Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

SED Troubleshooting

Use the Initial Access Code

  • This policy is used to log on to a computer when network access is unavailable. Meaning, access to the Dell Server and AD are both unavailable. Only use the Initial Access Code policy if absolutely necessary. Dell does not recommend this method to log in. Using the Initial Access Code policy does not provide the same level of security as the usual method of logging in using user name, domain, and password.

    In addition to being a less secure method of logging in, if a user is activated using the Initial Access Code, then there is no record on the Dell Server of that user activating on this computer. In turn, there is no way to generate a Response Code from the Dell Server for the user if they fail password and self help questions.

  • The Initial Access Code can only be used one time, immediately after activation. After an end user has logged in, the Initial Access Code will not be available again. The first domain login that occurs after the Initial Access Code is entered will be cached, and the Initial Access Code entry field will not display again.
  • The Initial Access Code only displays under the following conditions:

    • A user has never activated inside the PBA.
    • The client has no connectivity to the network or Dell Server.

Use Initial Access Code

  1. Set a value for the Initial Access Code policy in the Management Console.
  2. Save and commit the policy.
  3. Start the local computer.
  4. Enter the Initial Access Code when the Access Code screen displays.
  5. Click the blue arrow.
  6. Click OK when the Legal Notice screen displays.
  7. Log in to Windows with the user credentials for this computer. These credentials must be part of the domain.
  8. After logging in, open the Data Security Console and verify that the PBA user was successfully created.

    Click Log in the top menu and look for the message Created PBA user for <DOMAIN\Username>, which indicates the process was successful.

  9. Shut down and restart the computer.
  10. At the login screen, enter the user name, domain, and password that was previously used to log in to Windows.

    You must match the user name format that was used when creating the PBA user. Thus, if you used the format DOMAIN\Username, you must enter DOMAIN\Username for the Username.

  11. Click Login when the Legal Notice screen displays.

    Windows now launches and the computer can be used as usual.

Create a PBA Log File for Troubleshooting

  • There may be cases when a PBA log file is needed for troubleshooting PBA issues, such as:

    • You are unable to see the network connection icon, yet you know there is network connectivity. The log file contains DHCP information to resolve the issue.
    • You are unable to see the Dell Server connection icon. The log file contains information to help diagnose connectivity issues.
    • Authentication fails even when entering correct credentials. The log file used with the Dell Server Server logs can help diagnose the issue.

Capture Logs When Booting Into the PBA (Legacy PBA)

  1. Create a folder on a USB drive and name it \CredantSED, at the root level of the USB drive.
  2. Create a file named actions.txt and place it in the \CredantSED folder.
  3. In actions.txt, add the line:

    get logs
  4. Save and close the file.

    Do not insert the USB drive when the computer is powered down. If the USB drive is already inserted during the shutdown state, remove the USB drive.

  5. Power on the computer reproduce the issue. Insert the USB drive into the computer that the logs are to be collected from during this step.
  6. After inserting the USB drive, wait for 5-10 seconds, then remove the drive.

    A credpbaenv.tgz file is created in the \CredantSED folder that contains the needed log files.

Capture Logs When Booting Into the PBA (UEFI PBA)

  1. Create a file called PBAErr.log at the root level of the USB drive.
  2. Insert the USB drive before powering on the computer.
  3. Remove the USB drive after reproducing the issue requiring the logs.

The PBAErr.log file is updated and written in real-time.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\