Dell Data Protection Enterprise Server v9.1

Restart required AUTO INSTALLED This file was automatically installed as part of a recent update. If you are experiencing any issues, you can manually download and reinstall.
Dell Data Protection | Encryption v9.1 Server
Recommended

Find the best download for your system

Please enter your product details to view the latest driver information for your system

Search support

Enter your Dell Service Tag or model

Want to look up your product? Enter a product identifier. Show me how

This driver is not compatible

This driver is not applicable for the selected product. Choose another product to re-enter your product details for this driver or visit the Product Support page to view all drivers for a different product.

Find more updates. Use SupportAssist to find all the latest driver updates for your device.

Fixes & Enhancements

New Features
- Forensic Administrator rights for a User Group can now be delegated by the Superadmin or Security Administrator to a member of the User Group.
- Server Encryption is now supported, featuring port control and removable storage encryption as well as support for maintenance scheduling, which allows control over enforcement of policies that require reboot.
- Deferred Client Activation is now supported, allowing an enterprise to extend centrally managed encryption policies to users' devices in a BYOD environment.
- Support for user feedback to Dell is now available through policy.

Resolved Technical Advisories v9.1
- In the Remote Management Console, when Client Firewall rules are added or edited, in Non-IP protocol, the field for Custom EtherType now accepts only four characters, as expected and, in DNS Blocking, values entered into the Domain name field are now validated as expected.
- In the Remote Management Console, when Core Networking rules are added or edited, the Connection types field is now locked as expected and cannot be edited.
- In the Remote Management Console, an endpoint that has been previously removed can now be recovered.
- In the Remote Management Console, in Default/Custom Firewall rules, an ""Invalid Signer"" error no longer displays when an executable is edited. The additional error present only in the Silverlight Console, ""Specify one or more of the following required...,"" also no longer displays.
- When Cloud Edition is deployed, authorization of the link between the Server and Dropbox now succeeds as expected. Previously, the following error displayed: ""Invalid, malformed, or unauthorized request. Please contact the administrator.""
- When Cloud Edition is deployed and an external user activates against the Server, on the User Details page in the Remote Management Console, the User Type no longer incorrectly displays as ""AD.""
- In the Remote Management Console, when an attempt is made to import an invalid or duplicate license, the previous generic error message has been replaced with a message that more clearly describes the error.
- The Secure Windows Credentials policy is now correctly grouped with Fixed Storage Policies rather than with General Settings policies. The SDE Encryption Enabled policy must be set to True in order for the Secure Windows Credentials to be applied.
- In the Compliance Reporter Mobile Device report, time stamps for commands sent to mobile devices are now correct.
- In the Remote Management Console, Log Analyzer - Admin Actions now displays accurate data for endpoint policy changes, and System Logs now displays login entries for users from sub-domains.
- After uninstallation, wrapper logs are now removed as expected.
- In the Compliance Reporter Threat Protection Details report, the Host Name field is now selected for inclusion by default as expected and Host Names displayed in the Report Result are now correct, matching Host Names displayed in the database and in the Remote Management Console. Host Names displayed in the database and in the Remote Management Console were never incorrect even though the Report Result previously displayed them incorrectly.
- Active Directory reconciliation no longer fails when one of multiple domains is offline or inaccessible on the network.
- In the Silverlight Console, the issue that resulted in login failure with the error, ""Unable to Access User Admin Roles,"" has been resolved.
- The upgrade error that occurred with an error logged regarding the UserEntity table, EID column is now resolved.
Read More

Version

9.1.0.523, A07

Release date

29 Jun 2015

Download Type

Applications

Category

Dell Data Security

Importance

Recommended
Dell Technologies recommends applying this update during your next scheduled update cycle. The update contains changes to maintain overall system health. It ensures that the system software remains current and compatible with other system modules (firmware, BIOS, drivers, and software) and may include other new features.
Available formats View Important Information

File Format: An application
File Name: DDP-Enterprise-Server-9.1.0.523.zip
File Size: 1.13 GB
This is a large file. Depending on your connection speed, it may take some time to download.
Format Description:
Application
To ensure the integrity of your download, please verify the checksum value.
MD5:
2de85b1c91c8e051a415a36622f7e26f
SHA1:
3f22780a46c8eda9c863eecf8e9ada33c58fe38e
SHA-256:
e662a26989d79645649fc5e08167777d185b29885ce92784fc0f5d215a98984e

By downloading, you accept the terms of the Dell Software License Agreement.

Additional details

Show All | Hide All
Technical Advisories v9.1

- In the Remote Management Console, fields for policies with numeric values accept a ""+"" or ""-"" character immediately preceding the policy value. To work around this issue, ensure that these characters are not included in policies' values before the policies are committed.
- When running DDP|E with Deferred Activation, Cloud Edition policies may not flow from the DDP Server. If this occurs, in DDP Remote Management Console, check the list of endpoints. The list includes both the host name and the Machine ID for the computer. To work around this issue, ensure that Cloud Edition policies are set for the endpoint represented by the computer host name. DDP|E policies must continue to be set on the endpoint represented by the computer Machine ID.
- In Compliance Reporter, the Mobile Policy report may not include results for all activated mobile devices.
- If Compliance Reporter default reports have been customized prior to upgrade, the previous version of customized reports must be restored in order to continue to use them. However, after the previous version is restored, new reports included in the upgrade are not available.
- When a self-signed certificate is created at installation, the certificate is valid from a time approximately six hours later than the installation time, rather than being immediately valid. To work around this issue, on the Settings tab of the Server Configuration Tool, check Disable Trust Chain Check.
- During a new installation in a deployment that includes Server Encryption, if the option Re-use SSL certificate for SSOS is selected during installation, a prompt displays to use a different certificate. If at this point a self-signed certificate is selected, the Create Self-Signed Certificate dialog fields are pre-populated with ""."" To work around this issue, either enter the correct information into the fields or select a different Certificate Authority certificate.
- In the Remote Management Console, when Client Firewall rules are added or edited and ICMP Transport Protocol is selected from the Transport drop-down menu, the Message Type displays the default message type as ""Echo-Replay"" instead of ""All,"" as expected.
- In the Compliance Reporter report view scheduling form, the Email Recipients field accepts special characters between email addresses, rather than accepting only a comma ("","") as a separator.
- An underscore character (""_"") in either the Compatibility Server host name or Security Server host name causes connection to that Server to fail. A host name cannot contain an underscore character (""_""), due to a Java platform issue, JDK-6587184. For more information, see http://bugs.java.com/view_bug.do?bug_id=6587184.
- In the Remote Management Console, the setting field of the Threat Protection policy, Exclude Processes, accepts invalid values]
- When using Windows Authentication to perform a new installation or upgrade, if the credentials of the logged on user differ fromthe credentials of the domain services account and a certificate from a signing authority is used, the certificate must be stored in a folder that is accessible during installation to both the domain services account and the logged on user. If the credentials of the logged on user differ from the credentials of the domain services account and a self-signed certificate is used, before beginning installation or upgrade, you must log in with the domain services account credentials.
Windows Server 2008 x64
Windows Server 2008 x86
Windows Server 2003
Windows Server 2008 R2
Make a complete back up prior to upgrading. Follow the installation instructions in the DDP|E Enterprise Server Installation and Migration Guide.

Reboot will be required

Drivers help and tutorials