How to Install Dell Encryption Enterprise / Dell Data Protection Enterprise Edition

How to Install Dell Encryption Enterprise / Dell Data Protection Enterprise Edition


This article provides the steps for installing Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) and Dell Encryption Enterprise for Server (formerly Dell Data Protection | Server Encryption).


Affected Products:

Dell Encryption Enterprise
Dell Data Protection | Enterprise Edition
Dell Encryption Enterprise for Server
Dell Data Protection | Server Encryption

Affected Versions:

v8.0.X and Later




Dell Encryption Enterprise and Dell Encryption Enterprise for Server use the same installer. The installation can be performed on Windows through the user interface (UI) or command-line interface (CLI) switches. Click on the desired method for more information.

Note: Dell Encryption Enterprise must be downloaded and extracted from the Master Installer.

Click on the appropriate client version for specific installation steps.

Note: For information on locating the product version, reference How to Identify the Version of Dell Encryption Enterprise or Dell Encryption Personal.

To install the product via UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

  1. If any missing requirements are detected, click Install. Otherwise proceed to step 3.

Note: Missing requirements may differ in your environment from the screenshot example. For more information on product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

  1. Accept the terms in the license agreement and then click Next.

  1. Optionally Change the installation location and then click Next.

  1. Click On-Prem Dell Management Server and then click Next.

  1. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Note:
  • Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server.
  • The example used for Security Management Server will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (step 7) and then click Next.

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (step 7) and then click Next.

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

  1. Upon installation, click Finish to close the UI.

  1. Click Yes to reboot the machine.

To install the product via UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

  1. If any missing requirements are detected, click Install. Otherwise proceed to step 3.

Note: Missing requirements may differ in your environment from the screenshot example. For more information on product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

  1. Accept the terms in the license agreement and then click Next.

  1. Optionally Change the installation location and then click Next.

  1. Click On-Prem Dell Management Server and then click Next.

Note: Hosted Dell Security Center is not available at this time.
  1. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Note:
  • Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server.
  • The example used for Security Management Server will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (step 7) and then click Next.

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (step 7) and then click Next.

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

  1. Upon installation, click Finish to close the UI.

  1. Click Yes to reboot the machine.

To install the product via UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

  1. If any missing prequirements are detected, click Install. Otherwise proceed to step 3.

Note: Missing requirements may differ in your environment from the screenshot example. For more information on product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

  1. Accept the terms in the license agreement and then click Next.

  1. Optionally Change the installation location and then click Next.

  1. Click Enterprise Edition and then click Next.

  1. Populate the Security Management Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Note:
  • Security Management Server = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server.
  • The example used for Security Management Server will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Security Management Server Name (step 7) and then click Next.

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Security Management Server Name (step 7) and then click Next.

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

  1. Upon installation, click Finish to close the UI.

  1. Click Yes to reboot the machine.

To install the product via UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

  1. If any missing requirements are detected, click Install. Otherwise proceed to step 3.

Note: Missing requirements may differ in your environment from the screenshot example. For more information on product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

  1. Accept the terms in the license agreement and then click Next.

  1. Optionally Change the installation location and then click Next.

  1. Click Enterprise Edition and then click Next.

  1. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Note:
  • Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server.
  • The example used for Dell Enterprise Server Name will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (step 7) and then click Next.

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (step 7) and then click Next.

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

  1. Upon installation, click Finish to close the UI.

  1. Click Yes to reboot the machine.

To install the product via UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

  1. If any missing requirements are detected, click Install. Otherwise proceed to step 3.

Note: Missing requirements may differ in your environment from the screenshot example. For more information on product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

  1. Accept the terms in the license agreement and then click Next.

  1. Optionally Change the installation location and then click Next.

  1. Click Next.

  1. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Note:
  • Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server.
  • The example used for Dell Enterprise Server Name will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (step 7) and then click Next.

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (step 7) and then click Next.

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

  1. Upon installation, click Finish to close the UI.

  1. Click Yes to reboot the machine.

To install the product via UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

  1. If any missing requirements are detected, click Install. Otherwise proceed to step 3.

Note: Missing requirements may differ in your environment from the screenshot example. For more information on product system requirements, reference Dell Encryption Enterprise System Requirements.
  1. Click Next to proceed.

  1. Accept the terms in the license agreement and then click Next.

  1. Optionally Change the installation location and then click Next.

  1. Click Next.

  1. Populate the Dell Enterprise Server Name and optionally change the Managed Domain. Once populated click Next to proceed.

Note:
  • Dell Enterprise Server Name = Fully Qualified Domain Name (FQDN) or Internet Protocol (IP) of the Dell Security Management Server.
  • The example used for Dell Enterprise Server Name will differ in your environment.
  1. Change the Dell Policy Proxy Host Name if the FQDN differs from the Dell Enterprise Server Name (step 7) and then click Next.

Note: Port 8000 is used by default for policy inventory processing. This configuration may differ in your environment.
  1. Change the Dell Device Server URL if the FQDN differs from the Dell Enterprise Server Name (step 7) and then click Next.

Note: Port 8443 is used by default for activation. This configuration may differ in your environment.
  1. Click Install.

  1. Upon installation, click Finish to close the UI.

  1. Click Yes to reboot the machine.

Click on the appropriate client version for specific installation steps.

Note: For information on locating the product version, reference How to Identify the Version of Dell Encryption Enterprise or Dell Encryption Personal.

To install the product via CLI:

Dell Encryption Enterprise allows flexibility in command line installation options through the usage of switches, options, and parameters.

Note: Command line switches and parameters are case-sensitive.
Switch Meaning
/V Passes variables to the .MSI inside the executable. The content must always be enclosed in plain-text quotes.
/S Silent Mode
/X Uninstall Mode
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN No user interface.

Parameters Vallues Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy & inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address & port used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
MANAGEDDOMAIN= See Examples Below Organization domain name.
CALREPEAT= See Examples Below This parameter is required if SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, defaults to 0 (infinite times)
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files protected with Dell Data Security
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables systray shortcut) Hides the application from the Windows System Tray
1 (Disables the systray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode
OPTIN=1 0 (Prevents Opt-In) Enables users to activate post Windows authentication.
1 (Enables Opt-In)
ENABLE_FDE_LM 0 (Disables installation of Full Disk Encryption with active Dell Encryption Enterprise) Allows or disables installation of Full Disk Encryption to run concurrently with Dell Encryption Enterprise.
1 (Enables installation of Full Disk Encryption with Dell Encryption Enterprise)

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=1 SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Full Disk Encryption can also be installed = Yes
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post Windows authentication.
  • Activation retry (on failure) = Every 900 seconds till successful.
  • Reboot post install = No.
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ ENABLE_FDE_LM=0 SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Full Disk Encryption can also be installed = No
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) till successful.
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the Installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Full Disk Encryption can also be installed = No
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

To install the product via CLI:

Dell Encryption Enterprise allows flexibility in command line installation options through the usage of switches, options, and parameters.

Note: Command line switches and parameters are case-sensitive.
Switch Meaning
/V Passes variables to the .MSI inside the executable. The content must always be enclosed in plain-text quotes.
/S Silent Mode
/X Uninstall Mode
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN No user interface.

Parameters Vallues Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy & inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address & port used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
MANAGEDDOMAIN= See Examples Below Organization domain name.
CALREPEAT= See Examples Below This parameter is required if SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, defaults to 0 (infinite times)
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files protected with Dell Data Security
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables systray shortcut) Hides the application from the Windows System Tray
1 (Disables the systray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode
OPTIN=1 0 (Prevents Opt-In) Enables users to activate post Windows authentication.
1 (Enables Opt-In)

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post Windows authentication.
  • Activation retry (on failure) = Every 900 seconds till successful.
  • Reboot post install = No.
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) till successful.
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the Installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

To install the product via CLI:

Dell Encryption Enterprise allows flexibility in command line installation options through the usage of switches, options, and parameters.

Note: Command line switches and parameters are case-sensitive.
Switch Meaning
/V Passes variables to the .MSI inside the executable. The content must always be enclosed in plain-text quotes.
/S Silent Mode
/X Uninstall Mode
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN No user interface.

Parameters Values Purpose
SERVERHOSTNAME= See Examples Below This parameter is required. Fully qualified domain name (FQDN) or static IP of Dell Security Management Server
POLICYPROXYHOSTNAME= See Examples Below This parameter is required. FQDN or static IP of Dell Security Management Server used to process policy & inventory.
GKPORT= See Examples Below (Optionally) specify a nonstandard port. Defaults to 8000 if not specified. Port used with POLICYPROXYHOSTNAME.
DEVICESERVERURL= See Examples Below This parameter is required. Web address & port used to activate Dell Data Security endpoints.
SLOTTEDACTIVATION= 0 (Disables slotted activation) (Optionally) delay activation of Dell Data Security from boot.
1 (Enables slotted activation)
CALREPEAT= See Examples Below This parameter is required if SLOTTEDACTIVATION value 1 is chosen. Schedules how long to retry on failed activations. The value is time in seconds.
SLOTINTERVALS= See Examples Below This parameter is required if SLOTTEDACTIVATION value 1 is chosen. Sets a range of time to randomly attempt an activation. The value is time in seconds.
MISSTHRESHHOLD= See Examples Below This optional parameter can only be used if SLOTTEDACTIVATION value 1 is chosen. Sets how many attempts to activate before a reboot is required. If not defined, defaults to 0 (infinite times)
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary
HIDEOVERLAYICONS= 0 (Enables overlay icons on protected files) Hides the icon indicator for files protected with Dell Data Security
1 (Disables overlay icons on protected files)
HIDESYSTRAYICON= 0 (Enables systray shortcut) Hides the application from the Windows System Tray
1 (Disables the systray shortcut)
EME= 1 (EEM Mode) Installs as Encryption External Media (EEM) mode

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN2.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=900 SLOTINTERVALS=120,600 REBOOT=ReallySuppress /l*v C:\Dell\ShieldInstall.log /qn"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN2.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 120 to 600 seconds post Windows authentication.
  • Activation retry (on failure) = Every 900 seconds till successful.
  • Reboot post install = No.
  • Installation Log = C:\Dell\ShieldInstall.log

Example #2:

DDPE_32bit_setup.exe /s /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com DEVICESERVERURL=https://FQDN.domain.com:8443/xapi/ SLOTTEDACTIVATION=1 CALREPEAT=3600 SLOTINTERVALS=90,150 REBOOT=ReallySuppress /l*v ShieldInstall.log /qn"

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = Yes
  • Dell Security Management Server = FQDN.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 8000 (Default value since not defined)
  • Activation URL = https://FQDN.domain.com:8443/xapi/
  • Slotted Activation enabled = Yes
  • Activation attempt = 90 to 150 seconds post Windows authentication
  • Activation retry (on failure) = Every 3,600 seconds (one hour) till successful.
  • Reboot post install = Yes (Default value since not defined)
  • Installation Log = ShieldInstall.log created in the directory of the Installer

Example #3:

DDPE_32bit_setup.exe /v"SERVERHOSTNAME=FQDN.domain.com POLICYPROXYHOSTNAME=FQDN.domain.com GKPORT=1234 DEVICESERVERURL=https://DMZServer.domain.com:1111/xapi/ REBOOT=ReallySuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Dell Security Management Server = DMZServer.domain.com
  • Policy Proxy location = FQDN.domain.com
  • Policy Proxy port = 1234
  • Activation URL = https://FQDN.domain.com:1111/xapi/
  • Slotted Activation enabled = No
  • Activation attempt = At Windows authentication (Default value since not defined)
  • Activation retry = On reboot (Default value since not defined)
  • Reboot post install = No
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

For support, US-based customers may contact Dell Data Security ProSupport at 877.459.7304, Option 1, Ext. 4310039, or via the Chat Portal. To contact support outside the US, reference ProSupport’s International Contact Numbers. For additional insights and resources, visit the Dell Security Community Forum.



Article ID: SLN308184

Last Date Modified: 09/14/2019 09:55 AM


Rate this article

Accurate
Useful
Easy to understand
Was this article helpful?
Yes No
Send us feedback
Comments cannot contain these special characters: <>()\
Sorry, our feedback system is currently down. Please try again later.

Thank you for your feedback.