Dell Data Protection | Encryption Guide de l'utilisateur Page 97

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 188
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 96
Enterprise Edition Administrator Guide 97
Example Command Line Installation
Special drivers are needed for Advanced Authentication if installing on Dell hardware. These are the drivers for the
various smart cards and fingerprint readers for which Dell supplies drivers.
Installing these drivers should be omitted if
using Advanced Authentication on non-Dell hardware, as they may interfere with other vendor’s drivers.
Additional drivers and software stack are required for supporting Hardware Crypto Accelerator (HCA). This includes the
HCA driver and the Trusted Software Stack (TSS) for TPM.
The installation is performed using the
EMAgent_
XX
bit_setup.exe
,
DP_
XX
bit_setup.exe
, and
Dell_CV_SW_Update_xXX.exe
files located in the
C:\extracted\Security Tools
,
C:\extracted\Security
Tools\Authentication
, and
C:\extracted\UshCvReset (Dell ControlVault Software Update) Child Installer
folders.
NOTE: Be sure to enclose a value that contains one or more special characters, such as a blank space, in escaped quotation marks.
To specify a log location other than the default locatio
n where the executable is located, provide the complete path in the command.
For example, “/l*v C:\Logs” will create install logs in a “C:\Logs” folder.
The following example installs remotely managed SED (silent installation, no reboot, log file at the specified location, no
entry in the Control Panel Programs list, installed in the default location of C:\Program Files\Dell\Dell Data Protection)
EMAgent_XXbit_setup.exe /S /v"CM_EDITION=1 SERVERHOST=server.organization.com
SERVERPORT=8888 SECURITYSERVERHOST=securityserver.organization.com
SECURITYSERVERPORT=8443 ARPSYSTEMCOMPONENT=1 /l*v SEDinstall.log /norestart /qn"
Then:
The following example installs Dell ControlVault software updates used by Security Tools (silent installation, no reboot,
log file at the specified location, installed in the default location of C:\Program Files\Dell\Dell Data Protection). If the
target computer is not equipped with Dell ControlVault, installing this software is not harmful and will have no effect.
Dell_CV_SW_Update_xXX.exe /s /v"/norestart /l*v CVinstall.log /qn"
Then:
The following example installs Advanced Authentication (silent installation, no reboot, log file at the specified location)
DP_XXbit_setup.exe /s /v"/norestart /l*v DPinstall.log /qn"
Once policies are applied at the endpoint and are ready to be enforced, the end user will be notified by the client that a
computer shutdown and restart is required. End users will log in to the computer through the PBA using their Windows
password. The drive is now managed by the DDP Server.
IMPORTANT:
Dell recommends that you do not change the authentication method after Preboot Authentication has been activated (SED) or HCA
policy has been set to True (HCA). If you must switch to a different authentication method, you must either:
Remove all the users from the PBA, and then re-e
nroll the users.
or
Deactivate the PBA (SED) or set the HCA policy to False (HCA), change the authenticatio
n method, and then re-activate the PBA (SED)
or set the HCA policy to True (HCA).
Vue de la page 96
1 2 ... 92 93 94 95 96 97 98 99 100 101 102 ... 187 188

Commentaires sur ces manuels

Pas de commentaire