Dell Data Protection | EncryptionPersonal Edition Installation Guide
10 Installation GuideHardware RequirementsThe following table details supported hardware.Windows Hardware• Intel Pentium-class or AMD processor• 512 M
100 Installation GuideTrusted Platform Module (TPM) – This Trusted Computing Group specification deals with the storage of encryption keys, platform i
0 XXXXXA0 X
Installation Guide 11Authentication Hardware SupportThe following table details supported authentication hardware.Fingerprint Readers• Validity VFS495
12 Installation GuideOperating SystemsThe following table details supported operating systems.NOTE:The Encryption client does not support dual boot co
Installation Guide 13Language SupportThe Encryption client and Security Tools are Multilingual User Interface (MUI) compliant and support the followin
14 Installation GuideNOTE: If running DDP|E encryption products, stop or pause an encryption sweep. If running Microsoft BitLocker, suspend the encryp
Installation Guide 153Pre-Installation Configuration to Enable HCAIf the computer targeted for encryption is equipped with an HCA card and you intend
16 Installation GuideeSelect Get drivers and downloads in the left menu.fClick View All Drivers.gScroll down to Refine your results and expand the BIO
Installation Guide 17HCA Pre-Installation BIOS ConfigurationIf the following hardware and BIOS instructions are not completed, are inaccurate or are o
18 Installation Guide
Installation Guide 194Installation Tasks• To install and activate Personal Edition, you must be a local or domain Admin user.• If upgrading, Dell reco
____________________© 2014 Dell Inc. Registered trademarks and trademarks used in the DDP|E, DDP|ST, and DDP|CE suite of documents: Dell™ and the Dell
20 Installation GuideBest PracticesDell recommends that IT best practices are followed during the deployment of Personal Edition. We recommend at leas
Installation Guide 21Install Personal EditionYou can install Personal Edition using the master installer (highly recommended), or alone by extracting
22 Installation GuideDialogs display that alert you to the status of the installing the prerequisites. This may take several minutes.4Click Next when
Installation Guide 238Click Next
24 Installation Guide9Click Install to begin the installation.A status window displays. This may take several minutes.
Installation Guide 2510Select Yes, I want to restart my computer now and click Finish when the InstallShield Wizard Complete screen displays.11Once th
26 Installation GuideParametersThe following table details the parameters available for the installation.ParametersInstallPath=path to alternate insta
Installation Guide 27The extracted child installers are located at C:\extracted\.Command Line InstallationFor a command line installation, the switche
28 Installation GuideDisplay OptionsThe following table details the display options that can be specified at the end of the argument passed to the /v
Installation Guide 29Then:Dell ControlVault - C:\extracted\UshCvReset (Dell ControlVault Software Update) Child Installer• The following example insta
Installation Guide 3Contents1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Perso
30 Installation Guide
Installation Guide 315Configuration Tasks for AdministratorsConfigure Features in the Security Tools Administrator ConsoleTo begin using the features
32 Installation Guide• To change your password, from the Home tab, click Administrator Settings.• To navigate through the Administrator Console, you c
Installation Guide 33Configure Authentication for Users1Click the Authentication tab.2Click Preboot Authentication to configure Preboot Authentication
34 Installation GuideEnter the Crypto Erase Password - A word or code of up to 100 characters used as a failsafe security mechanism. Entering this wor
Installation Guide 35Legal Notice Text - This text displays before being allowed to log on to the device. For example: “By clicking OK, you agree to a
36 Installation GuideaNew Windows users are automatically added when they log on to Windows or enroll credentials. Click Add to add an existing Window
Installation Guide 374Click Authentication Policy to define how users login.aThe Logon Policy allows you to configure how Administrators and Users log
38 Installation GuideFunctionality During the Grace PeriodDuring a specified Grace Period, after every log on, the Additional Credentials notification
Installation Guide 395Click Credentials to define credential restrictions.aClick Recovery Questions. Select at least three pre-defined Recovery Questi
4 Installation Guide7 Use the Security Tools Authentication Applications . . . . . . . . . . . . . . . . . . 55Credentials . . . . . . . . . . . .
40 Installation GuideClick Apply when finished.bClick Fingerprints. From the Enrollment tab, set the minimum and maximum number of fingers to enroll.
Installation Guide 41The higher the setting, the lower the chance of receiving a false acceptance. However, at the High setting, the system may reject
42 Installation Guide6Click Advanced to modify advanced end user options.aUnder Self-Enrollment, you can optionally allow users to self-enroll credent
Installation Guide 43Click Apply when finished.7Close the Administrator Console.8A computer shutdown is required to complete the activation process. W
44 Installation GuidePersonal Edition Setup Wizard1The Security Tools PBA interface displays. Log on with your Windows username and password. You will
Installation Guide 45View Current SettingsCurrent settings are the encryption policies in effect for the current logged on user. Current settings incl
46 Installation Guide
Installation Guide 476Configuration Tasks for End UsersConfigure Features in the Security Tools Security Console• The Security Console provides users
48 Installation Guide2When the Security Console launches, the Setup tab displays. The user clicks Setup to launch the Security Tools Setup Wizard.3The
Installation Guide 494Verify Your IdentityThe user enters their Windows password to verify their identity and clicks Next.5Recovery QuestionsSecurity
Installation Guide 510 About Personal Edition Policies and Templates . . . . . . . . . . . . . . . . . . . . . 85Policies . . . . . . . . . . . . .
50 Installation Guide6Choose CredentialsOn the Choose Credentials page, the user can select which additional credentials to enroll at this time.By def
Installation Guide 517Enroll CredentialsDuring the process of enrolling the credentials selected in the previous step, a series of pages are presented
52 Installation GuideThe number of swipes needed to complete fingerprint enrollment depends on the quality of the fingerprint scan. The user clicks Sa
Installation Guide 53bCard EnrollmentTo set up a built-in contactless card, place the card very close to the reader. Once the contactless card communi
54 Installation GuidecEnrollment summaryA summary of the credentials enrolled is shown after enrollment of required credentials is complete. The user
Installation Guide 557Use the Security Tools Authentication ApplicationsThe Security Console provides access to three applications through the tiles l
56 Installation GuideHowever, if the Administrator has prohibited end users from enrolling their credentials, the navigation to the end users’ credent
Installation Guide 57Windows PasswordThe Windows Password page allows end users to easily change their Windows password from within the Security Conso
58 Installation Guide3End users can also view a text log of backup and restore operations performed on this computer by clicking View Backup and Resto
Installation Guide 592The end user clicks Next.3On the second page of the wizard, the end user types the location and name of the file to be created o
6 Installation Guide
60 Installation Guide6The end user clicks Next.7The final page of the wizard informs the end user that the backup has been completed and lists the app
Installation Guide 61Restore Data1Click Restore data to launch the Backup and Restore Wizard and to restore the data that was previously backed up usi
62 Installation Guide5The end user clicks Finish to close the dialog.
Installation Guide 63Password Manager• Due to the ever changing structure of web logon screens, the software may not be able to support all websites a
64 Installation Guide• The Password Manager icon in the upper left area of a screen indicates that this screen can be trained with the software.• To s
Installation Guide 65Add Logon• The end user adds their logon information for the website or program in the Add Logon dialog.• The end user can add or
66 Installation Guide• An end user can edit field labels by clicking on the item in the fields list.• For logon to applications, Submit changes. A dro
Installation Guide 67Icon Context MenuThe context menu displays the following options:• Add <domain> to Password Manager - launches the Add logo
68 Installation GuideLogging on to Trained Logon Screens• If the end user directly navigates to a web or application logon, the application detects wh
Installation Guide 69Open Password Manager - The Security Console is opened to the Password Manager page.Filling in with Windows Credentials• The appl
Installation Guide 71Overview This guide assumes that Security Tools will be installed with Personal Edition.Personal EditionThe purpose of Personal E
70 Installation GuideUse Old Password• It is possible that an end user may modify a password in Password Manager and then have the password rejected b
Installation Guide 71Password Change• Password Manager provides a change password functionality that helps the end user create stronger passwords. Whe
72 Installation GuidePassword Manager Page•The Password Manager page allows an end user to launch their trained logons and to add, remove, and edit lo
Installation Guide 73• Logons are grouped by domain. If an end user has multiple logons for the same web domain, the logons will be listed, indented,
74 Installation Guide• If the end user clicks the Add category, the Add Category dialog displays.Settings Page •On the Settings page, the end user can
Installation Guide 758Decryption and Uninstallation TasksThe user performing decryption and uninstallation must be a local or domain Admin user.When u
76 Installation Guide5Name the key LogVerbosity.6Double-click the key to open it.7Enter 0, 1, 2, 3, or 5 in the Value Data: field.LogVerbosity 0: no l
Installation Guide 774At the Encryption Removal Agent Installation screen, select either:NOTE: The second option is enabled by default. If you wish to
78 Installation Guide• An error occurred during the decryption sweep.In all cases, a log file is created (if logging is configured) when LogVerbosity=
Installation Guide 799Data RecoveryPersonal EditionSituations such as operating system failure or hardware failure may cause encrypted data to become
8 Installation Guide
80 Installation Guide6Enter the password associated with this file.7A dialog displays notifying you which disk is being recovered. Click Recover.8A di
Installation Guide 812The end user selects Forgot Password.3The end user enters the correct answers to the recovery questions and clicks Finish.
82 Installation GuideSecurity ToolsSelf-Recovery, OS LogonThis workflow enables an end user to log on with provisioned recovery questions.Once the use
Installation Guide 832Clicking the link displays the questions selected by the end user during their initial setup in the Security Console. The end us
84 Installation Guide3Upon successful entry of the answers to the questions, the end user is in Access Recovery mode. The following options are availa
Installation Guide 8510About Personal Edition Policies and TemplatesA word about types of encryption: SDE is designed to encrypt the operating system
86 Installation GuidePolicyAggress Protect for All Fixed Drives and Ext DrivesPCI RegData Breach RegHIPAA RegBasic Protect for All Fixed Drives and Ex
Installation Guide 87Application Data Encryption Listwinword.exeexcel.exepowerpnt.exemsaccess.exewinproj.exeoutlook.exeacrobat.exevisio.exemspub.exeno
88 Installation GuideEncrypt Tem p Internet FilesTru e FalseTrue encrypts the path listed in the environment variable CSIDL_INTERNET_CACHE with the Us
Installation Guide 89User Encryption AlgorithmAES256AES 256, Rijndael 256, AES 128, Rijndael 128, 3DESEncryption algorithm used to encrypt data at the
Installation Guide 92Requirements• The user account performing the installation and activation must be a local or domain Admin user.• Internet connect
90 Installation GuideEMS Scan External MediaTru e FalseTrue allows EMS to scan removable storage every time removable storage is inserted.When this po
Installation Guide 91EMS Encryption RulesEncryption rules to be used to encrypt/not encrypt certain drives, directories, and folders.A total of 2048 c
92 Installation GuidePort: USB EnabledEnable, Disable, or Bypass port access to external USB ports.Note: USB port-level blocking and HID class-level b
Installation Guide 93Template DescriptionsAggressive Protection for All Fixed Drives and External DrivesThis policy template is designed for organizat
94 Installation GuidePCI Regulation TargetedPayment Card Industry Data Security Standard (PCI DSS) is a multi-faceted security standard that includes
Installation Guide 95This policy template:• provides protection of the System Drive and all Fixed Drives.• provides Hardware Crypto Accelerator encryp
96 Installation Guide
Installation Guide 97AAppendix AChange Secure Boot/UEFI to Legacy Boot Mode in BIOSThe features available as of v8.3 with HCA are supported on legacy
98 Installation Guide5In Settings > Secure Boot > Secure Boot Enable, ensure that the Secure Boot Enable selection is Disabled.6Apply the change
Installation Guide 99GlossaryCommon Encryption – The Common key makes files accessible to all managed users on the device where they were created.Encr
Kommentare zu diesen Handbüchern