Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

How to Install Dell Threat Defense

Summary: Dell Threat Defense can be installed using these instructions for either Windows or Mac.

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

Note:

This article covers the installation process for Dell Threat Defense in a Windows and Mac environment.


Affected Products:

Dell Threat Defense

Affected Versions:

v1372 and Later

Affected Operating Systems:

Windows
Mac


Cause

Not applicable.

Resolution

Click the appropriate operating system platform for the installation process.

Dell Threat Defense can be installed on Windows through the:

  • UI (user interface)
  • CLI (command-line interface)
Click the preferred method for more information.
 
Note: Before installation, ensure that the computer meets the product requirements by referencing Dell Threat Defense System Requirements.
UI

To install the product using the UI:

  1. Double-click DellThreatDefenseSetup.exe to begin the installation.

DellThreatDefenseSetup.exe

Note: For information about obtaining DellThreatDefenseSetup.exe, reference How to Download Dell Threat Defense.
  1. In the Dell Threat Defense Setup UI, click Install.

Install

  1. Enter the Installation Token for the Dell Threat Defense tenant and then click Next.

Installation Token

Note: If you do not have access to your Installation Token, contact your Dell Threat Defense administrator or reference the How to Obtain an Installation Token for Dell Threat Defense.
  1. Optionally, change the Folder Name and then click OK.

Folder Name

  1. Click Finish to complete the installation.

Finish

Note: If the installation fails, reference How to Collect Logs for Dell Threat Defense.
CLI

Dell Threat Defense allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches and parameters are case-sensitive.
 
Switch Meaning
/V Pass variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/I Configures package for installation
/S Silent Mode
/X Uninstall Mode
/L*V Modifies the installation logging name and output location with verbosity enabled.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN No user interface.
 
 

Click the Dell Threat Defense version for supported parameters. For more information, reference How to Identify the Dell Threat Defense Version.

Note: Parameter switches and parameters are case-sensitive.

 

Parameters Values Required Purpose
PIDKEY= See Examples Below Yes Connects endpoint to Dell Threat Defense using an Installation Token1.
LAUNCHAPP= 0 No System tray icon and Start Menu folder is hidden at run-time.
1 (Default) System tray icon and Start Menu folder are not hidden at run-time.
SELFPROTECTIONLEVEL= 1 No Only local administrators can make changes to the registry and services.
2 (Default) Only system administrators can make changes to the registry and services.
APPFOLDER= See Examples Below No Modifies the default installation directory (C:\Program Files\Cylance\Desktop).
VENUEZONE= See Examples Below No Requires v1382 or later. Adds a device to a specific zone. If a zone does not exist, a zone is created using the name that is provided. If not specified, defaults to UNZONED.
VDI X No Installs Dell Threat Defense in a non-persistent VDI (virtual desktop infrastructure) environment. X = Counter for the total number of deployments before a unique fingerprint is created for the workstation.
AD 0 (Default) No Hostname is used for workstation fingerprint.
1 Used in deployment of Dell Threat Defense on a primary image. Ties the workstation fingerprint to the Computer SID instead of hostname. Value takes precedence over the VDI parameter flag.

1 For more information, reference How to Obtain an Installation Token for Dell Threat Defense.

CLI Installation Examples:

Example #1:

msiexec /I DellThreatDefenseSetup_x64.msi /QN SELFPROTECTIONLEVEL=1 PIDKEY= 50UiRIN8ON5tznNaw213dM3 /S

Example #1 contains:

  • Installer = DellThreatDefenseSetup_x64.msi
  • Silent install = Yes
  • User Interface During Installation = No
  • Dell Threat Defense Tenant = 50UiRIN8ON5tznNaw213dM3
  • Protection Level = Local administrator
  • Visible Application Folder & Icon = Yes
    • Default value since not defined.
  • Zone Name = UNZONED
    • Default since not defined.
  • VDI Fingerprint= No
    • Default since not defined.
  • AD Fingerprint= No
    • Default since not defined
  • Installation Directory = C:\Program Files\Cylance\Desktop
    • Default since not defined.
  • Installation Log = C:\Program Files\Cylance\Desktop\log
    • Default since not defined.

Example #2:

msiexec /I DellThreatDefenseSetup_x64.msi APPFOLDER="D:\Program Files\ATP" VENUEZONE=HelpDesk PIDKEY= Dh6312AwdhaJ29Y /L*V C:\Temp\TD_Install.log

Example #2 contains:

  • Installer = DellThreatDefenseSetup_x64.msi
  • Silent install = Yes
  • User Interface During Installation = No
  • Dell Threat Defense Tenant = 50UiRIN8ON5tznNaw213dM3
  • Protection Level = Local administrator
  • Visible Application Folder & Icon = Yes
    • Default value since not defined.
  • Zone Name = HelpDesk
  • VDI Fingerprint= Yes
    • Workstations deployed after the primary image create a unique fingerprint since VDI counter = 2 or greater (>1 results in a unique fingerprint).
  • AD Fingerprint= No
    • Default since not defined.
  • Installation Directory = D:\Program Files\ATP
  • Installation Log = C:\Program Files\Cylance\Desktop\log
    • Default since not defined.

Example #3:

msiexec /I DellThreatDefenseSetup_x64.msi LAUNCHAPP=1 VENUEZONE=Accounting PIDKEY= Dh6312AwdhaJ29Y AD=1 /L*V C:\Temp\TD_Install.log

Example #3 contains:

  • Installer = DellThreatDefenseSetup_x64.msi
  • Silent install = No
  • User Interface During Installation = Yes
  • Dell Threat Defense Tenant = Dh6312AwdhaJ29Y
  • Protection Level = System administrator
  • Visible Application Folder & Icon = No
  • Zone Name = Accounting
  • VDI Fingerprint= No
    • Default since not defined
  • AD Fingerprint= Yes
  • Installation Directory = D:\Program Files\Cylance\Desktop
    • Default since not defined
  • Installation Log = C:\Program Files\Cylance\Desktop\log
    • Default since not defined.
Note: Parameter switches and parameters are case-sensitive.

 

Parameters Values Required Purpose
PIDKEY= See Examples Below Yes Connects endpoint to Dell Threat Defense using an Installation Token1.
LAUNCHAPP= 0 No System tray icon and Start Menu folder is hidden at run-time.
1 (Default) System tray icon and Start Menu folder are not hidden at run-time.
SELFPROTECTIONLEVEL= 1 No Only local administrators can make changes to the registry and services.
2 (Default) Only system administrators can make changes to the registry and services.
APPFOLDER= See Examples Below No Modifies the default installation directory (C:\Program Files\Cylance\Desktop).
VENUEZONE= See Examples Below No Requires v1382 or later. Adds a device to a specific zone. If a zone does not exist, a zone is created using the name that is provided. If not specified, defaults to UNZONED.
VDI X No Installs Dell Threat Defense in a non-persistent VDI (virtual desktop infrastructure) environment. X = Counter for the total number of deployments before a unique fingerprint is created for the workstation.

1 For more information, reference How to Obtain an Installation Token for Dell Threat Defense.

CLI Installation Examples:

Example #1:

msiexec /I DellThreatDefenseSetup_x64.msi /QN SELFPROTECTIONLEVEL=1 PIDKEY= 50UiRIN8ON5tznNaw213dM3 /S

Example #1 contains:

  • Installer = DellThreatDefenseSetup_x64.msi
  • Silent install = Yes
  • User Interface During Installation = No
  • Dell Threat Defense Tenant = 50UiRIN8ON5tznNaw213dM3
  • Protection Level = Local administrator
  • Visible Application Folder & Icon = Yes
    • Default value since not defined.
  • Zone Name = UNZONED
    • Default since not defined.
  • VDI Deployment = No
    • Default since not defined.
  • Installation Directory = C:\Program Files\Cylance\Desktop
    • Default since not defined.
  • Installation Log = C:\Program Files\Cylance\Desktop\log
    • Default since not defined.

Example #2:

msiexec /I DellThreatDefenseSetup_x64.msi APPFOLDER="D:\Program Files\ATP" VENUEZONE=HelpDesk PIDKEY= Dh6312AwdhaJ29Y VDI=1 /L*V C:\Temp\TD_Install.log

Example #2 contains:

  • Installer = DellThreatDefenseSetup_x64.msi
  • Silent install = Yes
  • User Interface During Installation = No
  • Dell Threat Defense Tenant = 50UiRIN8ON5tznNaw213dM3
  • Protection Level = Local administrator
  • Visible Application Folder & Icon = Yes
    • Default value since not defined.
  • Zone Name = HelpDesk
  • VDI Deployment = Yes
    • Workstations deployed after the primary image create a unique fingerprint since VDI counter = 2 or greater (>1 results in a unique fingerprint).
  • Installation Directory = D:\Program Files\ATP
  • Installation Log = C:\Program Files\Cylance\Desktop\log
    • Default since not defined.

Click the Dell Threat Defense version for the proper installation steps. For more information, reference How to Identify the Dell Threat Defense Version.

To install the product:

  1. Double-click DellThreatDefense.dmg to mount the installer.
Note: To download DellThreatDefense.dmg, reference How to Download Dell Threat Defense.
  1. Double-click the Threat Defense icon to initiate the installation.

Dell Threat Defense icon

  1. Click Continue to verify that the operating system and hardware meet the product requirements.

Continue

Note: For more information about product requirements, reference Dell Threat Defense System Requirements.
  1. Click Continue to begin installation configuration.

Introduction

  1. Input the Dell Threat Defense tenant Installation Token and then click Continue.

Installation Token

Note: For more information about obtaining an installation token, reference How to Obtain an Installation Token for Dell Threat Defense.
  1. Optionally, Change Install Location and then click Install.

Installation Type

  1. Populate an administrator's Username and Password. Once populated, click Install Software.

Administrator credentials prompt

  1. Click Close upon successful installation.

Summary

Note: If the installation fails, reference How to Collect Logs for Dell Threat Defense.

To install the product:

  1. Double-click the CylanceProtect.dmg to mount the installer.
Note: To download CylanceProtect.dmg, reference How to Download Dell Threat Defense.
  1. Double-click the Protect icon to initiate the installation.

Protect icon

  1. Click Continue to verify that the operating system and hardware meet the system requirements.

Continue

Note: For more information about product requirements, reference Dell Threat Defense System Requirements.
  1. Click Continue to continue installation.

Introduction

  1. Enter the Dell Threat Defense tenant Installation Token and then click Continue.

Installation Token

Note: For more information about obtaining installation tokens, reference How to Obtain an Installation Token for Dell Threat Defense.
  1. Optionally, Change Install Location and then click Install.

Installation Type

  1. Populate an administrator’s Username and Password. Once populated, click Install Software.

Administrator credentials prompt

  1. Click Close upon successful installation.

Summary

Note: If the installation fails, reference How to Collect Logs for Dell Threat Defense.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

 

Additional Information

 

Videos

 

Article Properties


Affected Product

Dell Encryption, Dell Threat Defense

Last Published Date

19 Dec 2022

Version

16

Article Type

Solution