Administrator Guide
Contents
1 Introduction....................................................................................................................................................5
Before You Begin................................................................................................................................................................5
Using This Guide................................................................................................................................................................ 6
Contact Dell ProSupport...................................................................................................................................................6
2 Requirements.................................................................................................................................................7
All Clients.............................................................................................................................................................................7
All Clients - Prerequisites.............................................................................................................................................7
All Clients - Hardware.................................................................................................................................................. 7
All Clients - Localization...............................................................................................................................................8
Encryption Client................................................................................................................................................................8
Encryption Client Prerequisites.................................................................................................................................. 8
Encryption Client Operating Systems........................................................................................................................8
Encryption Client Operating Systems with Deferred Activation............................................................................ 9
Encryption External Media Operating Systems........................................................................................................9
Threat Protection Client.................................................................................................................................................. 10
Threat Protection Client Operating Systems.......................................................................................................... 10
Threat Protection Client Ports..................................................................................................................................10
SED Client.......................................................................................................................................................................... 11
SED Client Prerequisites............................................................................................................................................ 12
SED Client Hardware..................................................................................................................................................12
SED Client International KeyboardsSED Client LocalizationSED Client Operating Systems.............................12
Advanced Authentication Client..................................................................................................................................... 13
Advanced Authentication Client Hardware............................................................................................................. 13
Advanced Authentication Client Operating Systems............................................................................................. 14
BitLocker Manager Client................................................................................................................................................ 14
BitLocker Manager Client Prerequisites...................................................................................................................14
BitLocker Manager Client Operating Systems........................................................................................................14
3 Install Using the Master Installer.................................................................................................................. 16
Install Interactively Using the Master Installer...............................................................................................................16
Install by Command Line Using the Master Installer.................................................................................................... 19
4 Uninstall Using the Endpoint Security Suite Pro Master Installer..................................................................21
Uninstall the Endpoint Security Suite Pro Master Installer..........................................................................................21
Command Line Uninstallation....................................................................................................................................21
5 Uninstall Using the Child Installers............................................................................................................... 22
Uninstall Threat Protection Clients................................................................................................................................ 23
Command Line Uninstallation................................................................................................................................... 23
Uninstall Encryption Client.............................................................................................................................................. 23
Process........................................................................................................................................................................23
Command Line Uninstallation................................................................................................................................... 24
Dell Data Security Endpoint Security Suite Pro
Contents
3