跳转至主要内容

Getting Started Dell Data Security Implementation Services

Implementation Phases

The basic implementation process includes these phases:

  • Perform Kick-off and Requirements Review
  • Complete Preparation Checklist - Initial Implementation or Preparation Checklist - Upgrade/Migration
  • Install or Upgrade/Migrate one of the following:

    • Security Management Server
      • Centralized management of devices
      • A Windows-based application that runs on a physical or virtualized environment.
    • Security Management Server Virtual
      • Centralized management of up to 3,500 devices
      • Runs in a virtualized environment

      For Dell Server installation/migration instructions, see Security Management Server Installation and Migration Guide or Security Management Server Virtual Quick Start and Installation Guide. To obtain these documents, see Dell Data Security Server documents.

  • Configure Initial Policy

    • Security Management Server - see Security Management Server Installation and Migration Guide, Administrative Tasks, available on support.dell.com and AdminHelp, available from the Management Console
    • Security Management Server Virtual - see Security Management Server Virtual Quick Start and Installation Guide, Management Console Administrative Tasks, available on support.dell.com and AdminHelp, available from the Management Console
  • Client Packaging

    For client requirements and software installation documents, select the applicable documents based on your deployment:

    • Encryption Enterprise Basic Installation Guide or Encryption Enterprise Advanced Installation Guide
    • Endpoint Security Suite Enterprise Basic Installation Guide or Endpoint Security Suite Enterprise Advanced Installation Guide
    • Advanced Threat Prevention Administrator Guide
    • Encryption Personal Installation Guide
    • Encryption Enterprise for Mac Administrator Guide
    • Endpoint Security Suite Enterprise for Mac Administrator Guide
    • To obtain these documents, refer to Dell Data Security client documents.

  • Participate in Dell security administrator basic knowledge transfer
  • Implement Best Practices
  • Coordinate pilot or deployment support with Dell Client Services


对此内容评级

准确性
有用性
易理解性
这篇文章对您有帮助吗?
0/3000 characters
  请提供评级(1-5星)。
  请提供评级(1-5星)。
  请提供评级(1-5星)。
  请选择这篇文章是否有帮助。
  注释中不得包含以下特殊字符:<>()\