Administrator Guide
5 Uninstall Using the Endpoint Security Suite Pro Master Installer................................................................. 33
Uninstall the Endpoint Security Suite Pro Master Installer.........................................................................................33
Command Line Uninstallation................................................................................................................................... 33
6 Install Using the Child Installers................................................................................................................... 34
Install Drivers.................................................................................................................................................................... 35
Install Encryption Client...................................................................................................................................................35
Command Line Installation........................................................................................................................................35
Install Threat Protection Clients..................................................................................................................................... 37
Command Line Installation........................................................................................................................................38
Install SED Management and Advanced Authentication Clients................................................................................39
Command Line Installation........................................................................................................................................39
Install BitLocker Manager Client.................................................................................................................................... 40
Command Line Installation........................................................................................................................................40
7 Uninstall Using the Child Installers............................................................................................................... 42
Uninstall Threat Protection Clients................................................................................................................................ 43
Command Line Uninstallation................................................................................................................................... 43
Uninstall Encryption Client..............................................................................................................................................43
Process........................................................................................................................................................................43
Command Line Uninstallation................................................................................................................................... 44
Uninstall SED and Advanced Authentication Clients...................................................................................................45
Process........................................................................................................................................................................45
Deactivate the PBA................................................................................................................................................... 45
Uninstall SED Client and Advanced Authentication Clients..................................................................................46
Uninstall BitLocker Manager Client............................................................................................................................... 46
Command Line Uninstallation................................................................................................................................... 46
8 Commonly Used Scenarios.......................................................................................................................... 47
Encryption Client, Threat Protection, and Advanced Authentication........................................................................48
Encryption Client and Threat Protection...................................................................................................................... 49
SED Client (including Advanced Authentication) and Encryption External Media..................................................49
BitLocker Manager and Encryption External Media....................................................................................................50
9 Pre-Installation Conguration for SED UEFI, and BitLocker Manager...........................................................51
Initialize the TPM..............................................................................................................................................................51
Pre-Installation Conguration for UEFI Computers......................................................................................................51
Enable Network Connectivity During UEFI Preboot Authentication....................................................................51
Disable Legacy Option ROMs...................................................................................................................................52
Pre-Installation Conguration to Set Up a BitLocker PBA Partition..........................................................................52
10 Set GPO on Domain Controller to Enable Entitlements.............................................................................. 53
11 Extract the Child Installers from the Endpoint Security Suite Pro Master Installer......................................56
12 Congure Key Server for Uninstallation of Encryption Client Activated Against Security Management
Server.............................................................................................................................................................57
4
Dell Data Security Endpoint Security Suite Pro
Contents