Siirry pääsisältöön
  • Tee tilauksia nopeasti ja helposti
  • Tarkastele tilauksia ja seuraa lähetyksen tilaa
  • Luo tuoteluettelo ja käytä sitä

What is Dell Endpoint Security Suite Enterprise?

Yhteenveto: Dell Endpoint Security Suite Enterprise is a cybersecurity suite with automated threat prevention, detection, and response capabilities.

Tämä artikkeli koskee tuotetta Tämä artikkeli ei koske tuotetta Tämä artikkeli ei liity tiettyyn tuotteeseen. Tässä artikkelissa ei yksilöidä kaikkia tuoteversioita.

Oireet

Note:

This guide gives a brief description on the functions and features of Dell Endpoint Security Suite Enterprise.


Affected Products:

Dell Endpoint Security Suite Enterprise

Affected Operating Systems:

Windows
Mac
Linux


Syy

Not applicable.

Tarkkuus

The following are common questions about Dell Endpoint Security Suite Enterprise.

Note: Some questions may redirect you to a different page due to the complexity or length of the answer.

The Advanced Threat Prevention client uses a Client Security Framework plug-in to communicate to the Dell Data Security server through the Core Server service. The Dell Data Security server manages:

  • Activations
  • Policies
  • Product behavior
  • Compliance and Reporting

The Advanced Threat Prevention client simultaneously reaches out directly to the Cylance Tenant. The tenant manages:

  • Threats
  • File Quarantine
  • File Safelist
  • Script Control

Dell Endpoint Security Suite Enterprise product workflow
Figure 1: Dell Endpoint Security Suite Enterprise product workflow

 

All Dell Endpoint Security Suite Enterprise platforms use three phases in threat mitigation:

  • Detection: How a threat is located.
  • Analysis: How a file is identified as a threat.
  • Remediation: How threats are handled.

For a walkthrough on these phases reference How Threats Are Managed in Dell Endpoint Security Suite Enterprise.

The installation file for Dell Endpoint Security Suite Enterprise can be obtained at https://ddpe.credant.com External Link. For more information, reference How to Download Dell Endpoint Security Suite Enterprise.

Note: Dell Endpoint Security Suite Enterprise is not available to download directly from Dell Support as it requires a purchased license.

The master installer version may be identified to verify system requirements and more. For more information, reference How to Identify the Version of the Dell Data Security Master Installer.

Child installers may be extracted from the master installer to install Dell Endpoint Security Suite Enterprise. For more information, reference How to Extract Child Installers from the Dell Data Security Master Installer.

Identifying the version varies by operating system platform. Reference How to Identify the Dell Endpoint Security Suite Enterprise Version for more information.

Dell Endpoint Security Suite Enterprise system requirements vary by operating system. For more information, reference Dell Endpoint Security Suite Enterprise System Requirements.

Windows, Linux, and Mac platforms use the same Advanced Threat Protection (ATP) license. Dell Endpoint Security Suite Enterprise for Mac can only be purchased in volume licenses as on the box (OTB) is exclusive to Dell hardware.

On macOS X El Capitan (10.11.X) and later, System Integrity Protection (SIP) may need to be temporarily disabled. For more information, reference How to Disable System Integrity Protection for Dell Data Security / Dell Data Protection Mac Products.

On macOS High Sierra (10.13.X) and later, Dell Data Security kernel extensions may require approval. For more information, reference How to Allow Dell Data Security Kernel Extensions on macOS.

On macOS Mojave 10.14.5 and later, Full Disk Access is required to protect all data. For more information, reference How to Grant Full Disk Access for Dell Endpoint Security Suite Enterprise or Dell Threat Defense.

Exclusions are written differently dependent upon the type of exclusion to be performed. For more information, reference How to Add Exclusions in Dell Endpoint Security Suite Enterprise.

Files are safe listed in the administration console of Dell Data Security. For more information, reference How to Safe List Files in Dell Endpoint Security Suite Enterprise.

A secure hash algorithm (SHA)-256 may be used in Advanced Threat Protection exclusions. For more information, reference How to Identify a File's SHA-256 Hash for Anti-Virus and Malware Prevention Applications.

Application signing certificates may be added for use with Advanced Threat Prevention. For more information, reference How to Add a Signing Certificate in Dell Endpoint Security Suite Enterprise.

Dell Endpoint Security Suite Enterprise can manually check for policy updates. For more information, reference How to Check for Policy Updates for Dell Data Security / Dell Data Protection.

Debug logging can be enabled to troubleshoot Dell Endpoint Security Suite Enterprise Web Control and Client Firewall features. For more information, reference How to Enable Debug Logging for Dell Endpoint Security Suite Enterprise Web Control and Client Firewall.

Endpoint statuses may be pulled from Windows, Mac, and Linux endpoints for an in-depth review. For more information, reference How to Analyze Dell Endpoint Security Suite Enterprise and Threat Defense Endpoint Status.

Dell Data Security signing certificate information is made available along with the version in which each signing certificate is used. For more information, reference Dell Data Security Signing Certificate Updates.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Lisätietoja

 

Videot

 

Tuotteet, joihin vaikutus kohdistuu

Dell Endpoint Security Suite Enterprise
Artikkelin ominaisuudet
Artikkelin numero: 000129651
Artikkelin tyyppi: Solution
Viimeksi muutettu: 20 jouluk. 2022
Versio:  16
Etsi vastauksia kysymyksiisi muilta Dell-käyttäjiltä
Tukipalvelut
Tarkista, kuuluuko laitteesi tukipalveluiden piiriin.