Перейти к основному содержимому
  • Простое и быстрое размещение заказов
  • Просмотр заказов и отслеживание состояния доставки
  • Создание списка продуктов и доступ к нему

How to Install Dell Data Protection Enterprise Edition Server

Сводка: This article covers the basic installation process for Dell Data Protection Enterprise Edition Server.

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Инструкции


Affected Products:

  • Dell Data Protection Enterprise Edition Server

Affected Versions:

  • v8.0.0 to 9.7.0

Click the Dell Data Protection Enterprise Edition Server version for appropriate installation steps. For how to install the latest versions of Dell Security Management Server, reference How to Install Dell Security Management Server. For versioning information, reference How to Identify the Dell Data Security / Dell Data Protection Server Version.

Warning:
  • Before installation, ensure that the environment meets Dell Security Management Server System Requirements.
  • SQL databases configured to use Windows Authentication must use the same Windows account to install Dell Security Management Server.
  • Anti-virus and anti-malware should be disabled while installing or upgrading the Dell Data Protection Enterprise Edition Server to avoid impacting Microsoft C++ runtime installers, Java activities (certificate creation and manipulation), and PostgreSQL modifications. Executables or scripts initiate all of these items.
    • As a workaround, exclude:
      • [INSTALLATION PATH]:\Dell\Enterprise Edition
      • C:\Windows\Installer
      • The file path from which the installer is run.
Note:
  • This article only covers a new back-end deployment of Dell Data Protection Enterprise Edition Server.
  • Client Services is required for more complex or custom deployments of Dell Data Protection Enterprise Edition Server. Client Service engagements can be purchased through your sales representative.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the installers directory of the extracted folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to Installers\Enterprise Server\x64 and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Verify Back End Install (Full Enterprise Server Installation) is selected and then click Next.

Back end Install option

  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location screen

  1. Select either:
    1. Import an existing certificate and then go to Step 13.
    2. Create a self-signed certificate and import it to key store and then go to Step 14.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 15.

Existing certificate import process

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 15.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 16.
    2. Create a self signed certificate and import it to key store and then go to Step 17.

Installer server encryption certificate options

Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 18.

Existing certificate import process

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 18.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 19.
    2. Optionally, click Edit Ports and go to Step 20.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 21.

Server install setup screen

  1. If Edit Hostnames was clicked (Step 18), optionally, change hostnames and then click OK to return to Step 18.

Edit hostnames screen

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 12).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 18), optionally, change ports, click OK, and return to Step 18.

Edit ports screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a port.
    3. Select either Windows authentication or SQL server authentication.
    4. If SQL server authentication was selected, populate a Login ID and Password.
    5. Populate the database catalog name.
    6. Click Next.

Database server and install-time credentials screen

Note:
  • If a port is not specified, the default SQL Server port of 1433 is used.
  • Install-time credentials require the account chosen to have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  • If a database server and authentication is populated, but a database catalog name is given that does not exist, the Dell Enterprise Server installer prompts to create that database for you. Click Yes to create the database, or No to return to Step 21.
  • The database server and database catalog will differ in your environment.
  1. Populate a User name and Password for the service account Dell services will use to access SQL and then click Next.

Database and service runtime information screen

Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Optionally, check Launch Remote Management Console and then click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to Installers\Enterprise Server\x64 and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Verify Back End Install (Full Enterprise Server Installation) is selected and then click Next.

Back end Install option

  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location screen

  1. Select either:
    1. Import an existing certificate and then go to Step 13.
    2. Create a self signed certificate and import it to key store and then go to Step 14.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 15.

Existing certificate import process

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 15.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 16.
    2. Create a self signed certificate and import it to key store and then go to Step 17.

Installer server encryption certificate options

Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 18.

Existing certificate import process

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 18.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 19.
    2. Optionally, click Edit Ports and go to Step 20.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 21.

Server install setup screen

  1. If Edit Hostnames was clicked (Step 18), optionally, change hostnames and then click OK to return to Step 18.

Edit hostnames screen

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 12).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 18), optionally, change ports, click OK, and return to Step 18.

Edit ports screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select either Windows authentication or SQL server authentication.
    4. If SQL server authentication was selected, populate a Login ID and Password.
    5. Populate the database catalog name.
    6. Click Next.

Database server screen

Note:
  • If a port is not specified, the default SQL Server port of 1433 is used.
  • Install-time credentials require the account chosen to have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  • If a database server and authentication is populated, but a database catalog name is given that does not exist, the Dell Enterprise Server installer prompts to create that database for you. Click Yes to create the database, or No to return to Step 21.
  • The database server and database catalog will differ in your environment.
  1. Populate a User name and Password for the service account Dell services will use to access SQL and then click Next.

Service runtime account information screen

Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Optionally, check Launch Remote Management Console and then click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to Installers\Enterprise Server\[BIT] and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

Note: [BIT] = x64 or x86
  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Verify Back End Install (Full Enterprise Server Installation) is selected and then click Next.

Back end Install option

  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location screen

  1. Select either:
    1. Import an existing certificate and then go to Step 13.
    2. Create a self signed certificate and import it to key store and then go to Step 14.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 15.

Existing certificate import proces

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 15.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 16.
    2. Create a self signed certificate and import it to key store and then go to Step 17.
    3. Re-use SSL certificate for SSOS and then go to Step 18.

Installer server encryption certificate options

Note:
  • This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  • If server encryption is not being used, Re-use SSL certificate for SSOS may be selected.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 18.

Existing certificate import process

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 18.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 19.
    2. Optionally, click Edit Ports and go to Step 20.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 21.

Server install setup screen

  1. If Edit Hostnames was clicked (Step 18), optionally, change hostnames and then click OK to return to Step 18.

Edit hostnames screen

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 12).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 18), optionally, change ports, click OK, and return to Step 18.

Edit ports screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select either Windows authentication or SQL server authentication.
    4. If SQL server authentication was selected, populate a Login ID and Password.
    5. Populate the database catalog name.
    6. Click Next.

Database server screen

Note:
  • If a port is not specified, the default SQL Server port of 1433 is used.
  • Server authentication is SQL Server authentication.
  • If server authentication is selected, go to Step 23.
  • The credentials chosen to connect with must have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  • If a database server and authentication is populated, but a database catalog name is given that does not exist, the Dell Enterprise Server installer prompts to create that database for you. Click Yes to create the database, or No to return to Step 21.
  • The database server and database catalog will differ in your environment.
  1. If Windows authentication was used (Step 21), populate a User name and Password for the domain service account to access SQL and then click Next.

Service startup account information screen

Note:
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Optionally, check Launch Remote Management Console and then click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to Installers\Enterprise Server\[BIT] and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

Note: [BIT] = x64 or x86
  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Verify Back End Install (Full Enterprise Server Installation) is selected and then click Next.

Back end Install option

  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location screen

  1. Select either:
    1. Import an existing certificate and then go to Step 13.
    2. Create a self signed certificate and import it to key store and then go to Step 14.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 15.

Existing certificate import process

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 15.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 16.
    2. Optionally, click Edit Ports and go to Step 17.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 18.

Server install setup screen

  1. If Edit Hostnames was clicked (Step 15), optionally, change hostnames and then click OK to return to Step 15.

Edit hostnames screen

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 12).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 15), optionally, change ports, click OK, and return to Step 15.

Edit ports screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Select either Windows authentication or Server authentication.
    3. If Server authentication was selected, populate a Login ID and Password.
    4. Populate the database catalog name.
    5. Click Next.

Database server credentials screen

Note:
  • Server authentication is SQL server authentication.
  • If server authentication is selected, go to Step 20.
  • The credentials chosen to connect with must have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  • If a database server and authentication is populated, but a database catalog name is given that does not exist, the Dell Enterprise Server installer prompts to create that database for you. Click Yes to create the database, or No to return to Step 18.
  • The database server and database catalog will differ in your environment.
  1. If Windows authentication was used (Step 18), populate a User name and Password for the domain service account to access SQL and then click Next.

Service startup account information screen

Note:
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Optionally, check Launch Remote Management Console and then click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to Installers\Enterprise Server\[BIT] and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

Note: [BIT] = x64 or x86
  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Verify Complete is selected and then click Next.

Complete install option

  1. Optionally, change host names or ports being used from the defaults and then click Next.

Set host and port data screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  • The hostname that is used must match the server name that is referenced in the certificate (Step 14).
  • The hostnames in the screenshot examples will differ in your environment.
  1. Optionally, change host names or ports being used from the defaults and then click Next.

Set back end server configuration screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  • The hostname that is used must match the server name that is referenced in the certificate (Step 14).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If a prompt about IIS is received, click Ignore to continue.

IIS prompt

  1. Select either:
    1. Import an existing certificate and then go to Step 15.
    2. Create a self signed certificate and import it to key store and then go to Step 16.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 17.

Existing certificate import process

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 17.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Dell Data Protection | Enterprise Edition Server must be configured. For more information, reference How to Configure the Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. Copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note:
  1. Go to \Enterprise Server\[BIT] and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

Note: [BIT] = x64 or x86
  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Verify Complete is selected and then click Next.

Complete install option

  1. Optionally, change host names or ports being used from the defaults and then click Next.

Set host and port data screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  • The hostname that is used must match the server name that is referenced in the certificate (Step 14).
  • The hostnames in the screenshot examples will differ in your environment.
  1. Optionally change host names or ports being used from the defaults and then click Next.

Back end server configuration screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  • The hostname that is used must match the server name that is referenced in the certificate (Step 14).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If a prompt about IIS is received, click Ignore to continue.

IIS prompt

  1. Select either:
    1. Import an existing certificate and then go to Step 15.
    2. Create a self signed certificate and import it to key store and then go to Step 16.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 17.

Existing certificate import process

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 17.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Dell Data Protection | Enterprise Edition Server must be configured. For more information, reference How to Configure the Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Right-click and Extract the server software.

Extract All option selected

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. Copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note:
  1. Go to Installers\Enterprise Server\[BIT] and then double-click setup.exe.

Dell Data Protection Enterprise Edition Server installer icon

Note: [BIT] = x64 or x86
  1. Select the language and then click OK.

Installer language selection

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example of missing requirements

Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  1. Click Next.

Dell Data Protection Enterprise Edition Server welcome screen

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

Dell Data Protection Enterprise Edition Server EULA screen

  1. Click Next.

Installer product key field

Note: The product key is autopopulated (Step 2).
  1. Optionally, Change the install directory and then click Next.

Dell Data Protection Enterprise Edition Server destination folder screen

  1. Verify Complete is selected and then click Next.

Complete install option

  1. Optionally, change host names or ports being used from the defaults and then click Next.

Host and port data screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  • The hostname that is used must match the server name that is referenced in the certificate (Step 14).
  • The hostnames in the screenshot examples will differ in your environment.

 

  1. Optionally, change host names or ports being used from the defaults and then click Next.

Back end server configuration screen

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  • The hostname that is used must match the server name that is referenced in the certificate (Step 14).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If a prompt about IIS is received, click Ignore to continue.

IIS prompt

  1. Select either:
    1. Import an existing certificate and then go to Step 15.
    2. Create a self signed certificate and import it to key store and then go to Step 16.

Installer certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 17.

Existing certificate import process

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 17.

Self-signed certificate process

Note: All fields that are populated in the example above may differ in your environment.
  1. Click Install.

Dell Data Protection Enterprise Edition Server ready to install screen

  1. Click Finish.

Dell Data Protection Enterprise Edition Server InstallShield Wizard Completed screen

Note: Upon completion, the Dell Data Protection | Enterprise Edition Server must be configured. For more information, reference How to Configure the Dell Security Management Server / Dell Data Protection Enterprise Edition Server.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

 

Затронутые продукты

Dell Encryption
Свойства статьи
Номер статьи: 000196616
Тип статьи: How To
Последнее изменение: 28 Apr 2023
Версия:  4
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.