...
This article provides the steps for installing Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) and Dell Encryption Enterprise for Server (formerly Dell Data Protection | Server Encryption). Affected Products: Dell Encryption EnterpriseDell Data Protection | Enterprise EditionDell Encryption Enterprise for ServerDell Data Protection | Server Encryption Affected Versions: v8.0.X and Later Affected Operating Systems: Windows
Not applicable
Dell Encryption Enterprise and Dell Encryption Enterprise for Server use the same installer. The installation can be performed on Windows through the user interface (UI) or command-line interface (CLI) switches. Click the appropriate method for more information. Note: Dell Encryption Enterprise must be downloaded and extracted from the Master Installer. For information about the download process, reference How to Download Dell Encryption Enterprise or Dell Encryption Personal.For information about the extraction process, reference How to Extract Child Installers from the Dell Data Security Master Installer. UI Click the appropriate client version for specific installation steps. Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version. v10.1.0 and Later Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard. If any missing requirements are detected, click Install. Otherwise go to Step 3. Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements. Click Next to proceed. Accept the terms in the license agreement and then click Next. Optionally Change the installation location and then click Next. Click On-Prem Dell Management Server and then click Next. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed. Note: Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management ServerThe example that is used for Security Management Server will differ in your environment. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (Step 7) and then click Next. Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (Step 7) and then click Next. Note: Port 8443 is used by default for activation. This configuration may differ in your environment. Click Install. Upon installation, click Finish to close the UI. Click Yes to reboot the machine. v10.0.0 to 10.0.1 Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard. If any missing requirements are detected, click Install. Otherwise go to Step 3. Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements. Click Next to proceed. Accept the terms in the license agreement and then click Next. Optionally Change the installation location and then click Next. Click On-Prem Dell Management Server and then click Next. Note: Hosted Dell Security Center is not available. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed. Note: Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management ServerThe example that is used for Security Management Server will differ in your environment. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (Step 7) and then click Next. Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (Step 7) and then click Next. Note: Port 8443 is used by default for activation. This configuration may differ in your environment. Click Install. Upon installation, click Finish to close the UI. Click Yes to reboot the machine. v8.16.0 to 8.18.X Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard. If any missing requirements are detected, click Install. Otherwise go to Step 3. Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements. Click Next to proceed. Accept the terms in the license agreement and then click Next. Optionally Change the installation location and then click Next. Click Enterprise Edition and then click Next. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed. Note: Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management ServerThe example that is used for Security Management Server will differ in your environment. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (Step 7) and then click Next. Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (Step 7) and then click Next. Note: Port 8443 is used by default for activation. This configuration may differ in your environment. Click Install. Upon installation, click Finish to close the UI. Click Yes to reboot the machine. v8.15.0 Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard. If any missing requirements are detected, click Install. Otherwise go to Step 3. Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Enterprise System Requirements. Click Next to proceed. Accept the terms in the license agreement and then click Next. Optionally Change the installation location and then click Next. Click Enterprise Edition and then click Next. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed. Note: Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management ServerThe example that is used for Dell Enterprise Server Name will differ in your environment. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next. Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next. Note: Port 8443 is used by default for activation. This configuration may differ in your environment. Click Install. Upon installation, click Finish to close the UI. Click Yes to reboot the machine. v8.7.0 to 8.13.X Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard. If any missing requirements are detected, click Install. Otherwise go to Step 3. Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Data Protection Enterprise Edition System Requirements. Click Next to proceed. Accept the terms in the license agreement and then click Next. Optionally Change the installation location and then click Next. Click Next. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed. Note: Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management ServerThe example that is used for Dell Enterprise Server Name will differ in your environment. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next. Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next. Note: Port 8443 is used by default for activation. This configuration may differ in your environment. Click Install. Upon installation, click Finish to close the UI. Click Yes to reboot the machine. v8.0.0 to 8.6.X Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard. If any missing requirements are detected, click Install. Otherwise go to Step 3. Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Data Protection Enterprise Edition System Requirements. Click Next to proceed. Accept the terms in the license agreement and then click Next. Optionally Change the installation location and then click Next. Click Next. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed. Note: Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management ServerThe example that is used for Dell Enterprise Server Name will differ in your environment. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next. Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (Step 7) and then click Next. Note: Port 8443 is used by default for activation. This configuration may differ in your environment. Click Install. Upon installation, click Finish to close the UI. Click Yes to reboot the machine. CLI Click the appropriate client version for specific installation steps. Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version. v10.4.0 and Later Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters. Note: Command-line switches and parameters are case-sensitive. SwitchMeaning/VPasses variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes./SInstalls the .msi in Silent Mode./XRuns the .msi in Uninstall Mode./L*VLogging verbose output. The content must always be enclosed in plain-text quotes./QBUser interface with Cancel button. Prompts for device reboot on installation completion./QB-Installation UI with Cancel button. Reboots device automatically on installation completion./QB!User interface without Cancel button. Prompts for device reboot on installation completion./QB!-Installation UI without Cancel button. Reboots device automatically on installation completion./QNRuns the .msi with no user interface. ParametersValuesPurposeSERVERHOSTNAME=See Examples BelowThis parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.POLICYPROXYHOSTNAME=See Examples BelowThis parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.GKPORT=See Examples Below(Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.DEVICESERVERURL=See Examples BelowThis parameter is required. Web address and port that is used to activate Dell Data Security endpoints.SLOTTEDACTIVATION=0 (Disables slotted activation)(Optionally) delay activation of Dell Data Security from boot.1 (Enables slotted activation)INSTALLDIR=See Examples Below(Optionally) change the installation directory. The path must start and end with \" if the specified directory includes a space.MANAGEDDOMAIN=See Examples BelowOrganization domain name.CALREPEAT=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.SLOTINTERVALS=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.MISSTHRESHHOLD=See Examples BelowThis optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).REBOOT=REALLYSUPPRESSPrevents reboot, though a reboot is still necessary.HIDEOVERLAYICONS=0 (Enables overlay icons on protected files)Hides the icon indicator for files that are protected with Dell Data Security.1 (Disables overlay icons on protected files)HIDESYSTRAYICON=0 (Enables System Tray shortcut)Hides the application from the Windows System Tray.1 (Disables the System Tray shortcut)EME=1 (EEM Mode)Installs as Encryption External Media (EEM) mode.OPTIN=10 (Prevents Opt-In)Enables users to activate post-Windows authentication.1 (Enables Opt-In)SERVERMODE=10 (Prevents Server Encryption)Installs as Server Encryption mode (KIOSK mode).1 (Enables Server Encryption)ENABLE_FDE_LM0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise)Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise.1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise) CLI Installation Examples: Example #1: DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn" Example #1 contains: Installer = DDPE_64bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN2.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Full Disk Encryption can also be installed = YesSlotted Activation enabled = YesActivation attempt = 120 to 600 seconds post-Windows authenticationActivation retry (on failure) = Every 900 seconds until successfulReboot post install = NoInstallation Log = C:\Dell\ShieldInstall.log Example #2: DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn" Example #2 contains: Installer = DDPE_32bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Full Disk Encryption can also be installed = NoSlotted Activation enabled = YesActivation attempt = 90 to 150 seconds post-Windows authenticationActivation retry (on failure) = Every 3,600 seconds (one hour) until successfulReboot post install = Yes (Default value since not defined)Installation Log = ShieldInstall.log created in the directory of the installer Example #3: DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com INSTALLDIR=\"D:\Program Files\Dell\" GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress" Example #3 contains: Installer = DDPE_32bit_setup.exeSilent install = NoDell Security Management Server = DMZServer.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 1234Activation URL = https://FQDN.domain.com:1111/xapi/Installation directory = D:\Program Files\Dell\Full Disk Encryption can also be installed = NoSlotted Activation enabled = NoActivation attempt = At Windows authentication (Default value since not defined)Activation retry = On reboot (Default value since not defined)Reboot post install = NoInstallation Log = %TEMP%\MSIXXXX.log (Default value since not defined) Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX. v8.17.2 to 10.3.1 Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters. Note: Command-line switches and parameters are case-sensitive. SwitchMeaning/VPasses variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes./SInstalls the .msi in Silent Mode./XRuns the .msi in Uninstall Mode./L*VLogging verbose output. The content must always be enclosed in plain-text quotes./QBUser interface with Cancel button. Prompts for device reboot on installation completion./QB-Installation UI with Cancel button. Reboots device automatically on installation completion./QB!User interface without Cancel button. Prompts for device reboot on installation completion./QB!-Installation UI without Cancel button. Reboots device automatically on installation completion./QNRuns the .msi with no user interface. ParametersValuesPurposeSERVERHOSTNAME=See Examples BelowThis parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.POLICYPROXYHOSTNAME=See Examples BelowThis parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.GKPORT=See Examples Below(Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.DEVICESERVERURL=See Examples BelowThis parameter is required. Web address and port that is used to activate Dell Data Security endpoints.SLOTTEDACTIVATION=0 (Disables slotted activation)(Optionally) delay activation of Dell Data Security from boot.1 (Enables slotted activation)MANAGEDDOMAIN=See Examples BelowOrganization domain name.CALREPEAT=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.SLOTINTERVALS=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.MISSTHRESHHOLD=See Examples BelowThis optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).REBOOT=REALLYSUPPRESSPrevents reboot, though a reboot is still necessary.HIDEOVERLAYICONS=0 (Enables overlay icons on protected files)Hides the icon indicator for files that are protected with Dell Data Security.1 (Disables overlay icons on protected files)HIDESYSTRAYICON=0 (Enables System Tray shortcut)Hides the application from the Windows System Tray.1 (Disables the System Tray shortcut)EME=1 (EEM Mode)Installs as Encryption External Media (EEM) mode.OPTIN=10 (Prevents Opt-In)Enables users to activate post-Windows authentication.1 (Enables Opt-In)SERVERMODE=10 (Prevents Server Encryption)Installs as Server Encryption mode (KIOSK mode).1 (Enables Server Encryption)ENABLE_FDE_LM0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise)Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise.1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise) CLI Installation Examples: Example #1: DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn" Example #1 contains: Installer = DDPE_64bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN2.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Full Disk Encryption can also be installed = YesSlotted Activation enabled = YesActivation attempt = 120 to 600 seconds post-Windows authenticationActivation retry (on failure) = Every 900 seconds until successfulReboot post install = NoInstallation Log = C:\Dell\ShieldInstall.log Example #2: DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn" Example #2 contains: Installer = DDPE_32bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Full Disk Encryption can also be installed = NoSlotted Activation enabled = YesActivation attempt = 90 to 150 seconds post-Windows authenticationActivation retry (on failure) = Every 3,600 seconds (one hour) until successfulReboot post install = Yes (Default value since not defined)Installation Log = ShieldInstall.log created in the directory of the Installer Example #3: DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress" Example #3 contains: Installer = DDPE_32bit_setup.exeSilent install = NoDell Security Management Server = DMZServer.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 1234Activation URL = https://FQDN.domain.com:1111/xapi/Full Disk Encryption can also be installed = NoSlotted Activation enabled = NoActivation attempt = At Windows authentication (Default value since not defined)Activation retry = On reboot (Default value since not defined)Reboot post install = NoInstallation Log = %TEMP%\MSIXXXX.log (Default value since not defined) Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX. v8.15.0 to 8.17.1 Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters. Note: Command-line switches and parameters are case-sensitive. SwitchMeaning/VPasses variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes./SInstalls the .msi in Silent Mode./XRuns the .msi in Uninstall Mode./L*VLogging verbose output. The content must always be enclosed in plain-text quotes./QBUser interface with Cancel button. Prompts for device reboot on installation completion./QB-Installation UI with Cancel button. Reboots device automatically on installation completion./QB!User interface without Cancel button. Prompts for device reboot on installation completion./QB!-Installation UI without Cancel button. Reboots device automatically on installation completion./QNRuns the .msi with no user interface. ParametersValuesPurposeSERVERHOSTNAME=See Examples BelowThis parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.POLICYPROXYHOSTNAME=See Examples BelowThis parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.GKPORT=See Examples Below(Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.DEVICESERVERURL=See Examples BelowThis parameter is required. Web address and port that is used to activate Dell Data Security endpoints.SLOTTEDACTIVATION=0 (Disables slotted activation)(Optionally) delay activation of Dell Data Security from boot.1 (Enables slotted activation)MANAGEDDOMAIN=See Examples BelowOrganization domain name.CALREPEAT=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.SLOTINTERVALS=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.MISSTHRESHHOLD=See Examples BelowThis optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).REBOOT=REALLYSUPPRESSPrevents reboot, though a reboot is still necessary.HIDEOVERLAYICONS=0 (Enables overlay icons on protected files)Hides the icon indicator for files that are protected with Dell Data Security.1 (Disables overlay icons on protected files)HIDESYSTRAYICON=0 (Enables System Tray shortcut)Hides the application from the Windows System Tray.1 (Disables the System Tray shortcut)EME=1 (EEM Mode)Installs as Encryption External Media (EEM) mode.OPTIN=10 (Prevents Opt-In)Enables users to activate post-Windows authentication.1 (Enables Opt-In)SERVERMODE=10 (Prevents Server Encryption)Installs as Server Encryption mode (KIOSK mode).1 (Enables Server Encryption) CLI Installation Examples: Example #1: DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn" Example #1 contains: Installer = DDPE_64bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN2.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Slotted Activation enabled = YesActivation attempt = 120 to 600 seconds post-Windows authenticationActivation retry (on failure) = Every 900 seconds until successfulReboot post install = NoInstallation Log = C:\Dell\ShieldInstall.log Example #2: DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn" Example #2 contains: Installer = DDPE_32bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Slotted Activation enabled = YesActivation attempt = 90 to 150 seconds post-Windows authenticationActivation retry (on failure) = Every 3,600 seconds (one hour) until successfulReboot post install = Yes (Default value since not defined)Installation Log = ShieldInstall.log created in the directory of the Installer Example #3: DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress" Example #3 contains: Installer = DDPE_32bit_setup.exeSilent install = NoDell Security Management Server = DMZServer.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 1234Activation URL = https://FQDN.domain.com:1111/xapi/Slotted Activation enabled = NoActivation attempt = At Windows authentication (Default value since not defined)Activation retry = On reboot (Default value since not defined)Reboot post install = NoInstallation Log = %TEMP%\MSIXXXX.log (Default value since not defined) Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX. v8.6.0 to 8.13.X Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters. Note: Command-line switches and parameters are case-sensitive. SwitchMeaning/VPasses variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes./SInstalls the .msi in Silent Mode./XRuns the .msi in Uninstall Mode./L*VLogging verbose output. The content must always be enclosed in plain-text quotes./QBUser interface with Cancel button. Prompts for device reboot on installation completion./QB-Installation UI with Cancel button. Reboots device automatically on installation completion./QB!User interface without Cancel button. Prompts for device reboot on installation completion./QB!-Installation UI without Cancel button. Reboots device automatically on installation completion./QNRuns the .msi with no user interface. ParametersValuesPurposeSERVERHOSTNAME=See Examples BelowThis parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.POLICYPROXYHOSTNAME=See Examples BelowThis parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.GKPORT=See Examples Below(Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.DEVICESERVERURL=See Examples BelowThis parameter is required. Web address and port that is used to activate Dell Data Security endpoints.SLOTTEDACTIVATION=0 (Disables slotted activation)(Optionally) delay activation of Dell Data Security from boot.1 (Enables slotted activation)MANAGEDDOMAIN=See Examples BelowOrganization domain name.CALREPEAT=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.SLOTINTERVALS=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.MISSTHRESHHOLD=See Examples BelowThis optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).REBOOT=REALLYSUPPRESSPrevents reboot, though a reboot is still necessary.HIDEOVERLAYICONS=0 (Enables overlay icons on protected files)Hides the icon indicator for files that are protected with Dell Data Security.1 (Disables overlay icons on protected files)HIDESYSTRAYICON=0 (Enables System Tray shortcut)Hides the application from the Windows System Tray.1 (Disables the System Tray shortcut)EME=1 (EEM Mode)Installs as Encryption External Media (EEM) mode.OPTIN=10 (Prevents Opt-In)Enables users to activate post-Windows authentication.1 (Enables Opt-In) CLI Installation Examples: Example #1: DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn" Example #1 contains: Installer = DDPE_64bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN2.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Slotted Activation enabled = YesActivation attempt = 120 to 600 seconds post-Windows authenticationActivation retry (on failure) = Every 900 seconds until successfulReboot post install = NoInstallation Log = C:\Dell\ShieldInstall.log Example #2: DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn" Example #2 contains: Installer = DDPE_32bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Slotted Activation enabled = YesActivation attempt = 90 to 150 seconds post-Windows authenticationActivation retry (on failure) = Every 3,600 seconds (one hour) until successfulReboot post install = Yes (Default value since not defined)Installation Log = ShieldInstall.log created in the directory of the Installer Example #3: DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress" Example #3 contains: Installer = DDPE_32bit_setup.exeSilent install = NoDell Security Management Server = DMZServer.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 1234Activation URL = https://FQDN.domain.com:1111/xapi/Slotted Activation enabled = NoActivation attempt = At Windows authentication (Default value since not defined)Activation retry = On reboot (Default value since not defined)Reboot post install = NoInstallation Log = %TEMP%\MSIXXXX.log (Default value since not defined) Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX. v8.0.0 to 8.5.X Dell Encryption Enterprise allows flexibility in command-line installation options through the usage of switches, options, and parameters. Note: Command-line switches and parameters are case-sensitive. SwitchMeaning/VPasses variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes./SInstalls the .msi in Silent Mode./XRuns the .msi in Uninstall Mode./L*VLogging verbose output. The content must always be enclosed in plain-text quotes./QBUser interface with Cancel button. Prompts for device reboot on installation completion./QB-Installation UI with Cancel button. Reboots device automatically on installation completion./QB!User interface without Cancel button. Prompts for device reboot on installation completion./QB!-Installation UI without Cancel button. Reboots device automatically on installation completion./QNRuns the .msi with no user interface. ParametersValuesPurposeSERVERHOSTNAME=See Examples BelowThis parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server.POLICYPROXYHOSTNAME=See Examples BelowThis parameter is required. FQDN or static IP of Dell Security Management Server used to process policy and inventory.GKPORT=See Examples Below(Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.DEVICESERVERURL=See Examples BelowThis parameter is required. Web address and port that is used to activate Dell Data Security endpoints.SLOTTEDACTIVATION=0 (Disables slotted activation)(Optionally) delay activation of Dell Data Security from boot.1 (Enables slotted activation)CALREPEAT=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.SLOTINTERVALS=See Examples BelowThis parameter is required if the SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.MISSTHRESHHOLD=See Examples BelowThis optional parameter can only be used if the SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, it defaults to 0 (infinite times).REBOOT=REALLYSUPPRESSPrevents reboot, though a reboot is still necessary.HIDEOVERLAYICONS=0 (Enables overlay icons on protected files)Hides the icon indicator for files that are protected with Dell Data Security.1 (Disables overlay icons on protected files)HIDESYSTRAYICON=0 (Enables System Tray shortcut)Hides the application from the Windows System Tray.1 (Disables the System Tray shortcut)EME=1 (EEM Mode)Installs as Encryption External Media (EEM) mode. CLI Installation Examples: Example #1: DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn" Example #1 contains: Installer = DDPE_64bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN2.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Slotted Activation enabled = YesActivation attempt = 120 to 600 seconds post-Windows authenticationActivation retry (on failure) = Every 900 seconds until successfulReboot post install = NoInstallation Log = C:\Dell\ShieldInstall.log Example #2: DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn" Example #2 contains: Installer = DDPE_32bit_setup.exeSilent install = YesDell Security Management Server = FQDN.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 8000 (Default value since not defined)Activation URL = https://FQDN.domain.com:8443/xapi/Slotted Activation enabled = YesActivation attempt = 90 to 150 seconds post-Windows authenticationActivation retry (on failure) = Every 3,600 seconds (one hour) until successfulReboot post install = Yes (Default value since not defined)Installation Log = ShieldInstall.log created in the directory of the installer Example #3: DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress" Example #3 contains: Installer = DDPE_32bit_setup.exeSilent install = NoDell Security Management Server = DMZServer.domain.comPolicy Proxy location = FQDN.domain.comPolicy Proxy port = 1234Activation URL = https://FQDN.domain.com:1111/xapi/Slotted Activation enabled = NoActivation attempt = At Windows authentication (Default value since not defined)Activation retry = On reboot (Default value since not defined)Reboot post install = NoInstallation Log = %TEMP%\MSIXXXX.log (Default value since not defined) Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX. To contact support, reference Dell Data Security International Support Phone Numbers.Go to TechDirect to generate a technical support request online.For additional insights and resources, join the Dell Security Community Forum.