To complete
Advanced Threat Prevention installation when the
Dell Server managing the client is running in Connected mode (default), the computer must have network connectivity. However, network connectivity is
not required for
Advanced Threat Prevention installation when the managing
Dell Server is running in Disconnected mode.
To provision a tenant for
Advanced Threat Prevention, the
Dell Server must have Internet connectivity.
The optional Client Firewall and Web Protection features should
not be installed on client computers that are managed by
Dell Server running in Disconnected mode.
Other vendors' antivirus, antimalware, and antispyware applications may conflict with the
Advanced Threat Prevention client. If possible, uninstall these applications. Conflicting software does not include Windows Defender. Firewall applications are allowed.
If uninstalling other antivirus, antimalware, and antispyware applications is not possible, you must add exclusions to
Advanced Threat Prevention in the
Dell Server and also to the other applications. For instructions on how to add exclusions to
Advanced Threat Prevention in the
Dell Server, see KB article
126745. For a list of exclusions to add to the other antivirus applications, see KB article
126118.
Operating Systems
The following table details supported operating systems.
Applications and installation packages signed with SHA1 certificates will function but an error will display on the endpoint during installation or execution of the application without these updates installed
Windows 10: Education, Enterprise, Pro v1909-v22H2 (November 2019 Update/19H2 - November 2022 Update/22H2)
Windows Server 2008 R2 SP1: Standard Edition, Datacenter Edition, Enterprise Edition, Webserver Edition
Windows Server 2012 R2: Standard Edition, Essentials Edition, Datacenter Edition
Windows Server 2016: Standard Edition, Essentials Edition, Datacenter Edition
Windows Server 2019: Standard Edition, Datacenter Edition
Ports
The
Advanced Threat Prevention agents are managed by and report to the management console SaaS platform. Port 443 (https) is used for communication and must be open on the firewall for the agents to communicate with the console. The console is hosted by Amazon Web Services and does not have any fixed IPs. If port 443 is blocked for any reason, updates cannot be downloaded, so computers may not have the most current protection. Ensure that client computers can access the URLs, as follows.
Use
Application Protocol
Transport Protocol
Port Number
Destination
Direction
All Communication
HTTPS
TCP
443
Allow all https traffic to *.cylance.com
Outbound
For detailed information regarding the URLs in use, see KB article
127053.
BIOS Image Integrity Verification
If the
Enable BIOS Assurance policy is selected in the Management Console, the Cylance tenant validates a BIOS hash on endpoint computers to ensure that the BIOS has not been modified from the Dell factory version, which is a possible attack vector. If a threat is detected, a notification is passed to the
Dell Server and the IT administrator is alerted in the Management Console. For an overview of the process, see
BIOS Image Integrity Verification Process.
NOTE:A custom factory image cannot be used with this feature, as the BIOS has been modified.
Dell Computer Models supported with BIOS Image Integrity Verification
Latitude 3470
Latitude 3570
Latitude 7275
Latitude 7370
Latitude E5270
Latitude E5470
Latitude E5570
Latitude E7270
Latitude E7470
Latitude Rugged 5414
Latitude Rugged 7214 Extreme
Latitude Rugged 7414
OptiPlex 3040
OptiPlex 3240
OptiPlex 5040
OptiPlex 7040
OptiPlex 7440
Precision Mobile Workstation 3510
Precision Mobile Workstation 5510
Precision Workstation 3620
Precision Workstation 7510
Precision Workstation 7710
Precision Workstation T3420
Venue 10 Pro 5056
Venue Pro 5855
Venue XPS 12 9250
XPS 13 9350
XPS 9550
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\