Administrator Guide

Contents
1 Introduction....................................................................................................................................................6
Before You Begin................................................................................................................................................................6
Using This Guide.................................................................................................................................................................7
Contact Dell ProSupport................................................................................................................................................... 7
2 Requirements................................................................................................................................................ 9
All Clients.............................................................................................................................................................................9
All Clients - Prerequisites.............................................................................................................................................9
All Clients - Hardware.................................................................................................................................................. 9
All Clients - Localization............................................................................................................................................. 10
Encryption Client.............................................................................................................................................................. 10
Encryption Client Prerequisites.................................................................................................................................10
Encryption Client Hardware....................................................................................................................................... 11
Encryption Client Operating Systems....................................................................................................................... 11
Encryption Client Operating Systems with Deferred Activation............................................................................11
Encryption External Media Operating Systems....................................................................................................... 11
Threat Protection Client...................................................................................................................................................12
Threat Protection Client Operating Systems.......................................................................................................... 12
Threat Protection Client Ports.................................................................................................................................. 12
SED Client..........................................................................................................................................................................13
OPAL Drivers...............................................................................................................................................................14
SED Client Prerequisites............................................................................................................................................ 14
SED Client Hardware..................................................................................................................................................14
Authentication Options with SED Client..................................................................................................................15
SED Client International KeyboardsSED Client LocalizationSED Client Operating Systems.............................16
Advanced Authentication Client......................................................................................................................................17
Advanced Authentication Client Hardware..............................................................................................................17
Advanced Authentication Client Operating Systems............................................................................................. 18
BitLocker Manager Client................................................................................................................................................ 18
BitLocker Manager Client Prerequisites...................................................................................................................19
BitLocker Manager Client Operating Systems........................................................................................................19
3 Registry Settings......................................................................................................................................... 20
Encryption Client Registry Settings...............................................................................................................................20
Threat Protection Client Registry Settings...................................................................................................................24
SED Client Registry Settings.......................................................................................................................................... 24
Advanced Authentication Client Registry Settings......................................................................................................26
BitLocker Manager Client Registry Settings................................................................................................................ 26
4 Install Using the Master Installer..................................................................................................................28
Install Interactively Using the Master Installer..............................................................................................................28
Install by Command Line Using the Master Installer.................................................................................................... 31
Dell Data Security Endpoint Security Suite Pro
Contents
3