This article provides the steps for installing Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) and Dell Encryption Enterprise for Server (formerly Dell Data Protection | Server Encryption).
Not applicable
Dell Encryption Enterprise and Dell Encryption Enterprise for Server use the same installer. The installation can be performed on Windows through the user interface (UI) or command-line interface (CLI) switches. Click the appropriate method for more information.
Click the appropriate client version for specific installation steps.
Click the appropriate client version for specific installation steps.
Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.
Switch | Meaning |
---|---|
/V |
Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the .msi in Silent Mode. |
/X |
Runs the .msi in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- | Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the .msi with no user interface. |
Parameters | Values | Purpose |
---|---|---|
SERVERHOSTNAME= |
See Examples Below | This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server. |
POLICYPROXYHOSTNAME= |
See Examples Below | This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory. |
GKPORT= |
See Examples Below | (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME . |
DEVICESERVERURL= |
See Examples Below | This parameter is required. Web address and port that is used to activate Dell Data Security endpoints. |
SLOTTEDACTIVATION= |
0 (Disables slotted activation) |
(Optionally) delay activation of Dell Data Security from boot. |
1 (Enables slotted activation) |
||
INSTALLDIR= |
See Examples Below | (Optionally) change the installation directory. The path must start and end with \" if the specified directory includes a space. |
MANAGEDDOMAIN= |
See Examples Below | Organization domain name. |
CALREPEAT= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds. |
SLOTINTERVALS= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds. |
MISSTHRESHHOLD= |
See Examples Below | This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times). |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
HIDEOVERLAYICONS= |
0 (Enables overlay icons on protected files) |
Hides the icon indicator for files that are protected with Dell Data Security. |
1 (Disables overlay icons on protected files) |
||
HIDESYSTRAYICON= |
0 (Enables System Tray shortcut) |
Hides the application from the Windows System Tray. |
1 (Disables the System Tray shortcut) |
||
EME= |
1 (EEM Mode) |
Installs as Encryption External Media (EEM) mode. |
OPTIN=1 |
0 (Prevents Opt-In) |
Enables users to activate post-Windows authentication. |
1 (Enables Opt-In) |
||
SERVERMODE=1 |
0 (Prevents Server Encryption) |
Installs as Server Encryption mode (KIOSK mode). |
1 (Enables Server Encryption) |
||
ENABLE_FDE_LM |
0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise) |
Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise. |
1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise) |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"
Example #1 contains:
DDPE_64bit_setup.exe
FQDN.domain.com
FQDN2.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
120
to 600
seconds post-Windows authentication900
seconds until successfulC:\Dell\ShieldInstall.log
Example #2:
DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"
Example #2 contains:
DDPE_32bit_setup.exe
FQDN.domain.com
FQDN.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
90
to 150 seconds post-Windows authentication3,600
seconds (one hour) until successfulShieldInstall.log
created in the directory of the installerExample #3:
DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com INSTALLDIR=\"D:\Program Files\Dell\" GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"
Example #3 contains:
DDPE_32bit_setup.exe
DMZServer.domain.com
FQDN.domain.com
1234
https://FQDN.domain.com:1111/xapi/
D:\Program Files\Dell\
%TEMP%\MSIXXXX.log
(Default value since not defined)MSIXXXX.log
, a random alphanumeric is assigned for XXXX
.
Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.
Switch | Meaning |
---|---|
/V |
Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the .msi in Silent Mode. |
/X |
Runs the .msi in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- |
Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the .msi with no user interface. |
Parameters | Values | Purpose |
---|---|---|
SERVERHOSTNAME= |
See Examples Below | This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server. |
POLICYPROXYHOSTNAME= |
See Examples Below | This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory. |
GKPORT= |
See Examples Below | (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME . |
DEVICESERVERURL= |
See Examples Below | This parameter is required. Web address and port that is used to activate Dell Data Security endpoints. |
SLOTTEDACTIVATION= |
0 (Disables slotted activation) |
(Optionally) delay activation of Dell Data Security from boot. |
1 (Enables slotted activation) |
||
MANAGEDDOMAIN= |
See Examples Below | Organization domain name. |
CALREPEAT= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds. |
SLOTINTERVALS= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds. |
MISSTHRESHHOLD= |
See Examples Below | This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times). |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
HIDEOVERLAYICONS= |
0 (Enables overlay icons on protected files) |
Hides the icon indicator for files that are protected with Dell Data Security. |
1 (Disables overlay icons on protected files) |
||
HIDESYSTRAYICON= |
0 (Enables System Tray shortcut) |
Hides the application from the Windows System Tray. |
1 (Disables the System Tray shortcut) |
||
EME= |
1 (EEM Mode) |
Installs as Encryption External Media (EEM) mode. |
OPTIN=1 |
0 (Prevents Opt-In) |
Enables users to activate post-Windows authentication. |
1 (Enables Opt-In) |
||
SERVERMODE=1 |
0 (Prevents Server Encryption) |
Installs as Server Encryption mode (KIOSK mode). |
1 (Enables Server Encryption) |
||
ENABLE_FDE_LM |
0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise) |
Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise. |
1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise) |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"
Example #1 contains:
DDPE_64bit_setup.exe
FQDN.domain.com
FQDN2.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
120
to 600
seconds post-Windows authentication900
seconds until successfulC:\Dell\ShieldInstall.log
Example #2:
DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"
Example #2 contains:
DDPE_32bit_setup.exe
FQDN.domain.com
FQDN.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
90
to 150
seconds post-Windows authentication3,600
seconds (one hour) until successfulShieldInstall.log
created in the directory of the InstallerExample #3:
DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"
Example #3 contains:
DDPE_32bit_setup.exe
DMZServer.domain.com
FQDN.domain.com
1234
https://FQDN.domain.com:1111/xapi/
%TEMP%\MSIXXXX.log
(Default value since not defined)MSIXXXX.log
, a random alphanumeric is assigned for XXXX
.
Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.
Switch | Meaning |
---|---|
/V |
Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the .msi in Silent Mode. |
/X |
Runs the .msi in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- |
Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the .msi with no user interface. |
Parameters | Values | Purpose |
---|---|---|
SERVERHOSTNAME= |
See Examples Below | This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server. |
POLICYPROXYHOSTNAME= |
See Examples Below | This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory. |
GKPORT= |
See Examples Below | (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME . |
DEVICESERVERURL= |
See Examples Below | This parameter is required. Web address and port that is used to activate Dell Data Security endpoints. |
SLOTTEDACTIVATION= |
0 (Disables slotted activation) |
(Optionally) delay activation of Dell Data Security from boot. |
1 (Enables slotted activation) |
||
MANAGEDDOMAIN= |
See Examples Below | Organization domain name. |
CALREPEAT= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds. |
SLOTINTERVALS= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds. |
MISSTHRESHHOLD= |
See Examples Below | This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times). |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
HIDEOVERLAYICONS= |
0 (Enables overlay icons on protected files) |
Hides the icon indicator for files that are protected with Dell Data Security. |
1 (Disables overlay icons on protected files) |
||
HIDESYSTRAYICON= |
0 (Enables System Tray shortcut) |
Hides the application from the Windows System Tray. |
1 (Disables the System Tray shortcut) |
||
EME= |
1 (EEM Mode) |
Installs as Encryption External Media (EEM) mode. |
OPTIN=1 |
0 (Prevents Opt-In) |
Enables users to activate post-Windows authentication. |
1 (Enables Opt-In) |
||
SERVERMODE=1 |
0 (Prevents Server Encryption) |
Installs as Server Encryption mode (KIOSK mode). |
1 (Enables Server Encryption) |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"
Example #1 contains:
DDPE_64bit_setup.exe
FQDN.domain.com
FQDN2.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
120
to 600
seconds post-Windows authentication900
seconds until successfulC:\Dell\ShieldInstall.log
Example #2:
DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"
Example #2 contains:
DDPE_32bit_setup.exe
FQDN.domain.com
FQDN.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
90
to 150
seconds post-Windows authentication3,600
seconds (one hour) until successfulShieldInstall.log
created in the directory of the InstallerExample #3:
DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"
Example #3 contains:
DDPE_32bit_setup.exe
1234
https://FQDN.domain.com:1111/xapi/
%TEMP%\MSIXXXX.log
(Default value since not defined)MSIXXXX.log
, a random alphanumeric is assigned for XXXX
.
Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.
Switch | Meaning |
---|---|
/V |
Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the .msi in Silent Mode. |
/X |
Runs the .msi in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- |
Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the .msi with no user interface. |
Parameters | Values | Purpose |
---|---|---|
SERVERHOSTNAME= |
See Examples Below | This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server. |
POLICYPROXYHOSTNAME= |
See Examples Below | This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory. |
GKPORT= |
See Examples Below | (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME . |
DEVICESERVERURL= |
See Examples Below | This parameter is required. Web address and port that is used to activate Dell Data Security endpoints. |
SLOTTEDACTIVATION= |
0 (Disables slotted activation) |
(Optionally) delay activation of Dell Data Security from boot. |
1 (Enables slotted activation) |
||
MANAGEDDOMAIN= |
See Examples Below | Organization domain name. |
CALREPEAT= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds. |
SLOTINTERVALS= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds. |
MISSTHRESHHOLD= |
See Examples Below | This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times). |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
HIDEOVERLAYICONS= |
0 (Enables overlay icons on protected files) |
Hides the icon indicator for files that are protected with Dell Data Security. |
1 (Disables overlay icons on protected files) |
||
HIDESYSTRAYICON= |
0 (Enables System Tray shortcut) |
Hides the application from the Windows System Tray. |
1 (Disables the System Tray shortcut) |
||
EME= |
1 (EEM Mode) |
Installs as Encryption External Media (EEM) mode. |
OPTIN=1 |
0 (Prevents Opt-In) |
Enables users to activate post-Windows authentication. |
1 (Enables Opt-In) |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"
Example #1 contains:
DDPE_64bit_setup.exe
FQDN.domain.com
FQDN2.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
120
to 600
seconds post-Windows authentication900
seconds until successfulC:\Dell\ShieldInstall.log
Example #2:
DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"
Example #2 contains:
DDPE_32bit_setup.exe
FQDN.domain.com
FQDN.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
90
to 150
seconds post-Windows authentication3,600
seconds (one hour) until successfulShieldInstall.log
created in the directory of the InstallerExample #3:
DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"
Example #3 contains:
DDPE_32bit_setup.exe
DMZServer.domain.com
FQDN.domain.com
1234
https://FQDN.domain.com:1111/xapi/
%TEMP%\MSIXXXX.log
(Default value since not defined)MSIXXXX.log
, a random alphanumeric is assigned for XXXX
.
Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters.
Switch | Meaning |
---|---|
/V |
Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the .msi in Silent Mode. |
/X |
Runs the .msi in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- |
Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the .msi with no user interface. |
Parameters | Values | Purpose |
---|---|---|
SERVERHOSTNAME= |
See Examples Below | This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server. |
POLICYPROXYHOSTNAME= |
See Examples Below | This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory. |
GKPORT= |
See Examples Below | (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME . |
DEVICESERVERURL= |
See Examples Below | This parameter is required. Web address and port that is used to activate Dell Data Security endpoints. |
SLOTTEDACTIVATION= |
0 (Disables slotted activation) |
(Optionally) delay activation of Dell Data Security from boot. |
1 (Enables slotted activation) |
||
CALREPEAT= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds. |
SLOTINTERVALS= |
See Examples Below | This parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds. |
MISSTHRESHHOLD= |
See Examples Below | This optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times). |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
HIDEOVERLAYICONS= |
0 (Enables overlay icons on protected files) |
Hides the icon indicator for files that are protected with Dell Data Security. |
1 (Disables overlay icons on protected files) |
||
HIDESYSTRAYICON= |
0 (Enables System Tray shortcut) |
Hides the application from the Windows System Tray. |
1 (Disables the System Tray shortcut) |
||
EME= |
1 (EEM Mode) |
Installs as Encryption External Media (EEM) mode. |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"
Example #1 contains:
DDPE_64bit_setup.exe
FQDN.domain.com
FQDN2.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
120
to 600
seconds post-Windows authentication900
seconds until successfulC:\Dell\ShieldInstall.log
Example #2:
DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"
Example #2 contains:
DDPE_32bit_setup.exe
FQDN.domain.com
FQDN.domain.com
8000
(Default value since not defined)https://FQDN.domain.com:8443/xapi/
90
to 150
seconds post-Windows authentication3,600
seconds (one hour) until successfulShieldInstall.log
created in the directory of the installerExample #3:
DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"
Example #3 contains:
DDPE_32bit_setup.exe
DMZServer.domain.com
FQDN.domain.com
1234
https://FQDN.domain.com:1111/xapi/
%TEMP%\MSIXXXX.log
(Default value since not defined)MSIXXXX.log
, a random alphanumeric is assigned for XXXX
.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.