Dell Data Protection | Endpoint Security Suite Enterprise for VDI with Citrix® | 08/2016
Contents
1 Introduction .................................................................................................................................................................................. 5
1.1 Purpose ............................................................................................................................................................................. 5
1.2 Scope ................................................................................................................................................................................. 5
1.3 Configuration Prerequisites ............................................................................................................................................ 5
2 Solution Architecture Overview ................................................................................................................................................ 6
2.1 Introduction ....................................................................................................................................................................... 6
2.2 Endpoint Security Suite Enterprise Overview .............................................................................................................. 6
2.3 Dell Enterprise Server Architecture ............................................................................................................................... 8
3 Hardware Components .............................................................................................................................................................. 9
3.1 Network ............................................................................................................................................................................. 9
Dell Networking S4048 (10Gb ToR Switch) ................................................................................................................. 9
3.2 Dell Server ........................................................................................................................................................................ 9
Dell R730 Server .............................................................................................................................................................. 9
Architecture Overview ..................................................................................................................................................... 9
4 Software Components ............................................................................................................................................................. 12
4.1 Software Inventory ......................................................................................................................................................... 12
Server OS ....................................................................................................................................................................... 12
Microsoft SQL Server .................................................................................................................................................... 13
System Center Virtual Machine Manager .................................................................................................................. 13
Citrix ................................................................................................................................................................................. 13
Endpoint Security Suite Enterprise ............................................................................................................................. 13
Certificates ...................................................................................................................................................................... 13
4.2 Dell Enterprise Server Installation ............................................................................................................................... 13
Installation ....................................................................................................................................................................... 13
5 Client Installation ...................................................................................................................................................................... 25
5.1 Advanced Threat Prevention (ATP) Install ................................................................................................................. 25
5.2 Policy-Based Encryption (PBE) Install ........................................................................................................................ 25
5.3 System Data Encryption (SDE) ................................................................................................................................... 25
5.4 Removable Media Encryption (EMS) Install .............................................................................................................. 25
5.5 Authentication ................................................................................................................................................................. 26