11
Advanced Authentication 클라이언트...................................................................................................................11
Advanced Authentication 클라이언트 하드웨어............................................................................................11
Advanced Authentication 클라이언트 운영 체제.......................................................................................... 12
BitLocker Manager 클라이언트.............................................................................................................................. 12
BitLocker Manager 클라이언트 필수 구성 요소............................................................................................. 13
BitLocker Manager 클라이언트 운영 체제...................................................................................................... 13
3 ESS 마스터 설치 프로그램을 사용하여 설치......................................................................................................... 14
ESS 마스터 설치 프로그램을 사용하여 대화형으로 설치....................................................................................14
ESS 마스터 설치 프로그램을 사용하여 명령줄을 통해 설치...............................................................................15
4 ESS 마스터 설치 프로그램을 사용하여 설치 제거.................................................................................................17
ESS 마스터 설치 프로그램 설치 제거......................................................................................................................17
명령줄 설치 제거.................................................................................................................................................. 17
5 하위 설치 프로그램을 사용하여 설치 제거............................................................................................................18
Threat Protection 클라이언트 설치 제거.............................................................................................................. 19
명령줄 설치 제거..................................................................................................................................................19
Encryption 클라이언트 설치 제거...........................................................................................................................19
프로세스................................................................................................................................................................ 19
명령줄 설치 제거..................................................................................................................................................19
Contents
3