...it'll be best if we recap a few things.
First off, we'll recap the PBA bypass options:
Permanent Bypass - this can be accomplished by disabling the requirement for users to authenticate to SEE
Temporary Bypass - this is accomplished using the AutoLogon Utility, and can also be used to schedule recurring time windows when PBA will be skipped (e.g. every Wednesday morning between 3am and 5am for 3 reboots).
Ad-hoc Bypass - this is something we've not touched on yet, and is performed using the SEE Reboot Utility (also available in the media under a SEE-RU directory). This is an SEE executable that reboots a Windows machine and bypasses the PBA on that one reboot.
As far as how to apply these options, please see the below:
Both the Permanent and Temporary Bypass options can be managed via policies. The GPO policy option is used for domain integrated endpoints. The SEE Native policy option is used for endpoints that are not on the domain, but are installed with a managed SEE client (and can contact the SEE Management Server).
The Ad-hoc option must be run locally on the encrypted endpoint (usually from a command prompt). This can be scripted, but I would recommended against doing so.
Finally, something else worth noting, is that it is possible to upgrade the SEE-Framework Client, SEE-Full Disk and SEE-Removable Storage all in one go, and only reboot at the end.
I hope that helps!