Overview: Seqrite Encryption Manager and Seqrite Volume Encryption both work together to perform seamless encryption and decryption process. In this article, client software provides a wide range of data protection solutions on local and remote workstations. Users can store files and folders in encrypted containers, and encrypt entire disk volumes, we will go through different methods to deploy the SVE clients in the local network and remote location and through active directory as well.
Applicable Versions:
Windows 7, 8, and 10 32 & 64 bit (Max version support build 20H2)
Windows server 2008, 2012 and 2016, 2019 64-bit (Max version support build 1903)
Below are the steps for deploying SVE clients
Before installing SEM Client(Using SEM client installer manually) on any operating system machine. It’s mandatory to run the Pre-check tool and run the initial scan for requirements on the machine.
The result after the scan is displayed below:
Methods to deploy SVE on the computers
There is a different method with which you can deploy SVE application on client computers:
1. Download and run the SEM Agent on the client's computer.
2 Download and run the Remote Installation Tool and then add the computers.
3. Sync with Active Directory groups to deploy SVE.
Method 1:
Download SEM Agent
This process is beneficial when you want to install the SVE client application on a single computer.
Downloading SEM Agent
To add a computer to the database with the SEM agent, follow these steps:
1. Log on to the SEM console.
2. On the company page, click Add Computer.
3. In the new dialog, click the Download button for the installer.
4. The SEM Agent installer will be downloaded automatically on the endpoint Management.
5. The name of the file has the following format:
jci_setup__JCM_SERVER_IP_PORT_NUMBER_COMPANY_ID__.exe
For example:
jci_setup__192.168.3.103_8443_102__.exe
Note: Do not rename the downloaded file
6. Run the downloaded .exe file on the target computer that is to be encrypted.
7. After the successful installation of SEM Agent, the computer name should appear in the New Computers group.
8. If the new computer should be added to another group, the “jci_setup..” file should be run from Command Prompt with the parameter -G and the group name in the following format:
>jci_setup__207.154.213.48_8443_10002__.exe -G#MY GROUP NAME#
If the group does not exist, the group will be created automatically, and the default encryption policy will be assigned.
Method 2:
Remote Installation Tool:
Seqrite Remote Installation Tool is an integrated solution within Seqrite Encryption Manager. This solution eases the deployment of the Seqrite Volume Encryption client on all the supported Windows operating systems (OS). It also eases the deployment across multiple endpoints at a time.
The screenshot below shows the Remote Installation tool:
Adding computers with Remote Installation Tool
1. Log on to the SEM console.
2. On the Company page, click Add Computer.
3. In the new window, click the Download button for the Remote Installation Tool.
4. The Remote Installation Tool is downloaded.
5. In the Remote Installer dialog, add the SEM Server URL.
The system checks for the correct format. For example https://sem_server_ip:port
6. Enter the Group Name.
Note: The group name should not be similar to the Company name.
7. Add in the Endpoint Name. You can add computers either with the help of the computer name or its IP address.
In the Remote Install dialog, you can initiate remote installation in one of the following ways:
Remote Installation by computer name
1. Under Network Places, select an endpoint, and then click Add. You can select multiple numbers of endpoints. You can also search for an endpoint with the Find option. Any endpoint in your network can be searched.
2. To add an endpoint, provide the user credentials of the target endpoint, having administrator rights.
3. In the Enter Network Password dialog, type the User Name and Password of the target endpoint and then click OK. Repeat these steps for all the endpoints that you have selected.
4. If the entered user credentials are correct, the target endpoints appear in the Endpoints selected to protect list.
In case, if you forget or provide incorrect user credentials for an endpoint, you can click the Skip button and move to the next endpoint and provide its user credentials.
Remote Installation by IP Address
1. Click the Add by IP Address button.
2. In the Add Endpoints by IP Address dialog, select one of the following options:
Add by IP Address Range: If you select this option, provide a range of IP Addresses in the Start IP Address and the End IP Address text box. This is helpful if you want to install the Seqrite Encryption client on a number of endpoints which are available in serial IP Address range at one go.
3. Add by IP Address: If you select this option, you need to provide the IP Address of the target endpoint.
4. Enter the IP Address and then click next.
For all the endpoints on which you want to install the Seqrite Encryption client, you must provide the user credentials using the User Accounts option.
5. In the Add Endpoints by Address dialog, click Add.
The Add User dialog appears.
6. In the Add User dialog, type the User Name and Password, and then click OK. The user account is added in the User Accounts list.
Repeat this for all the endpoints on which you want to install the Seqrite Encryption client. You can delete the user account if required. To delete the user account, select the user account and click Delete.
7. Click Finish.
All the endpoints are added to the Endpoints selected to protect the list.
8. Select the endpoints from the list and click Install.
Note: The Remote Install feature is available only for clients with Windows operating systems
Method 3:
Importing Active Directory
You can import the Active Directory and sync the group with it.
1. Log on to the SEM console.
2. In the Computer and Groups section, click Add > Manage active directory.
3. To exclude any computer from the installation of the SVE client, click Exclusion.
4. In Excluded computer dialog, select the options with which you want to exclude the computers; Exclude by Host Name, exclude by IP address, and Exclude by IP Range.
5. Depending on your selection, the next field changes. Add in the required information and click Add.
6. The information gets listed in the Excluded endpoints list. You can delete a single computer or use Delete All to delete all the listed computers in the excluded computers list.
7. Click Save.
8. In the Domain Authentication section, add parent domain credentials such as URL, user name, and password, and then click next.
For example ldap://example.com:3268
Select Domain and then click Next.
Add in domain authentication credentials: user name and password.
9. Active Directory is loaded. Select the group or computer(s) and click next.
10. In the Settings section, select the check box to automatically install the SVE client software on the new computers added to a group, and then click next.
11. In the Settings section, set the time interval for the SEM console to synchronize with the Active Directory container and click Finish.
On the confirmation screen, click OK.
Please contact Seqrite Technical Support for more assistance.