This article covers the installation process for Dell Threat Defense in a Windows and Mac environment.
Affected Products:
Dell Threat Defense
Affected Versions:
v1372 and Later
Affected Operating Systems:
Windows
Mac
Not applicable.
Click the appropriate operating system platform for the installation process.
Dell Threat Defense can be installed on Windows through the:
Dell Threat Defense allows flexibility in command-line installation options by using switches, options, and parameters.
Switch | Meaning |
---|---|
/V | Pass variables to the .msi inside the executable. The content must always be enclosed in plain-text quotes. |
/I | Configures package for installation |
/S | Silent Mode |
/X | Uninstall Mode |
/L*V | Modifies the installation logging name and output location with verbosity enabled. |
/QB | User interface with Cancel button. Prompts for device reboot on installation completion. |
/QB- | Installation UI with Cancel button. Reboots device automatically on installation completion. |
/QB! | User interface without Cancel button. Prompts for device reboot on installation completion. |
/QB!- | Installation UI without Cancel button. Reboots device automatically on installation completion. |
/QN | No user interface. |
Click the Dell Threat Defense version for supported parameters. For more information, reference How to Identify the Dell Threat Defense Version.
Parameters | Values | Required | Purpose |
---|---|---|---|
PIDKEY= | See Examples Below | Yes | Connects endpoint to Dell Threat Defense using an Installation Token1. |
LAUNCHAPP= | 0 | No | System tray icon and Start Menu folder is hidden at run-time. |
1 (Default) | System tray icon and Start Menu folder are not hidden at run-time. | ||
SELFPROTECTIONLEVEL= | 1 | No | Only local administrators can make changes to the registry and services. |
2 (Default) | Only system administrators can make changes to the registry and services. | ||
APPFOLDER= | See Examples Below | No | Modifies the default installation directory (C:\Program Files\Cylance\Desktop). |
VENUEZONE= | See Examples Below | No | Requires v1382 or later. Adds a device to a specific zone. If a zone does not exist, a zone is created using the name that is provided. If not specified, defaults to UNZONED. |
VDI | X | No | Installs Dell Threat Defense in a non-persistent VDI (virtual desktop infrastructure) environment. X = Counter for the total number of deployments before a unique fingerprint is created for the workstation. |
AD | 0 (Default) | No | Hostname is used for workstation fingerprint. |
1 | Used in deployment of Dell Threat Defense on a primary image. Ties the workstation fingerprint to the Computer SID instead of hostname. Value takes precedence over the VDI parameter flag. |
1 For more information, reference How to Obtain an Installation Token for Dell Threat Defense.
CLI Installation Examples:
Example #1:
msiexec /I DellThreatDefenseSetup_x64.msi /QN SELFPROTECTIONLEVEL=1 PIDKEY= 50UiRIN8ON5tznNaw213dM3 /S
Example #1 contains:
Example #2:
msiexec /I DellThreatDefenseSetup_x64.msi APPFOLDER="D:\Program Files\ATP" VENUEZONE=HelpDesk PIDKEY= Dh6312AwdhaJ29Y /L*V C:\Temp\TD_Install.log
Example #2 contains:
Example #3:
msiexec /I DellThreatDefenseSetup_x64.msi LAUNCHAPP=1 VENUEZONE=Accounting PIDKEY= Dh6312AwdhaJ29Y AD=1 /L*V C:\Temp\TD_Install.log
Example #3 contains:
Parameters | Values | Required | Purpose |
---|---|---|---|
PIDKEY= | See Examples Below | Yes | Connects endpoint to Dell Threat Defense using an Installation Token1. |
LAUNCHAPP= | 0 | No | System tray icon and Start Menu folder is hidden at run-time. |
1 (Default) | System tray icon and Start Menu folder are not hidden at run-time. | ||
SELFPROTECTIONLEVEL= | 1 | No | Only local administrators can make changes to the registry and services. |
2 (Default) | Only system administrators can make changes to the registry and services. | ||
APPFOLDER= | See Examples Below | No | Modifies the default installation directory (C:\Program Files\Cylance\Desktop). |
VENUEZONE= | See Examples Below | No | Requires v1382 or later. Adds a device to a specific zone. If a zone does not exist, a zone is created using the name that is provided. If not specified, defaults to UNZONED. |
VDI | X | No | Installs Dell Threat Defense in a non-persistent VDI (virtual desktop infrastructure) environment. X = Counter for the total number of deployments before a unique fingerprint is created for the workstation. |
1 For more information, reference How to Obtain an Installation Token for Dell Threat Defense.
CLI Installation Examples:
Example #1:
msiexec /I DellThreatDefenseSetup_x64.msi /QN SELFPROTECTIONLEVEL=1 PIDKEY= 50UiRIN8ON5tznNaw213dM3 /S
Example #1 contains:
Example #2:
msiexec /I DellThreatDefenseSetup_x64.msi APPFOLDER="D:\Program Files\ATP" VENUEZONE=HelpDesk PIDKEY= Dh6312AwdhaJ29Y VDI=1 /L*V C:\Temp\TD_Install.log
Example #2 contains:
Click the Dell Threat Defense version for the proper installation steps. For more information, reference How to Identify the Dell Threat Defense Version.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.