Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products

How to Install Dell Encryption Enterprise

Résumé: Dell Encryption Enterprise or Dell Data Protection Enterprise Edition can be installed by following these instructions for either the user interface (UI) or the command line (CLI).

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Symptômes

This article provides the steps for installing Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) and Dell Encryption Enterprise for Server (formerly Dell Data Protection | Server Encryption).


Affected Products:

  • Dell Encryption Enterprise
  • Dell Data Protection | Enterprise Edition
  • Dell Encryption Enterprise for Server
  • Dell Data Protection | Server Encryption

Affected Versions:

  • v8.0.X and Later

Affected Operating Systems:

  • Windows

Cause

Not applicable

Résolution

Dell Encryption Enterprise and Dell Encryption Enterprise for Server use the same installer. The installation can be performed on Windows through the user interface (UI) or command-line interface (CLI) switches. Click the appropriate method for more information.

Note: Dell Encryption Enterprise must be downloaded and extracted from the Master Installer.

UI

Click the appropriate client version for specific installation steps.

Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.
  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption installer

  1. If any missing requirements are detected, click Install. Otherwise go to Step 3.

Missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

Dell Encryption welcome screen

  1. Accept the terms in the license agreement and then click Next.

End User License Agreement

  1. Optionally Change the installation location and then click Next.

Destination folder

  1. Click On-Prem Dell Management Server and then click Next.

On-Prem Dell Server

  1. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Security Management Server Name and Managed Domain

Note:
  • Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server
  • The example that is used for Security Management Server will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (Step 7) and then click Next.

Dell Policy Proxy Host Name

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (Step 7) and then click Next.

Dell Device Server URL

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

Ready to install

  1. Upon installation, click Finish to close the UI.

Configuration Completed

  1. Click Yes to reboot the machine.

Reboot prompt

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption installer

  1. If any missing requirements are detected, click Install. Otherwise go to Step 3.

Missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

Dell Encryption welcome screen

  1. Accept the terms in the license agreement and then click Next.

End User License Agreement

  1. Optionally Change the installation location and then click Next.

Destination folder

  1. Click On-Prem Dell Management Server and then click Next.

On-Prem Dell Management Server

Note: Hosted Dell Security Center is not available.
  1. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Security Management Server Name and Managed Domain

Note:
  • Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server
  • The example that is used for Security Management Server will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (Step 7) and then click Next.

Dell Policy Proxy Host Name

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (Step 7) and then click Next.

Dell Device Server URL

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

Ready to install

  1. Upon installation, click Finish to close the UI.

Configuration Completed

  1. Click Yes to reboot the machine.

Reboot prompt

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption installer

  1. If any missing requirements are detected, click Install. Otherwise go to Step 3.

Missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

Dell Encryption welcome screen

  1. Accept the terms in the license agreement and then click Next.

End User License Agreement

  1. Optionally Change the installation location and then click Next.

Destination folder

  1. Click Enterprise Edition and then click Next.

Management Type

  1. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Security Management Server Name and Managed Domain

Note:
  • Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server
  • The example that is used for Security Management Server will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (Step 7) and then click Next.

Dell Policy Proxy Host Name

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (Step 7) and then click Next.

Dell Device Server URL

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

Ready to install

  1. Upon installation, click Finish to close the UI.

Configuration Completed

  1. Click Yes to reboot the machine.

Reboot prompt

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption installer

  1. If any missing requirements are detected, click Install. Otherwise go to Step 3.

Missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

Dell Encryption welcome screen

  1. Accept the terms in the license agreement and then click Next.

End User License Agreement

  1. Optionally Change the installation location and then click Next.

Destination folder

  1. Click Enterprise Edition and then click Next.

Enterprise Edition

  1. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Dell Enterprise Server Name and Managed Domain

Note:
  • Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server
  • The example that is used for Dell Enterprise Server Name will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next.

Dell Policy Proxy Host Name

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next.

Dell Device Server URL

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

Ready to install

  1. Upon installation, click Finish to close the UI.

Configuration Completed

  1. Click Yes to reboot the machine.

Reboot prompt

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption installer

  1. If any missing requirements are detected, click Install. Otherwise go to Step 3.

Missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Data Protection Enterprise Edition System Requirements.
  1. Click Next to proceed.

Dell Encryption welcome screen

  1. Accept the terms in the license agreement and then click Next.

End User License Agreement

  1. Optionally Change the installation location and then click Next.

Destination folder

  1. Click Next.

Management Type

  1. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Dell Enterprise Server Name and Managed Domain

Note:
  • Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server
  • The example that is used for Dell Enterprise Server Name will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next.

Dell Policy Proxy Host Name

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next.

Dell Device Server URL

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

Ready to install

  1. Upon installation, click Finish to close the UI.

Configuration Completed

  1. Click Yes to reboot the machine.

Reboot prompt

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Data Protection Encryption installer

  1. If any missing requirements are detected, click Install. Otherwise go to Step 3.

Missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Data Protection Enterprise Edition System Requirements.
  1. Click Next to proceed.

Dell Data Protection Encryption welcome screen

  1. Accept the terms in the license agreement and then click Next.

End User License Agreement

  1. Optionally Change the installation location and then click Next.

Destination folder

  1. Click Next.

Management Type

  1. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Dell Enterprise Server Name and Managed Domain

Note:
  • Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server
  • The example that is used for Dell Enterprise Server Name will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next.

Dell Policy Proxy Host Name

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next.

Dell Device Server URL

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

Ready to install

  1. Upon installation, click Finish to close the UI.

Configuration Completed

  1. Click Yes to reboot the machine.

Reboot prompt

CLI

Click the appropriate client version for specific installation steps.

Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.

Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Parameters Values Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address and port that is used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
INSTALLDIR= See Examples Below (Optionally) change the installation directory. The path must start and end with \" if the specified directory includes a space.
MANAGEDDOMAIN= See Examples Below Organization domain name.
CALREPEAT= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files that are protected with Dell Data Security.
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables System Tray shortcut) Hides the application from the Windows System Tray.
1 (Disables the System Tray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode.
OPTIN=1 0 (Prevents Opt-In) Enables users to activate post-Windows authentication.
1 (Enables Opt-In)
SERVERMODE=1 0 (Prevents Server Encryption) Installs as Server Encryption mode (KIOSK mode).
1 (Enables Server Encryption)
ENABLE_FDE_LM 0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise) Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise.
1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise)

 

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Full Disk Encryption can also be installed = Yes
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post-Windows authentication
  • Activation retry (on failure) = Every 900 seconds until successful
  • Reboot post install = No
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Full Disk Encryption can also be installed = No
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post-Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) until successful
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com INSTALLDIR=\"D:\Program Files\Dell\" GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Installation directory = D:\Program Files\Dell\
  • Full Disk Encryption can also be installed = No
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.

Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Parameters Values Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address and port that is used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
MANAGEDDOMAIN= See Examples Below Organization domain name.
CALREPEAT= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files that are protected with Dell Data Security.
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables System Tray shortcut) Hides the application from the Windows System Tray.
1 (Disables the System Tray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode.
OPTIN=1 0 (Prevents Opt-In) Enables users to activate post-Windows authentication.
1 (Enables Opt-In)
SERVERMODE=1 0 (Prevents Server Encryption) Installs as Server Encryption mode (KIOSK mode).
1 (Enables Server Encryption)
ENABLE_FDE_LM 0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise) Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise.
1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise)

 

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Full Disk Encryption can also be installed = Yes
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post-Windows authentication
  • Activation retry (on failure) = Every 900 seconds until successful
  • Reboot post install = No
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Full Disk Encryption can also be installed = No
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post-Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) until successful
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the Installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Full Disk Encryption can also be installed = No
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.

Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Parameters Values Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address and port that is used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
MANAGEDDOMAIN= See Examples Below Organization domain name.
CALREPEAT= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files that are protected with Dell Data Security.
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables System Tray shortcut) Hides the application from the Windows System Tray.
1 (Disables the System Tray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode.
OPTIN=1 0 (Prevents Opt-In) Enables users to activate post-Windows authentication.
1 (Enables Opt-In)
SERVERMODE=1 0 (Prevents Server Encryption) Installs as Server Encryption mode (KIOSK mode).
1 (Enables Server Encryption)

 

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post-Windows authentication
  • Activation retry (on failure) = Every 900 seconds until successful
  • Reboot post install = No
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post-Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) until successful
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the Installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.

Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Parameters Values Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address and port that is used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
MANAGEDDOMAIN= See Examples Below Organization domain name.
CALREPEAT= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files that are protected with Dell Data Security.
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables System Tray shortcut) Hides the application from the Windows System Tray.
1 (Disables the System Tray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode.
OPTIN=1 0 (Prevents Opt-In) Enables users to activate post-Windows authentication.
1 (Enables Opt-In)

 

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post-Windows authentication
  • Activation retry (on failure) = Every 900 seconds until successful
  • Reboot post install = No
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post-Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) until successful
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the Installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.

Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Parameters Values Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address and port that is used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
CALREPEAT= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files that are protected with Dell Data Security.
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables System Tray shortcut) Hides the application from the Windows System Tray.
1 (Disables the System Tray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode.

 

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post-Windows authentication
  • Activation retry (on failure) = Every 900 seconds until successful
  • Reboot post install = No
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post-Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) until successful
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Informations supplémentaires

   

Vidéos

   

Produits concernés

Dell Encryption
Propriétés de l’article
Numéro d’article: 000124911
Type d’article: Solution
Dernière modification: 25 Oct 2023
Version:  18
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.