This article provides the steps for adding entitlements for Dell Data Security (formerly Dell Data Protection).
Entitlements are software licenses that are used to validate and download associated software.
Dell Data Security Entitlements are available for:
Disk Encryption (DE):
Advanced Threat Protection (ATP):
Threat Protection (TP):
Cloud Edition (CE):
Personal Edition (PE):
BitLocker Manager (BLM):
Mobile Edition (ME):
Dell Data Security Entitlements are available to purchase:
To validate on the box entitlements, outbound traffic must be opened for:
Destination | Protocol | Port |
---|---|---|
cloud.dell.com | HTTPS | TCP 443 |
Alternatively, an existing HTTP/HTTPS proxy server may be used in place of direct connectivity through the firewall.
Entitlements managed by Dell Security Management Server (formerly Dell Data Protection | Enterprise Edition) or Dell Security Management Server Virtual (formerly Dell Data Protection | Virtual Edition) allow for an overage of:
Once the overage limit is reached, new activations fail until either new entitlements are acquired or entitlements are removed from existing clients.
Example: The customer has purchased and installed 300 entitlements for product X. Customer can activate product x on:
An entitlement can be added:
Click the appropriate option for more information.
On the box licenses are added to the server when an endpoint activates. The added licenses are listed in the administration console within the On the Box Licenses tab of License Management.
If licenses cannot be added by this method, then on the box licenses can be imported in bulk from a .csv file.
Dell Digital Delivery pulls all entitlements that are associated with a Dell hardware service tag.
If a Dell Data Security entitlement is detected by Dell Digital Delivery, then the product is available to install through the UI (user interface).
To view the entitlement key within the Dell Digital Delivery UI, click the (
i
button) to the right of the software package.
HKLM\Software\Dell\Dell Data Protection\Entitlement
.HKLM\Software\Dell\Dell Data Protection
REG_SZ
(String): Server
Value: Fully Qualified Domain Name of Server
regedit
and then press OK. This opens the Registry Editor.HKEY_LOCAL_MACHINE\Software\
.HKEY_LOCAL_MACHINE\Software\Dell\
path does not exist, go to Step 4A. If the path does exist, go to Step 5.
HKEY_LOCAL_MACHINE\Software
, right-click the Software folder, select New, and then click Key. Name the key Dell
.HKEY_LOCAL_MACHINE\Software\Dell\Dell Data Protection\
path does not exist, go to Step 5A. If the path does exist, go to Step 6.
HKEY_LOCAL_MACHINE\Software\Dell
, if the Dell Data Protection
key does not exist, right-click the Dell
folder, select New, and then click Key. Name the key Dell Data Protection.HKEY_LOCAL_MACHINE\Software\Dell\Dell Data Protection\Entitlement
path does not exist, go to Step 6A. If the path does exist, go to Step 7.
HKEY_LOCAL_MACHINE\Software\Dell\Dell Data Protection
, if the Entitlement
key does not exist, right-click the Dell Data Protection
folder, select New, and then click Key. Name the key Entitlement.Entitlement
folder, select New, and then click String Value.SaEntitlement
.SaEntitlement
.On Dell Encryption Personal v8.15 and later, an entitlement may be added during the installation of the product. For versions earlier than 8.15, go to the Registry section.
During installation, when selecting a management type, select Personal Edition, and then populate the Entitlement Key.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.