Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

Advanced Threat Prevention

  • To complete Advanced Threat Prevention installation when the Dell Server managing the client is running in Connected mode (default), the computer must have network connectivity. However, network connectivity is not required for Advanced Threat Prevention installation when the managing Dell Server is running in Disconnected mode.
  • To provision a tenant for Advanced Threat Prevention, the Dell Server must have Internet connectivity.
  • The optional Client Firewall and Web Protection features should not be installed on client computers that are managed by Dell Server running in Disconnected mode.
  • Other vendors' antivirus, antimalware, and antispyware applications may conflict with the Advanced Threat Prevention client. If possible, uninstall these applications. Conflicting software does not include Windows Defender. Firewall applications are allowed.

    If uninstalling other antivirus, antimalware, and antispyware applications is not possible, you must add exclusions to Advanced Threat Prevention in the Dell Server and also to the other applications. For instructions on how to add exclusions to Advanced Threat Prevention in the Dell Server, see KB article 126745. For a list of exclusions to add to the other antivirus applications, see KB article 126118.

Operating Systems

  • The following table details supported operating systems.

    Windows Operating Systems (32- and 64-bit)

    • As of January 2020, SHA1 signing certificates are no longer valid and cannot be renewed. Devices running Windows Server 2008 R2 must install Microsoft KBs https://support.microsoft.com/help/4474419 and https://support.microsoft.com/help/4490628 to validate SHA256 signing certificates on applications and installation packages.

      Applications and installation packages signed with SHA1 certificates will function but an error will display on the endpoint during installation or execution of the application without these updates installed

    • Windows 10: Education, Enterprise, Pro v1909-v22H2 (November 2019 Update/19H2 - November 2022 Update/22H2)

      Note: OEMs and ODMs do not ship Windows 10 v2004 (May 2020 Update/20H1 and later) with 32-bit architecture. For more information, see https://docs.microsoft.com/windows-hardware/design/minimum/minimum-hardware-requirements-overview.

      • Windows 10 2019 LTSC
      • Windows 10 2021 LTSC
    • Windows 11: Enterprise, Pro v21H2 - 22H2
    • Windows Server 2008 R2 SP1: Standard Edition, Datacenter Edition, Enterprise Edition, Webserver Edition
    • Windows Server 2012 R2: Standard Edition, Essentials Edition, Datacenter Edition
    • Windows Server 2016: Standard Edition, Essentials Edition, Datacenter Edition
    • Windows Server 2019: Standard Edition, Datacenter Edition

Ports

  • The Advanced Threat Prevention agents are managed by and report to the management console SaaS platform. Port 443 (https) is used for communication and must be open on the firewall for the agents to communicate with the console. The console is hosted by Amazon Web Services and does not have any fixed IPs. If port 443 is blocked for any reason, updates cannot be downloaded, so computers may not have the most current protection. Ensure that client computers can access the URLs, as follows.

    Use

    Application Protocol

    Transport Protocol

    Port Number

    Destination

    Direction

    All Communication

    HTTPS

    TCP

    443

    Allow all https traffic to *.cylance.com

    Outbound

For detailed information regarding the URLs in use, see KB article 127053.

BIOS Image Integrity Verification

If the Enable BIOS Assurance policy is selected in the Management Console, the Cylance tenant validates a BIOS hash on endpoint computers to ensure that the BIOS has not been modified from the Dell factory version, which is a possible attack vector. If a threat is detected, a notification is passed to the Dell Server and the IT administrator is alerted in the Management Console. For an overview of the process, see BIOS Image Integrity Verification Process.

NOTE:A custom factory image cannot be used with this feature, as the BIOS has been modified.

Dell Computer Models supported with BIOS Image Integrity Verification

  • Latitude 3470
  • Latitude 3570
  • Latitude 7275
  • Latitude 7370
  • Latitude E5270
  • Latitude E5470
  • Latitude E5570
  • Latitude E7270
  • Latitude E7470
  • Latitude Rugged 5414
  • Latitude Rugged 7214 Extreme
  • Latitude Rugged 7414
  • OptiPlex 3040
  • OptiPlex 3240
  • OptiPlex 5040
  • OptiPlex 7040
  • OptiPlex 7440
  • Precision Mobile Workstation 3510
  • Precision Mobile Workstation 5510
  • Precision Workstation 3620
  • Precision Workstation 7510
  • Precision Workstation 7710
  • Precision Workstation T3420
  • Venue 10 Pro 5056
  • Venue Pro 5855
  • Venue XPS 12 9250
  • XPS 13 9350
  • XPS 9550


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\