Reference Guide

Navigate the Dell Server
84
4. Click the search icon.
An endpoint or list of endpoints displays, based on your search filter.
5. Click the Hostname of the endpoint on which to allow PBA login bypass.
6. Click the Details & Actions tab.
7. Under SED Device Control, click Bypass Login.
8. Click Yes to confirm that you want to send the Bypass Login command to the endpoint.
Unlock a Self-Encrypting Drive
You can unlock the PBA screen after it has been locked on this endpoint, either by sending a Lock command
or by exceeding the maximum number of authentications attempts allowed by policy.
To send the Unlock command, follow these steps:
1. In the left pane, click Populations > Endpoints.
2. Select the Workstation endpoint type.
3. If you know the full Hostname of the endpoint, enter it in the Search field. However, you may leave
the field blank to display all Workstation endpoints.
4. Click the search icon.
An endpoint or list of endpoints displays, based on your search filter.
5. Click the Hostname of the endpoint with the self-encrypting drive to unlock.
6. Click the Details & Actions tab.
7. Under SED Device Control, click Unlock.
8. Click Yes to confirm that you want to send the Unlock command to the endpoint.
Remove Users from Endpoint with Self-Encrypting Drive
To remove users from the PBA, follow these steps:
1. In the left pane, click Populations > Endpoints.
2. Select the Workstation endpoint type.
3. If you know the full Hostname of the endpoint, enter it in the Search field. However, you may leave
the field blank to display all Workstation endpoints.
4. Click the search icon.
An endpoint or list of endpoints displays, based on your search filter.
5. Click the Hostname of the endpoint from which to remove users.
6. Click the Details & Actions tab.
7. Under SED Device Control, click Remove Users.
8. Click Yes to confirm that you want to send the Remove Users command to the endpoint.