Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Getting Started Dell Data Security Implementation Services

Implementation Phases

The basic implementation process includes these phases:

  • Perform Kick-off and Requirements Review
  • Complete Preparation Checklist - Initial Implementation or Preparation Checklist - Upgrade/Migration
  • Install or Upgrade/Migrate one of the following:

    • Security Management Server
      • Centralized management of devices
      • A Windows-based application that runs on a physical or virtualized environment.
    • Security Management Server Virtual
      • Centralized management of up to 3,500 devices
      • Runs in a virtualized environment

      For Dell Server installation/migration instructions, see Security Management Server Installation and Migration Guide or Security Management Server Virtual Quick Start and Installation Guide. To obtain these documents, see Dell Data Security Server documents.

  • Configure Initial Policy

    • Security Management Server - see Security Management Server Installation and Migration Guide, Administrative Tasks, available on support.dell.com and AdminHelp, available from the Management Console
    • Security Management Server Virtual - see Security Management Server Virtual Quick Start and Installation Guide, Management Console Administrative Tasks, available on support.dell.com and AdminHelp, available from the Management Console
  • Client Packaging

    For client requirements and software installation documents, select the applicable documents based on your deployment:

    • Encryption Enterprise Basic Installation Guide or Encryption Enterprise Advanced Installation Guide
    • Endpoint Security Suite Enterprise Basic Installation Guide or Endpoint Security Suite Enterprise Advanced Installation Guide
    • Advanced Threat Prevention Administrator Guide
    • Encryption Personal Installation Guide
    • Encryption Enterprise for Mac Administrator Guide
    • Endpoint Security Suite Enterprise for Mac Administrator Guide
    • To obtain these documents, refer to Dell Data Security client documents.

  • Participate in Dell security administrator basic knowledge transfer
  • Implement Best Practices
  • Coordinate pilot or deployment support with Dell Client Services


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\