Administrator Guide
목차
1 소개............................................................................................................................................................... 6
시작하기 전에....................................................................................................................................................................6
이 안내서 사용...................................................................................................................................................................6
Dell ProSupport에 문의.....................................................................................................................................................7
2 요구 사항.......................................................................................................................................................8
모든 클라이언트............................................................................................................................................................... 8
모든 클라이언트 - 필수 구성 요소...........................................................................................................................8
모든 클라이언트 - 하드웨어.....................................................................................................................................8
모든 클라이언트 - 언어 지원....................................................................................................................................9
Encryption 클라이언트.....................................................................................................................................................9
Encryption 클라이언트 필수 구성 요소................................................................................................................. 10
Encryption 클라이언트 하드웨어............................................................................................................................10
Encryption 클라이언트 운영 체제...........................................................................................................................10
EMS(External Media Shield) 운영 체제..................................................................................................................10
Threat Protection 클라이언트........................................................................................................................................ 11
Threat Protection 클라이언트 운영 체제................................................................................................................11
Threat Protection 클라이언트 포트.........................................................................................................................11
SED 클라이언트...............................................................................................................................................................12
OPAL 드라이버.......................................................................................................................................................... 13
SED 클라이언트 필수 구성 요소.............................................................................................................................13
SED 클라이언트 하드웨어....................................................................................................................................... 13
SED 클라이언트 운영 체제......................................................................................................................................14
Advanced Authentication 클라이언트...........................................................................................................................14
Advanced Authentication 클라이언트 하드웨어...................................................................................................15
Advanced Authentication 클라이언트 운영 체제..................................................................................................15
BitLocker Manager 클라이언트..................................................................................................................................... 16
BitLocker Manager 클라이언트 필수 구성 요소...................................................................................................16
BitLocker Manager 클라이언트 운영 체제............................................................................................................ 16
인증 옵션...........................................................................................................................................................................17
Encryption 클라이언트..............................................................................................................................................17
SED 클라이언트.........................................................................................................................................................18
BitLocker Manager..................................................................................................................................................... 18
3 레지스트리 설정.......................................................................................................................................... 20
Encryption 클라이언트 레지스트리 설정................................................................................................................... 20
Threat Protection 클라이언트 레지스트리 설정........................................................................................................23
SED 클라이언트 레지스트리 설정...............................................................................................................................24
Advanced Authentication 클라이언트 레지스트리 상태.......................................................................................... 25
BitLocker Manager 클라이언트 레지스트리 설정..................................................................................................... 26
4 ESS 마스터 설치 프로그램을 사용하여 설치................................................................................................27
ESS 마스터 설치 프로그램을 사용하여 대화형으로 설치...................................................................................... 27
Dell Data Protection | Endpoint Security Suite
목차
3