Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

Client Firewall and Web Protection

  • To successfully install Client Firewall and Web Protection, the computer must have network connectivity.
  • Uninstall other vendors' anti-virus, anti-malware, anti-spyware, and firewall applications before installing the Client Firewall and Web Protection clients to prevent installation failures. Conflicting software does not include Windows Defender and Endpoint Security Suite Enterprise.
  • The master installer installs these components if not already installed on the target computer. When using the child installer, you must install these components before installing Client Firewall and Web Protection.

    Prerequisite

    • Visual C++ 2012 Update 4 Redistributable Package (x86 and x64)
    • Visual C++ 2015 or later Redistributable Package (x86 and x64)

  • The Web Protection feature is supported with the following browsers:
    Browser Web Protection Support Version
    Google Chrome Yes All Modern Versions
    Microsoft Edge Yes Microsoft Edge is supported with Endpoint Security Suite Enterprise v10.1 and later
    Microsoft Internet Explorer 11 Yes All Modern Versions
    Mozilla Firefox Yes
    • Firefox 56 and later is supported with Endpoint Security Suite Enterprise v10.0 and later
    • Firefox 51 is supported with Endpoint Security Suite Enterprise v1.8 and later

Ports

  • To ensure that Client Firewall and Web Protection receives the most current Client Firewall and Web Protection updates, ports 443 and 80 must be available for the client to communicate with the various destination servers. If the ports are blocked for any reason, anti-virus signature updates (DAT files) cannot be downloaded, so computers may not have the most current protection. Ensure that client computers can access the URLs, as follows.

    Use

    Application Protocol

    Transport Protocol

    Port Number

    Destination

    Direction

    Reputation Service

    SSL

    TCP

    443

    tunnel.web.trustedsource.org

    Outbound

    Reputation Service Feedback

    SSL

    TCP

    443

    gtifeedback.trustedsource.org

    Outbound

    URL Reputation Database Update

    HTTP

    TCP

    80

    list.smartfilter.com

    Outbound

    URL Reputation Lookup

    SSL

    TCP

    443

    tunnel.web.trustedsource.org

    Outbound

Operating Systems

  • The following table details supported operating systems.

    Windows Operating Systems (32- and 64-bit)

    • As of January 2020, SHA1 signing certificates are no longer valid and cannot be renewed. Devices running Windows Server 2008 R2 must install Microsoft KBs https://support.microsoft.com/help/4474419 and https://support.microsoft.com/help/4490628 to validate SHA256 signing certificates on applications and installation packages.

      Applications and installation packages signed with SHA1 certificates will function but an error will display on the endpoint during installation or execution of the application without these updates installed

    • Windows 10: Education, Enterprise, Pro v1909-v22H2 (November 2019 Update/19H2 - November 2022 Update/22H2)

      Note: OEMs and ODMs do not ship Windows 10 v2004 (May 2020 Update/20H1 and later) with 32-bit architecture. For more information, see https://docs.microsoft.com/windows-hardware/design/minimum/minimum-hardware-requirements-overview.

      • Windows 10 2019 LTSC
      • Windows 10 2021 LTSC
    • Windows 11: Enterprise, Pro v21H2 - 22H2

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\