How to Install Dell Encryption Personal

Summary: Learn how to install Dell Encryption Personal by following these step-by-step instructions for either the user interface (UI) or the command line (CLI).

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

This article provides the steps for installing Dell Encryption Personal (formerly Dell Data Protection Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection Personal Edition

Affected Versions:

  • v8.0.x and Later

Affected Operating Systems:

  • Windows

Dell Encryption Personal can be installed on Windows through the user interface (UI) or through command-line interface (CLI) switches. Click the appropriate method for more information.

Note: Dell Encryption Personal must be downloaded and extracted from the Master Installer.

UI

The installation process differs between versions.

Click the appropriate client version for specific installation steps. For more information about versioning, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

v10.1.0 and Later

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.
    Dell Encryption Personal installer icon
  2. If any missing requirements are detected, click Install. Otherwise, go to Step 3.
    Example of missing requirements
    Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  3. Click Next to proceed.
    Dell Encryption Personal welcome screen
  4. Accept the terms in the license agreement and then click Next.
    Dell Encryption Personal EULA screen
  5. Optionally, Change the installation location and then click Next.
    Dell Encryption Personal destination folder screen
  6. Select Encryption Personal, populate an Entitlement Key, and then click Next.
    Encryption Personal option and the entitlement key field
    Note:
    • Encryption Personal is automatically selected and grayed out if an Entitlement Key is detected on the system.
    • For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
    • The example used for the Entitlement Key will differ in your environment.
  7. Click Install.
    Dell Encryption Personal ready to install screen
  8. Upon installation, click Finish to close the UI.
    Dell Encryption Personal configuration completed screen
  9. Click Yes to reboot the computer.
    Reboot prompt

v10.0.0 to 10.0.1

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.
    Dell Encryption Personal installer icon
  2. If any missing requirements are detected, click Install. Otherwise, go to Step 3.
    Example of missing requirements
    Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  3. Click Next to proceed.
    Dell Encryption Personal welcome screen
  4. Accept the terms in the license agreement and then click Next.
    Dell Encryption Personal EULA screen
  5. Optionally, Change the installation location and then click Next.
    Dell Encryption Personal destination folder screen
  6. Select Encryption Personal, populate an Entitlement Key, and then click Next.
    Encryption Personal option and the entitlement key field
    Note:
    • Encryption Personal is automatically selected and grayed out if an Entitlement Key is detected on the system.
    • For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
    • The example used for the Entitlement Key will differ in your environment.
  7. Click Install.
    Dell Encryption Personal ready to install screen
  8. Upon installation, click Finish to close the UI.
    Dell Encryption Personal configuration completed screen
  9. Click Yes to reboot the computer.
    Reboot prompt

v8.15.0 to 8.18.0

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.
    Dell Encryption Personal installer icon
  2. If any missing requirements are detected, click Install. Otherwise, go to Step 3.
    Example of missing requirements
    Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  3. Click Next to proceed.
    Dell Encryption Personal welcome screen
  4. Accept the terms in the license agreement and then click Next.
    Dell Encryption Personal EULA screen
  5. Optionally, Change the installation location and then click Next.
    Dell Encryption Personal destination folder screen
  6. Select Personal Edition, populate an Entitlement Key, and then click Next.
    Personal Edition option and the entitlement key field
    Note:
    • Personal Edition is automatically selected and grayed out if an Entitlement Key is detected on the system.
    • For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
    • The example used for the Entitlement Key will differ in your environment.
  7. Click Install to begin the installation.
    Dell Encryption Personal ready to install screen
  8. Upon installation, click Finish to close the UI.
    Dell Encryption Personal configuration completed screen
  9. Click Yes to reboot the computer.
    Reboot prompt

v8.6.0 to 8.13.0

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.
    Dell Data Protection Personal Edition installer icon
  2. If any missing requirements are detected, click Install. Otherwise, go to Step 3.
    Example of missing requirements
    Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  3. Click Next to proceed.
    Dell Data Protection Personal Edition welcome screen
  4. Accept the terms in the license agreement and then click Next.
    Dell Data Protection Personal Edition EULA screen
  5. Optionally, Change the installation location and then click Next.
    Dell Data Protection Personal Edition destination folder screen
  6. Select Personal Edition, populate an Entitlement Key, and then click Next.
    Personal Edition option and the entitlement key field
    Note:
    • Personal Edition is automatically selected and grayed out if an Entitlement Key is detected on the system.
    • For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
    • The example used for the Entitlement Key will differ in your environment.
  7. Click Install to begin the installation.
    Dell Data Protection Personal Edition ready to install screen
  8. Upon installation, click Finish to close the UI.
    Dell Data Protection Personal Edition configuration completed screen
  9. Click Yes to reboot the computer.
    Reboot prompt

v8.0.0 to 8.5.1

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.
    Dell Data Protection Personal Edition installer icon
  2. If any missing requirements are detected, click Install. Otherwise, go to Step 3.
    Example of missing requirements
    Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  3. Click Next to proceed.
    Dell Data Protection Personal Edition welcome screen
  4. Accept the terms in the license agreement and then click Next.
    Dell Data Protection Personal Edition EULA screen
  5. Optionally, Change the installation location and then click Next.
    Dell Data Protection Personal Edition destination folder screen
  6. Locally Managed should be selected, click Next.
    Locally Managed option
    Note:
    • Locally Managed is only selected if a Dell Data Protection Personal Edition entitlement key is detected on the system.
    • For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
    • The example used for the Entitlement Key will differ in your environment.
  7. Click Install to begin the installation.
    Dell Data Protection Personal Edition ready to install screen
  8. Upon installation, click Finish to close the UI.
    Dell Data Protection Personal Edition configuration completed screen
  9. Click Yes to reboot the computer.
    Reboot prompt

CLI

The installation process differs between versions.

Click the appropriate client version for specific installation switches.

Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

v10.4.0 and Later

Dell Encryption Enterprise allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches are not case-sensitive.
Switch Meaning
/V Passes variables to the MSI file inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the MSI file in Silent Mode.
/X Runs the MSI file in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the MSI file with no user interface.
Note: Parameters are case-sensitive.
Parameters Values Purpose
ENTITLEMENT= See examples below Optionally specify an Encryption Personal Entitlement key to be used.
INSTALLDIR= See examples below Optionally change the installation directory.  The path must start and end with \" if the specified directory includes a space.
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Entitlement = Passed to installer
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Example #2:

DDPE_32bit_setup.exe /qb

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = None passed to installer; uses key stored in registry.
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
  • Reboot post install = No (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Example #3:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= INSTALLDIR=\"D:\Program Files\Dell\" /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = Passed to installer
  • Installation directory = D:\Program Files\Dell\
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

v8.0.0 to 10.3.1

Dell Encryption Personal allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches are not case-sensitive.
Switch Meaning
/V Passes variables to the MSI file inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the MSI file in Silent Mode.
/X Runs the MSI file in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the MSI file with no user interface.
Note: Parameters are case-sensitive.
Parameters Values Purpose
ENTITLEMENT= See examples below Optionally specify an Encryption Personal Entitlement key to be used.
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Entitlement = Passed to installer
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Example #2:

DDPE_32bit_setup.exe /qb

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = None passed to installer; uses key stored in registry.
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
  • Reboot post install = No (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Affected Products

Dell Encryption
Article Properties
Article Number: 000126832
Article Type: How To
Last Modified: 30 Sept 2025
Version:  13
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.