Administrator Guide
2 Thoroughly read the Requirements chapter of this document.
3 Deploy clients to end users.
Using This Guide
Use this guide in the following order.
• See Requirements for client prerequisites, computer hardware and software information, limitations, and special registry modications
needed for features.
• If needed, see Pre-Installation Conguration for SED UEFI, and BitLocker.
• If your clients will be entitled using Dell Digital Delivery (DDD), see Set GPO on Domain Controller to Enable Entitlements.
• If installing clients using the Endpoint Security Suite Pro master installer, see:
• Install Interactively Using the Master Installer
or
• Install by Command Line Using the Master Installer
• If installing clients using the child installers, the child installer executable les must be extracted from the master installer. See Extract
the Child Installers from the Master Installer, then return here.
• Install Child Installers by Command line:
• Install Drivers - Download the appropriate drivers and rmware based on your authentication hardware.
• Install Encryption Client - use these instructions to install the Encryption client, which is the component that enforces security
policy, whether a computer is connected to the network, disconnected from the network, lost, or stolen.
• Install Threat Protection Clients - use these instructions to install the Threat Protection clients, which are comprised of the
following policy-based Threat Protection features:
• Malware Protection - Checks for viruses, spyware, unwanted programs, and other threats by automatically scanning items
when users access them or on demand at any time.
• Client Firewall - Monitors communication between the computer and resources on the network and the Internet. Intercepts
suspicious communications.
• Web Filter - Displays safety ratings and reports for websites during online browsing and searching. Web Filtering enables the
site administrator to block access to websites based on safety rating or content.
• Install SED Management and Advanced Authentication Clients - use these instructions to install encryption software for SEDs.
Although SEDs provide their own encryption, they lack a platform to manage their encryption and policies. With SED
management, all policies, storage, and retrieval of encryption keys are available from a single console, reducing the risk that
computers are unprotected in the event of loss or unauthorized access.
The Advanced Authentication client manages multiple authentication methods, including PBA for SEDs, Single Sign-on (SSO),
and user credentials such as ngerprints and passwords. In addition, it provides Advanced Authentication capabilities to access
websites and applications.
• Install BitLocker Manager Client - use these instructions to install the BitLocker Manager client, designed to improve the
security of BitLocker deployments and to simplify and reduce the cost of ownership.
NOTE
:
Most child installers can be installed interactively, but installations are not described in this guide.
• See Commonly Used Scenarios for scripts of our most commonly used scenarios.
Contact Dell ProSupport
Call 877-459-7304, extension 4310039 for 24x7 phone support for your Dell product.
Dell Data Security Endpoint Security Suite Pro
Introduction
7