Dell EMS User Manual

Browse online or download User Manual for PC/workstation barebones Dell EMS. Dell Data Protection | Enterprise Edition for Mac Administrator Guide

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - Administrator Guide

Dell Data Protection | Enterprise Edition for MacAdministrator Guide

Page 2

10 Administrator GuideInteractive Installation/Upgrade and ActivationTo install/upgrade and activate the client software, follow the steps below. You

Page 3 - Contents

Administrator Guide 11Activate Dell Data Protection | Enterprise Edition for MacThe activation process associates network user accounts in the Dell En

Page 4 - 4 Administrator Guide

12 Administrator GuideCommand Line Installation/UpgradeTo install the client software using the command line, follow the steps below. If you intend to

Page 5 - Introduction

Administrator Guide 13<key>Domains</key><array><dict><key>DisplayName</key><string>COMPANY</string><

Page 6 - 6 Administrator Guide

14 Administrator Guide8Enter the user name and password managed by Active Directory, select the Domain to log on to, and click Activate.If policies ha

Page 7 - Requirements

Administrator Guide 15Enable EncryptionNOTE: Only Mac OS X Extended (Journaled) volumes and system disks that are partitioned with the GUID Partition

Page 8 - 8 Administrator Guide

16 Administrator GuideView Encryption Policy and StatusYou can view the encryption policy and status on the local computer or in the Dell Remote Manag

Page 9 - Prerequisites

Administrator Guide 17Removable StorageEMS Encrypt External MediaTrue or Fa lseThis is the “master policy” for all other Removable Storage policies. T

Page 10

18 Administrator GuideEMS Device Whitelist See the AdminHelp for instructions on how to use this policy.This policy allows the specification of remova

Page 11 - Security & Privacy

Administrator Guide 19EMS Access and Device Code Length8, 16, or 32Number of characters Access and Device Codes have. 32 characters is the most secure

Page 12

© 2013 Dell Inc. Registered trademarks and trademarks used in the DDP|E, DDP|ST, and DDP|CE suite of documents: Dell™ and the Dell logo, Dell Precisio

Page 13 - Administrator Guide 13

20 Administrator Guide3Click Encryption to view the status of the volumes targeted for encryption.State DescriptionExcluded The volume is excluded fro

Page 14

Color DescriptionGreen Encrypted portionRed Not encrypted portionYellow Portion being re-encryptedFor example, by a change in encryption algorithms. T

Page 15 - Enable Encryption

22 Administrator GuideTo view effective polices, in the Actions area, click View Effective Policies. 7Click the Security Policies tab. The following t

Page 16 - System Preferences

Administrator Guide 23Mount VolumePrerequisites• An unencrypted external recovery volume or computer that will be running the recovery utility•A FireW

Page 17

24 Administrator Guide10Select the volume or drive that needs recovery and click Continue. Selecting the drive will recover all volumes on the drive a

Page 18 - 18 Administrator Guide

Administrator Guide 25Boot the computer targeted for recovery into Target Disk Mode. You can accomplish this by either launching the Startup Disk pane

Page 19

26 Administrator GuideProcess1As a Dell Administrator, log in to the Dell Remote Management Console.2In the left pane, click Actions > Recover Endp

Page 20 - Encryption

Administrator Guide 27Uninstall Dell Data Protection | Enterprise Edition for MacThe client software may be uninstalled by running the Uninstall Dell

Page 21 - Details & Actions

28 Administrator Guide

Page 22 - Recovery

Administrator Guide 294Activation as AdministratorThe Client Tool offers the administrator new methods for activating the client software on a Mac com

Page 23 - Mount Volume

Administrator Guide 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Ov

Page 25 - FileVault Recovery

Administrator Guide 31AAppendix AAbout Optional Firmware Password ProtectionNOTE: More recent Mac computers do not support Firmware Password Protectio

Page 26

32 Administrator Guide

Page 27 - Administrator Guide 27

Administrator Guide 33BAppendix BHow to Enable Mac OS X Boot CampNOTE: When using Boot Camp, the Windows operating system cannot be encrypted.Boot Cam

Page 28 - 28 Administrator Guide

34 Administrator Guide

Page 29 - Activation as Administrator

Administrator Guide 35CAppendix CHow to Retrieve a Firmware PasswordEven if the client computer is configured for firmware password enforcement, it ma

Page 30 - 30 Administrator Guide

36 Administrator Guide

Page 31 - Appendix A

Administrator Guide 37DAppendix DClient ToolThe Client Tool is a shell command that runs on a Mac endpoint. It is used to activate the client from a r

Page 32 - 32 Administrator Guide

38 Administrator Guide* The Client tool’s account is used for the localAccount unless another is specified.The Plist OptionThe -plist option prints th

Page 33 - Appendix B

Administrator Guide 39EGlossaryDell Device Server - The Dell Device Server is used for client activations. The Dell Device Server is a component of th

Page 34 - 34 Administrator Guide

4 Administrator GuideAppendix A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31About

Page 35 - Appendix C

40 Administrator Guide

Page 38 - Global Return Codes

Administrator Guide 51IntroductionThe Dell Data Protection | Enterprise Edition for Mac Administrator Guide provides the information needed to deploy

Page 39 - Glossary

6 Administrator Guide

Page 40 - 40 Administrator Guide

Administrator Guide 72RequirementsClient hardware and software requirements are provided in this chapter. Ensure that the deployment environment meets

Page 41 - 0 XXXXXA0 X

8 Administrator GuideWindows Operating Systems (32- and 64-bit) Supported to Access Encrypted Media• Microsoft Windows 7 SP0-SP1- Enterprise- Professi

Page 42

Administrator Guide 93TasksInstall/Upgrade Dell Data Protection | Enterprise Edition for MacThis section guides you through the Dell Data Protection |

Comments to this Manuals

No comments