Administrator Guide
Inhaltsverzeichnis
1 Einleitung....................................................................................................................................................... 6
Vor der Installation............................................................................................................................................................. 6
Verwendung des Handbuchs............................................................................................................................................6
Kontaktaufnahme mit dem Dell ProSupport................................................................................................................... 7
2 Anforderungen...............................................................................................................................................8
Alle Clients...........................................................................................................................................................................8
Alle Clients - Voraussetzungen...................................................................................................................................8
Alle Clients - Hardware................................................................................................................................................ 9
Alle Clients - Sprachunterstützung............................................................................................................................9
Encryption-Client............................................................................................................................................................... 9
Encryption-Client-Anforderungen............................................................................................................................ 10
Encryption-Client-Hardware..................................................................................................................................... 10
Encryption-Client-Betriebssysteme......................................................................................................................... 10
Externes Medien-Shield (EMS)-Betriebssysteme.................................................................................................. 11
Threat Protection-Client...................................................................................................................................................11
Threat Protection-Client-Betriebssysteme.............................................................................................................. 11
Threat Protection-Client-Ports................................................................................................................................. 12
SED-Client.........................................................................................................................................................................12
OPAL-Treiber................................................................................................................................................................13
SED-Client-Anforderungen........................................................................................................................................13
SED-Client-Hardware.................................................................................................................................................13
SED-Client-Betriebssysteme.....................................................................................................................................14
Advanced Authentication-Client.....................................................................................................................................15
Advanced Authentication-Client-Hardware............................................................................................................ 15
Advanced Authentication Client - Betriebssysteme...............................................................................................16
BitLocker Manager-Client................................................................................................................................................16
Voraussetzungen für den BitLocker Manager-Client.............................................................................................17
BitLocker Manager Client-Betriebssysteme............................................................................................................17
Authentizierungsoptionen..............................................................................................................................................17
Encryption-Client........................................................................................................................................................17
SED-Client...................................................................................................................................................................18
BitLocker Manager..................................................................................................................................................... 19
3 Registrierungseinstellungen..........................................................................................................................21
Encryption Client – Registrierungseinstellungen.......................................................................................................... 21
Threat Protection-Client – Registrierungseinstellungen.............................................................................................25
SED-Client – Registrierungseinstellungen....................................................................................................................26
Advanced Authentication-Client – Registrierungseinstellungen................................................................................27
BitLocker Manager-Client – Registrierungseinstellungen...........................................................................................28
4 Installation unter Verwendung des ESS-Master-Installationsprogramms......................................................29
Interaktive Installation unter Verwendung des ESS-Master Installationsprogramms..............................................29
Dell Data Protection | Endpoint Security Suite
Inhaltsverzeichnis
3