Dell Data Protection | Encryption Installationshandbuch

Stöbern Sie online oder laden Sie Installationshandbuch nach Softwarelizenzen / Upgrades Dell Data Protection | Encryption herunter. Dell Data Protection | Encryption Installation Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 102
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Installation Guide

Dell Data Protection | EncryptionPersonal Edition Installation Guide

Seite 2 - ____________________

10 Installation GuideHardware RequirementsThe following table details supported hardware.Windows Hardware• Intel Pentium-class or AMD processor• 512 M

Seite 3 - Contents

100 Installation GuideTrusted Platform Module (TPM) – This Trusted Computing Group specification deals with the storage of encryption keys, platform i

Seite 6 - 6 Installation Guide

Installation Guide 11Authentication Hardware SupportThe following table details supported authentication hardware.Fingerprint Readers• Validity VFS495

Seite 7 - Overview

12 Installation GuideOperating SystemsThe following table details supported operating systems.NOTE:The Encryption client does not support dual boot co

Seite 8 - 8 Installation Guide

Installation Guide 13Language SupportThe Encryption client and Security Tools are Multilingual User Interface (MUI) compliant and support the followin

Seite 9 - Requirements

14 Installation GuideNOTE: If running DDP|E encryption products, stop or pause an encryption sweep. If running Microsoft BitLocker, suspend the encryp

Seite 10 - Hardware Requirements

Installation Guide 153Pre-Installation Configuration to Enable HCAIf the computer targeted for encryption is equipped with an HCA card and you intend

Seite 11

16 Installation GuideeSelect Get drivers and downloads in the left menu.fClick View All Drivers.gScroll down to Refine your results and expand the BIO

Seite 12 - Operating Systems

Installation Guide 17HCA Pre-Installation BIOS ConfigurationIf the following hardware and BIOS instructions are not completed, are inaccurate or are o

Seite 13 - Interoperability

18 Installation Guide

Seite 14 - Initialize the TPM

Installation Guide 194Installation Tasks• To install and activate Personal Edition, you must be a local or domain Admin user.• If upgrading, Dell reco

Seite 15 - Upgrade Legacy HCA Computers

____________________© 2014 Dell Inc. Registered trademarks and trademarks used in the DDP|E, DDP|ST, and DDP|CE suite of documents: Dell™ and the Dell

Seite 16

20 Installation GuideBest PracticesDell recommends that IT best practices are followed during the deployment of Personal Edition. We recommend at leas

Seite 17

Installation Guide 21Install Personal EditionYou can install Personal Edition using the master installer (highly recommended), or alone by extracting

Seite 18 - 18 Installation Guide

22 Installation GuideDialogs display that alert you to the status of the installing the prerequisites. This may take several minutes.4Click Next when

Seite 19 - Installation Tasks

Installation Guide 238Click Next

Seite 20 - Best Practices

24 Installation Guide9Click Install to begin the installation.A status window displays. This may take several minutes.

Seite 21 - Install Personal Edition

Installation Guide 2510Select Yes, I want to restart my computer now and click Finish when the InstallShield Wizard Complete screen displays.11Once th

Seite 22

26 Installation GuideParametersThe following table details the parameters available for the installation.ParametersInstallPath=path to alternate insta

Seite 23 - Installation Guide 23

Installation Guide 27The extracted child installers are located at C:\extracted\.Command Line InstallationFor a command line installation, the switche

Seite 24

28 Installation GuideDisplay OptionsThe following table details the display options that can be specified at the end of the argument passed to the /v

Seite 25 - /S Silent mode

Installation Guide 29Then:Dell ControlVault - C:\extracted\UshCvReset (Dell ControlVault Software Update) Child Installer• The following example insta

Seite 26 - Extract the Child Installers

Installation Guide 3Contents1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Perso

Seite 28

Installation Guide 315Configuration Tasks for AdministratorsConfigure Features in the Security Tools Administrator ConsoleTo begin using the features

Seite 29 - Installation Guide 29

32 Installation Guide• To change your password, from the Home tab, click Administrator Settings.• To navigate through the Administrator Console, you c

Seite 30 - 30 Installation Guide

Installation Guide 33Configure Authentication for Users1Click the Authentication tab.2Click Preboot Authentication to configure Preboot Authentication

Seite 31 - Installation Guide 31

34 Installation GuideEnter the Crypto Erase Password - A word or code of up to 100 characters used as a failsafe security mechanism. Entering this wor

Seite 32

Installation Guide 35Legal Notice Text - This text displays before being allowed to log on to the device. For example: “By clicking OK, you agree to a

Seite 33 - Installation Guide 33

36 Installation GuideaNew Windows users are automatically added when they log on to Windows or enroll credentials. Click Add to add an existing Window

Seite 34

Installation Guide 374Click Authentication Policy to define how users login.aThe Logon Policy allows you to configure how Administrators and Users log

Seite 35 - Installation Guide 35

38 Installation GuideFunctionality During the Grace PeriodDuring a specified Grace Period, after every log on, the Additional Credentials notification

Seite 36 - Choose Credentials

Installation Guide 395Click Credentials to define credential restrictions.aClick Recovery Questions. Select at least three pre-defined Recovery Questi

Seite 37 - Remind users

4 Installation Guide7 Use the Security Tools Authentication Applications . . . . . . . . . . . . . . . . . . 55Credentials . . . . . . . . . . . .

Seite 38 - Additional Credentials

40 Installation GuideClick Apply when finished.bClick Fingerprints. From the Enrollment tab, set the minimum and maximum number of fingers to enroll.

Seite 39 - Installation Guide 39

Installation Guide 41The higher the setting, the lower the chance of receiving a false acceptance. However, at the High setting, the system may reject

Seite 40 - Sensitivity

42 Installation Guide6Click Advanced to modify advanced end user options.aUnder Self-Enrollment, you can optionally allow users to self-enroll credent

Seite 41 - when finished

Installation Guide 43Click Apply when finished.7Close the Administrator Console.8A computer shutdown is required to complete the activation process. W

Seite 42 - setting is also selected

44 Installation GuidePersonal Edition Setup Wizard1The Security Tools PBA interface displays. Log on with your Windows username and password. You will

Seite 43 - Installation Guide 43

Installation Guide 45View Current SettingsCurrent settings are the encryption policies in effect for the current logged on user. Current settings incl

Seite 45 - View Current Settings

Installation Guide 476Configuration Tasks for End UsersConfigure Features in the Security Tools Security Console• The Security Console provides users

Seite 46 - 46 Installation Guide

48 Installation Guide2When the Security Console launches, the Setup tab displays. The user clicks Setup to launch the Security Tools Setup Wizard.3The

Seite 47 - System Tray

Installation Guide 494Verify Your IdentityThe user enters their Windows password to verify their identity and clicks Next.5Recovery QuestionsSecurity

Seite 48

Installation Guide 510 About Personal Edition Policies and Templates . . . . . . . . . . . . . . . . . . . . . 85Policies . . . . . . . . . . . . .

Seite 49 - Skip recovery questions setup

50 Installation Guide6Choose CredentialsOn the Choose Credentials page, the user can select which additional credentials to enroll at this time.By def

Seite 50

Installation Guide 517Enroll CredentialsDuring the process of enrolling the credentials selected in the previous step, a series of pages are presented

Seite 51 - Skip fingerprint enrollment

52 Installation GuideThe number of swipes needed to complete fingerprint enrollment depends on the quality of the fingerprint scan. The user clicks Sa

Seite 52

Installation Guide 53bCard EnrollmentTo set up a built-in contactless card, place the card very close to the reader. Once the contactless card communi

Seite 53 - Installation Guide 53

54 Installation GuidecEnrollment summaryA summary of the credentials enrolled is shown after enrollment of required credentials is complete. The user

Seite 54

Installation Guide 557Use the Security Tools Authentication ApplicationsThe Security Console provides access to three applications through the tiles l

Seite 55 - Credentials

56 Installation GuideHowever, if the Administrator has prohibited end users from enrolling their credentials, the navigation to the end users’ credent

Seite 56

Installation Guide 57Windows PasswordThe Windows Password page allows end users to easily change their Windows password from within the Security Conso

Seite 57 - Backup and Restore

58 Installation Guide3End users can also view a text log of backup and restore operations performed on this computer by clicking View Backup and Resto

Seite 58 - Back up Data

Installation Guide 592The end user clicks Next.3On the second page of the wizard, the end user types the location and name of the file to be created o

Seite 60

60 Installation Guide6The end user clicks Next.7The final page of the wizard informs the end user that the backup has been completed and lists the app

Seite 61 - Restore Data

Installation Guide 61Restore Data1Click Restore data to launch the Backup and Restore Wizard and to restore the data that was previously backed up usi

Seite 62 - to close the dialog

62 Installation Guide5The end user clicks Finish to close the dialog.

Seite 63 - Password Manager

Installation Guide 63Password Manager• Due to the ever changing structure of web logon screens, the software may not be able to support all websites a

Seite 64 - Add Logon to Password Manager

64 Installation Guide• The Password Manager icon in the upper left area of a screen indicates that this screen can be trained with the software.• To s

Seite 65 - Add Logon

Installation Guide 65Add Logon• The end user adds their logon information for the website or program in the Add Logon dialog.• The end user can add or

Seite 66

66 Installation Guide• An end user can edit field labels by clicking on the item in the fields list.• For logon to applications, Submit changes. A dro

Seite 67 - Web Domain Support

Installation Guide 67Icon Context MenuThe context menu displays the following options:• Add <domain> to Password Manager - launches the Add logo

Seite 68 - Add logon

68 Installation GuideLogging on to Trained Logon Screens• If the end user directly navigates to a web or application logon, the application detects wh

Seite 69

Installation Guide 69Open Password Manager - The Security Console is opened to the Password Manager page.Filling in with Windows Credentials• The appl

Seite 70 - Use Old Password

Installation Guide 71Overview This guide assumes that Security Tools will be installed with Personal Edition.Personal EditionThe purpose of Personal E

Seite 71 - Password Change

70 Installation GuideUse Old Password• It is possible that an end user may modify a password in Password Manager and then have the password rejected b

Seite 72 - Password Manager Page

Installation Guide 71Password Change• Password Manager provides a change password functionality that helps the end user create stronger passwords. Whe

Seite 73 - Installation Guide 73

72 Installation GuidePassword Manager Page•The Password Manager page allows an end user to launch their trained logons and to add, remove, and edit lo

Seite 74 - Turning off Password Manager

Installation Guide 73• Logons are grouped by domain. If an end user has multiple logons for the same web domain, the logons will be listed, indented,

Seite 75

74 Installation Guide• If the end user clicks the Add category, the Add Category dialog displays.Settings Page •On the Settings page, the end user can

Seite 76 - Uninstallation Process

Installation Guide 758Decryption and Uninstallation TasksThe user performing decryption and uninstallation must be a local or domain Admin user.When u

Seite 77 - This is

76 Installation Guide5Name the key LogVerbosity.6Double-click the key to open it.7Enter 0, 1, 2, 3, or 5 in the Value Data: field.LogVerbosity 0: no l

Seite 78 - Security Framework

Installation Guide 774At the Encryption Removal Agent Installation screen, select either:NOTE: The second option is enabled by default. If you wish to

Seite 79 - Data Recovery

78 Installation Guide• An error occurred during the decryption sweep.In all cases, a log file is created (if logging is configured) when LogVerbosity=

Seite 80 - Troubleshooting Recovery

Installation Guide 799Data RecoveryPersonal EditionSituations such as operating system failure or hardware failure may cause encrypted data to become

Seite 82 - Security Tools

80 Installation Guide6Enter the password associated with this file.7A dialog displays notifying you which disk is being recovered. Click Recover.8A di

Seite 83 - Installation Guide 83

Installation Guide 812The end user selects Forgot Password.3The end user enters the correct answers to the recovery questions and clicks Finish.

Seite 84 - Access Recovery

82 Installation GuideSecurity ToolsSelf-Recovery, OS LogonThis workflow enables an end user to log on with provisioned recovery questions.Once the use

Seite 85 - Policies

Installation Guide 832Clicking the link displays the questions selected by the end user during their initial setup in the Security Console. The end us

Seite 86 - 86 Installation Guide

84 Installation Guide3Upon successful entry of the answers to the questions, the end user is in Access Recovery mode. The following options are availa

Seite 87 - Installation Guide 87

Installation Guide 8510About Personal Edition Policies and TemplatesA word about types of encryption: SDE is designed to encrypt the operating system

Seite 88 - 88 Installation Guide

86 Installation GuidePolicyAggress Protect for All Fixed Drives and Ext DrivesPCI RegData Breach RegHIPAA RegBasic Protect for All Fixed Drives and Ex

Seite 89 - Installation Guide 89

Installation Guide 87Application Data Encryption Listwinword.exeexcel.exepowerpnt.exemsaccess.exewinproj.exeoutlook.exeacrobat.exevisio.exemspub.exeno

Seite 90 - 90 Installation Guide

88 Installation GuideEncrypt Tem p Internet FilesTru e FalseTrue encrypts the path listed in the environment variable CSIDL_INTERNET_CACHE with the Us

Seite 91 - Installation Guide 91

Installation Guide 89User Encryption AlgorithmAES256AES 256, Rijndael 256, AES 128, Rijndael 128, 3DESEncryption algorithm used to encrypt data at the

Seite 92 - 92 Installation Guide

Installation Guide 92Requirements• The user account performing the installation and activation must be a local or domain Admin user.• Internet connect

Seite 93

90 Installation GuideEMS Scan External MediaTru e FalseTrue allows EMS to scan removable storage every time removable storage is inserted.When this po

Seite 94 - HIPAA Regulation Targeted

Installation Guide 91EMS Encryption RulesEncryption rules to be used to encrypt/not encrypt certain drives, directories, and folders.A total of 2048 c

Seite 95 - Encryption Disabled

92 Installation GuidePort: USB EnabledEnable, Disable, or Bypass port access to external USB ports.Note: USB port-level blocking and HID class-level b

Seite 96 - 96 Installation Guide

Installation Guide 93Template DescriptionsAggressive Protection for All Fixed Drives and External DrivesThis policy template is designed for organizat

Seite 97 - Appendix A

94 Installation GuidePCI Regulation TargetedPayment Card Industry Data Security Standard (PCI DSS) is a multi-faceted security standard that includes

Seite 98

Installation Guide 95This policy template:• provides protection of the System Drive and all Fixed Drives.• provides Hardware Crypto Accelerator encryp

Seite 99 - Glossary

96 Installation Guide

Seite 100

Installation Guide 97AAppendix AChange Secure Boot/UEFI to Legacy Boot Mode in BIOSThe features available as of v8.3 with HCA are supported on legacy

Seite 101

98 Installation Guide5In Settings > Secure Boot > Secure Boot Enable, ensure that the Secure Boot Enable selection is Disabled.6Apply the change

Seite 102 - 0 XXXXXA0 X

Installation Guide 99GlossaryCommon Encryption – The Common key makes files accessible to all managed users on the device where they were created.Encr

Kommentare zu diesen Handbüchern

Keine Kommentare