Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

How to Install Dell Encryption Personal

Summary: Dell Encryption Personal and Dell Data Protection Personal Edition can be installed by following these instructions for either the user interface (UI) or the command line (CLI).

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

This article provides the steps for installing Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Versions:

  • v8.0.x and Later

Affected Operating Systems:

  • Windows

Cause

Not applicable

Resolution

Dell Encryption Personal can be installed on Windows through the user interface (UI) or through command-line interface (CLI) switches. Click on the appropriate method for more information.

Note: Dell Encryption Personal must be downloaded and extracted from the Master Installer.

UI

Click on the appropriate client version for specific installation steps. For more information about versioning, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

To install the product by UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption Personal installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Encryption Personal welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Encryption Personal EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Encryption Personal destination folder screen

  1. Select Encryption Personal, populate an Entitlement Key, and then click Next.

Encryption Personal option and the entitlement key field

Note:
  1. Click Install.

Dell Encryption Personal ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Encryption Personal configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption Personal installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Encryption Personal welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Encryption Personal EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Encryption Personal destination folder screen

  1. Select Encryption Personal, populate an Entitlement Key, and then click Next.

Encryption Personal option and the entitlement key field

Note:
  1. Click Install.

Dell Encryption Personal ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Encryption Personal configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Encryption Personal installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Encryption Personal welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Encryption Personal EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Encryption Personal destination folder screen

  1. Select Personal Edition, populate an Entitlement Key, and then click Next.

Personal Edition option and the entitlement key field

Note:
  1. Click Install to begin the installation.

Dell Encryption Personal ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Encryption Personal configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Data Protection Personal Edition installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Data Protection Personal Edition welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Data Protection Personal Edition EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Data Protection Personal Edition destination folder screen

  1. Select Personal Edition, populate an Entitlement Key, and then click Next.

Personal Edition option and the entitlement key field

Note:
  1. Click Install to begin the installation.

Dell Data Protection Personal Edition ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Data Protection Personal Edition configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

To install the product using UI:

  1. Double-click DDPE_64bit_setup.exe or DDPE_32bit_setup.exe to launch the installation wizard.

Dell Data Protection Personal Edition installer icon

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 3.

Example of missing requirements

Note: Missing requirements may differ in your environment from the screenshot example. For more information about product system requirements, reference Dell Encryption Personal System Requirements.
  1. Click Next to proceed.

Dell Data Protection Personal Edition welcome screen

  1. Accept the terms in the license agreement and then click Next.

Dell Data Protection Personal Edition EULA screen

  1. Optionally, Change the installation location and then click Next.

Dell Data Protection Personal Edition destination folder screen

  1. Locally Managed should be selected, click Next.

Locally Managed option

Note:
  1. Click Install to begin the installation.

Dell Data Protection Personal Edition ready to install screen

  1. Upon installation, click Finish to close the UI.

Dell Data Protection Personal Edition configuration completed screen

  1. Click Yes to reboot the machine.

Reboot prompt

CLI

Click on the appropriate client version for specific installation switches.

Note: For information about locating the product version, reference How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

Dell Encryption Enterprise allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches are not case-sensitive.

 

Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Note: Parameters are case-sensitive.

 

Parameters Values Purpose
ENTITLEMENT= See Examples Below (Optionally) specify an Encryption Personal Entitlement key to be used.
INSTALLDIR= See Examples Below (Optionally) change the installation directory.  The path must start and end with \" if the specified directory includes a space.
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Entitlement = Passed to installer
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Example #2:

DDPE_32bit_setup.exe /qb

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = None passed to installer, uses key stored in registry.
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
  • Reboot post install = No (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

Example #3:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= INSTALLDIR=\"D:\Program Files\Dell\" /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #3 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = Passed to installer
  • Installation directory = D:\Program Files\Dell\
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Dell Encryption Personal allows flexibility in command-line installation options by using switches, options, and parameters.

Note: Command-line switches are not case-sensitive.

 

Switch Meaning
/V Passes variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes.
/S Installs the .msi in Silent Mode.
/X Runs the .msi in Uninstall Mode.
/L*V Logging verbose output. The content must always be enclosed in plain-text quotes.
/QB User interface with Cancel button. Prompts for device reboot on installation completion.
/QB- Installation UI with Cancel button. Reboots device automatically on installation completion.
/QB! User interface without Cancel button. Prompts for device reboot on installation completion.
/QB!- Installation UI without Cancel button. Reboots device automatically on installation completion.
/QN Runs the .msi with no user interface.

 

Note: Parameters are case-sensitive.

 

Parameters Values Purpose
ENTITLEMENT= See Examples Below (Optionally) specify an Encryption Personal Entitlement key to be used.
REBOOT= REALLYSUPPRESS Prevents reboot, though a reboot is still necessary.

CLI Installation Examples:

Example #1:

DDPE_64bit_setup.exe /s /v"ENTITLEMENT=1:PE:{abc123ab-c123-abc1-23ab-c123abc123ab}:c123abc123abc123abc123abc123abc123abc123abc123abc= /l*v Shieldinstall.log /qn reboot=reallysuppress"

Example #1 contains:

  • Installer = DDPE_64bit_setup.exe
  • Silent install = Yes
  • Entitlement = Passed to installer
  • Installation Log = ShieldInstall.log created in the directory of the installer
  • Reboot post install = No
Note: The example entitlement must be replaced with a purchased license.

Example #2:

DDPE_32bit_setup.exe /qb

Example #2 contains:

  • Installer = DDPE_32bit_setup.exe
  • Silent install = No
  • Entitlement = None passed to installer, uses key stored in registry.
  • Installation Log = %TEMP%\MSIXXXX.log (Default value since not defined)
  • Reboot post install = No (Default value since not defined)
Note: In MSIXXXX.log, a random alphanumeric is assigned for XXXX.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Additional Information

   

Videos

   

Article Properties


Affected Product

Dell Encryption

Last Published Date

11 Apr 2023

Version

12

Article Type

Solution