
Enterprise Server Installation and Migration Guide 5
Getting Started with Dell Data Protection
Implementation Phases
The basic implementation process includes these phases:
• Perform
Kick-off and Requirements Review
• Complete
Preparation Checklist - Initial Implementation
or
Preparation Checklist - Upgrade/Migration
•
Install or Upgrade/Migrate
Dell Enterprise Server
For instructions about client requirements and software installation, see Enterprise Edition Administrator Guide, Personal
Edition Installation Guide, Security Tools Installation Guide, or Enterprise Edition for Mac Administrator Guide.
• Configure Initial Policy (see
Administrative Tasks
)
• Execute Test Plan
• Client Packaging
• Participate in Dell Data Protection Administrator basic knowledge transfer
• Implement Best Practices
• Coordinate Pilot or Deployment Support with Dell Client Services
Kick-off and Requirements Review
Before installation, it is important to understand your environment and the business and technical objectives of your project, to
successfully implement Dell Data Protection | Encryption to meet these objectives. Ensure that you have a thorough
understanding of your organization’s overall data security requirements.
The following are some common key questions to help the Dell Client Services Team understand your environment and
requirements:
1
What is your organization’s type of business (health care, etc)?
2
What regulatory compliance requirements do you have (HIPAA/HITECH, PCI, etc.)?
3
What is the size of your organization (number of users, number of physical locations, etc.)?
4
What is the targeted number of endpoints for the deployment? Are there plans to expand beyond this number in the future?
5
Do end users have “local admin” privileges?
6
What data and devices do you need to manage and encrypt (local fixed disks, USB, etc.)?
7
What products are you considering deploying?
• Enterprise Edition (Windows clients)
• Enterprise Edition (SED clients)
• Authentication
• BitLocker Manager
• Cloud Edition
• External Media Shield (EMS)
• Enterprise Edition (Mac clients)
• Mobile Edition for Android, iOS, and Windows Phone
8
What type of user connectivity does your organization support? Types might include the following:
• Local LAN connectivity only
• VPN-based and/or enterprise wireless users
• Remote/disconnected users (users not connected to the network either directly or via VPN for extended periods of time)
• Non-domain workstations
9
What data do you need to protect at the endpoint? What type of data do typical users have at the endpoint?
Comentários a estes Manuais