How to Install Dell Encryption Personal
Summary: Learn how to install Dell Encryption Personal by following these step-by-step instructions for either the user interface (UI) or the command line (CLI).
Instructions
This article provides the steps for installing Dell Encryption Personal (formerly Dell Data Protection Personal Edition).
Affected Products:
- Dell Encryption Personal
- Dell Data Protection Personal Edition
Affected Versions:
- v8.0.x and Later
Affected Operating Systems:
- Windows
Dell Encryption Personal can be installed on Windows through the user interface (UI) or through command-line interface (CLI) switches. Click the appropriate method for more information.
- For information about the download process, reference How to Download Dell Encryption Enterprise or Dell Encryption Personal.
- For information about the extraction process, reference How to Extract Child Installers from the Dell Data Security Master Installer.
UI
The installation process differs between versions.
Click the appropriate client version for specific installation steps. For more information about versioning, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.
v10.1.0 and Later
- Double-click
DDPE_64bit_setup.exeorDDPE_32bit_setup.exeto launch the installation wizard.
- If any missing requirements are detected, click Install. Otherwise, go to Step 3.
Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements. - Click Next to proceed.

- Accept the terms in the license agreement and then click Next.

- Optionally, Change the installation location and then click Next.

- Select Encryption Personal, populate an Entitlement Key, and then click Next.
Note:- Encryption Personal is automatically selected and grayed out if an Entitlement Key is detected on the system.
- For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
- The example used for the Entitlement Key will differ in your environment.
- Click Install.

- Upon installation, click Finish to close the UI.

- Click Yes to reboot the computer.

v10.0.0 to 10.0.1
- Double-click
DDPE_64bit_setup.exeorDDPE_32bit_setup.exeto launch the installation wizard.
- If any missing requirements are detected, click Install. Otherwise, go to Step 3.
Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements. - Click Next to proceed.

- Accept the terms in the license agreement and then click Next.

- Optionally, Change the installation location and then click Next.

- Select Encryption Personal, populate an Entitlement Key, and then click Next.
Note:- Encryption Personal is automatically selected and grayed out if an Entitlement Key is detected on the system.
- For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
- The example used for the Entitlement Key will differ in your environment.
- Click Install.

- Upon installation, click Finish to close the UI.

- Click Yes to reboot the computer.

v8.15.0 to 8.18.0
- Double-click
DDPE_64bit_setup.exeorDDPE_32bit_setup.exeto launch the installation wizard.
- If any missing requirements are detected, click Install. Otherwise, go to Step 3.
Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements. - Click Next to proceed.

- Accept the terms in the license agreement and then click Next.

- Optionally, Change the installation location and then click Next.

- Select Personal Edition, populate an Entitlement Key, and then click Next.
Note:- Personal Edition is automatically selected and grayed out if an Entitlement Key is detected on the system.
- For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
- The example used for the Entitlement Key will differ in your environment.
- Click Install to begin the installation.

- Upon installation, click Finish to close the UI.

- Click Yes to reboot the computer.

v8.6.0 to 8.13.0
- Double-click
DDPE_64bit_setup.exeorDDPE_32bit_setup.exeto launch the installation wizard.
- If any missing requirements are detected, click Install. Otherwise, go to Step 3.
Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements. - Click Next to proceed.

- Accept the terms in the license agreement and then click Next.

- Optionally, Change the installation location and then click Next.

- Select Personal Edition, populate an Entitlement Key, and then click Next.
Note:- Personal Edition is automatically selected and grayed out if an Entitlement Key is detected on the system.
- For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
- The example used for the Entitlement Key will differ in your environment.
- Click Install to begin the installation.

- Upon installation, click Finish to close the UI.

- Click Yes to reboot the computer.

v8.0.0 to 8.5.1
- Double-click
DDPE_64bit_setup.exeorDDPE_32bit_setup.exeto launch the installation wizard.
- If any missing requirements are detected, click Install. Otherwise, go to Step 3.
Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements. - Click Next to proceed.

- Accept the terms in the license agreement and then click Next.

- Optionally, Change the installation location and then click Next.

- Locally Managed should be selected, click Next.
Note:- Locally Managed is only selected if a Dell Data Protection Personal Edition entitlement key is detected on the system.
- For more information about obtaining and installing an entitlement key, reference How to Manage Entitlements for Dell Data Security.
- The example used for the Entitlement Key will differ in your environment.
- Click Install to begin the installation.

- Upon installation, click Finish to close the UI.

- Click Yes to reboot the computer.

CLI
The installation process differs between versions.
Click the appropriate client version for specific installation switches.
v10.4.0 and Later
Dell Encryption Enterprise allows flexibility in command-line installation options by using switches, options, and parameters.
| Switch | Meaning |
|---|---|
/V |
Passes variables to the MSI file inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the MSI file in Silent Mode. |
/X |
Runs the MSI file in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- |
Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the MSI file with no user interface. |
| Parameters | Values | Purpose |
|---|---|---|
ENTITLEMENT= |
See examples below | Optionally specify an Encryption Personal Entitlement key to be used. |
INSTALLDIR= |
See examples below | Optionally change the installation directory. The path must start and end with \" if the specified directory includes a space. |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"
Example #1 contains:
- Installer =
DDPE_64bit_setup.exe - Silent install = Yes
- Entitlement = Passed to installer
- Installation Log =
ShieldInstall.logcreated in the directory of the installer - Reboot post install = No
Example #2:
DDPE_32bit_setup.exe /qb
Example #2 contains:
- Installer =
DDPE_32bit_setup.exe - Silent install = No
- Entitlement = None passed to installer; uses key stored in registry.
- Installation Log =
%TEMP%\MSIXXXX.log(Default value since not defined) - Reboot post install = No (Default value since not defined)
MSIXXXX.log, a random alphanumeric is assigned for XXXX.
Example #3:
DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= INSTALLDIR=\"D:\Program Files\Dell\" /l*v Shieldinstall.log /qn reboot=reallysuppress"
Example #3 contains:
- Installer =
DDPE_32bit_setup.exe - Silent install = No
- Entitlement = Passed to installer
- Installation directory =
D:\Program Files\Dell\ - Installation Log =
ShieldInstall.logcreated in the directory of the installer - Reboot post install = No
v8.0.0 to 10.3.1
Dell Encryption Personal allows flexibility in command-line installation options by using switches, options, and parameters.
| Switch | Meaning |
|---|---|
/V |
Passes variables to the MSI file inside the executable. The content must always be enclosed in plain-text quotes. |
/S |
Installs the MSI file in Silent Mode. |
/X |
Runs the MSI file in Uninstall Mode. |
/L*V |
Logging verbose output. The content must always be enclosed in plain-text quotes. |
/QB |
User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- |
Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! |
User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- |
Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN |
Runs the MSI file with no user interface. |
| Parameters | Values | Purpose |
|---|---|---|
ENTITLEMENT= |
See examples below | Optionally specify an Encryption Personal Entitlement key to be used. |
REBOOT= |
REALLYSUPPRESS |
Prevents reboot, though a reboot is still necessary. |
CLI Installation Examples:
Example #1:
DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"
Example #1 contains:
- Installer =
DDPE_64bit_setup.exe - Silent install = Yes
- Entitlement = Passed to installer
- Installation Log =
ShieldInstall.logcreated in the directory of the installer - Reboot post install = No
Example #2:
DDPE_32bit_setup.exe /qb
Example #2 contains:
- Installer =
DDPE_32bit_setup.exe - Silent install = No
- Entitlement = None passed to installer; uses key stored in registry.
- Installation Log =
%TEMP%\MSIXXXX.log(Default value since not defined) - Reboot post install = No (Default value since not defined)
MSIXXXX.log, a random alphanumeric is assigned for XXXX.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.