Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.

Endpoint Security Suite Pro Advanced Installation Guide v1.8

PDF

Install Interactively Using the Master Installer

  • The Endpoint Security Suite Promaster installer can be located at:

    • From Your Dell FTP Account - Locate the installation bundle at Endpoint-Security-Suite-Pro_Ent-1.x.x.xxx.zip
  • Use these instructions to install Endpoint Security Suite Pro interactively using the Endpoint Security Suite Promaster installer. This method can be used to install the suite of products on one computer at a time.
  1. Locate DDSSuite.exe in the Dell installation media. Copy it to the local computer.
  2. Double-click to launch the installer. This may take several minutes.
  3. Click Next in the Welcome dialog.
  4. Read the license agreement, accept the terms, and click Next.
  5. In the Enterprise Server Name field, enter the fully qualified host name of the Security Management Server/ Security Management Server Virtual that will manage the target user, such as server.organization.com.

    In the Device Server URL field, enter the URL of the Device Server (Security Server) with which the client will communicate.

    The format is https://server.organization.com: 8443/xapi / (including trailing forward slash).

    Click Next.

  6. Click Next to install the product in the default location of C:\Program Files\Dell\Dell Data Protection\. Dell recommends installing in the default location only, as problems may arise when installing in other locations.
  7. Select the components to be installed.

    Security Framework installs the underlying security framework and Advanced Authentication, the advanced authentication client that manages multiple authentication methods, including PBA and credentials such as fingerprints and passwords.

    Advanced Authentication installs the files and services required for Advanced Authentication.

    Encryption installs the Encryption client, the component that enforces security policy, whether a computer is connected to the network, disconnected from the network, lost, or stolen.

    Threat Protection installs the Threat Protection clients, which are malware and antivirus protection to scan for viruses, spyware, and unwanted programs, client firewall to monitor communication between the computer and resources on the network and the Internet, and web filtering to display safety ratings or block access to websites during online browsing.

    BitLocker Manager installs the BitLocker Manager client, designed to enhance the security of BitLocker deployments by simplifying and reducing the cost of ownership through centralized management of BitLocker encryption policies.

    Advanced Threat Prevention installs the Advanced Threat Prevention client, which is next-generation antivirus protection that uses algorithmic science and machine learning to identify, classify, and prevent both known and unknown cyberthreats from executing or harming endpoints.

    • NOTE: Threat Protection and Advanced Threat Prevention cannot reside on the same computer. The installer automatically prevents the selection of both components. Should you wish to install Advanced Threat Prevention, download the Endpoint Security Suite EnterpriseAdvanced Installation Guide for instructions.
    • NOTE: If the installer detects a Windows version later than Anniversary Update (Redstone 1), the Threat Protection option does not display.

    Click Next when your selections are complete.

  8. Click Install to begin the installation. Installation will take several minutes.
  9. Select Yes, I want to restart my computer now and click Finish.

    Installation is complete.


Évaluez ce contenu

Précis
Utile
Facile à comprendre
Avez-vous trouvé cet article utile ?
0/3000 characters
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez indiquer si l’article a été utile ou non.
  Les commentaires ne doivent pas contenir les caractères spéciaux : <>()\