Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.

How to Install Dell Encryption Personal

Résumé: Dell Encryption Personal and Dell Data Protection Personal Edition can be installed by following these instructions for either the user interface (UI) or the command line (CLI).

Cet article a peut-être été traduit automatiquement. Si vous avez des commentaires concernant sa qualité, veuillez nous en informer en utilisant le formulaire au bas de cette page.

Contenu de l’article


Symptômes

This article provides the steps for installing Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Versions:

  • v8.0.x and Later

Affected Operating Systems:

  • Windows

Cause

Not applicable

Résolution

Dell Encryption Personal can be installed on Windows through the user interface (UI) or through command-line interface (CLI) switches. Click on the appropriate method for more information.

Note: Dell Encryption Personal must be downloaded and extracted from the Master Installer.

UI

Click on the appropriate client version for specific installation steps. For more information about versioning, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

To install the product by UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption Personal installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Encryption Personal welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Encryption Personal EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Encryption Personal destination folder screen

  1. Select Encryption Personal, populate an Entitlement Key, and then click Next.

Encryption Personal option and the entitlement key field

Note:
  1. Click Install.

Dell Encryption Personal ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Encryption Personal configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption Personal installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Encryption Personal welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Encryption Personal EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Encryption Personal destination folder screen

  1. Select Encryption Personal, populate an Entitlement Key, and then click Next.

Encryption Personal option and the entitlement key field

Note:
  1. Click Install.

Dell Encryption Personal ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Encryption Personal configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption Personal installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Encryption Personal welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Encryption Personal EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Encryption Personal destination folder screen

  1. Select Personal Edition, populate an Entitlement Key, and then click Next.

Personal Edition option and the entitlement key field

Note:
  1. Click Install to begin the installation.

Dell Encryption Personal ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Encryption Personal configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Data Protection Personal Edition installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Data Protection Personal Edition welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Data Protection Personal Edition EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Data Protection Personal Edition destination folder screen

  1. Select Personal Edition, populate an Entitlement Key, and then click Next.

Personal Edition option and the entitlement key field

Note:
  1. Click Install to begin the installation.

Dell Data Protection Personal Edition ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Data Protection Personal Edition configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Data Protection Personal Edition installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Data Protection Personal Edition welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Data Protection Personal Edition EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Data Protection Personal Edition destination folder screen

  1. Locally Managed should be selected, click Next.

Locally Managed option

Note:
  1. Click Install to begin the installation.

Dell Data Protection Personal Edition ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Data Protection Personal Edition configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

CLI

Click on the appropriate client version for specific installation switches.

Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

Dell Encryption Enterprise allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches are not case-sensitive.

 

Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Note: Parameters are case-sensitive.

 

Parameters Values Purpose
ENTITLEMENT= See Examples Below (Optionally) specify an Encryption Personal Entitlement key to be used.
INSTALLDIR= See Examples Below (Optionally) change the installation directory.  The path must start and end with \" if the specified directory includes a space.
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Entitlement = Passed to installer
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Example #2:

DDPE_32bit_setup.exe /qb

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = None passed to installer, uses key stored in registry.
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
  • Reboot post install = No (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Example #3:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= INSTALLDIR=\"D:\Program Files\Dell\" /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = Passed to installer
  • Installation directory = D:\Program Files\Dell\
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Dell Encryption Personal allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches are not case-sensitive.

 

Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Note: Parameters are case-sensitive.

 

Parameters Values Purpose
ENTITLEMENT= See Examples Below (Optionally) specify an Encryption Personal Entitlement key to be used.
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Entitlement = Passed to installer
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Example #2:

DDPE_32bit_setup.exe /qb

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = None passed to installer, uses key stored in registry.
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
  • Reboot post install = No (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Informations supplémentaires

   

Vidéos

   

Propriétés de l’article


Produit concerné

Dell Encryption

Dernière date de publication

11 avr. 2023

Version

12

Type d’article

Solution