Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Encryption Enterprise Advanced Installation Guide v11.9

Install Using the Child Installers

  • To install or upgrade each client individually, the child executable files must first be extracted from the master installer, as shown in Extract the Child Installers from the Master Installer.
  • Command examples included in this section assume the commands are run from C:\extracted.
  • Command line switches and parameters are case-sensitive.
  • Be sure to enclose a value that contains one or more special characters, such as a blank space in the command line, in escaped quotation marks.
  • Use these installers to install the clients using a scripted installation, batch files, or any other push technology available to your organization.
  • The reboot has been suppressed in the command line examples. However, an eventual reboot is required.

    Note: Policy-Based Encryption cannot begin until the computer has rebooted.

  • Log files - Windows creates unique child installer installation log files for the logged in user at %temp%, located at C:\Users\<UserName>\AppData\Local\Temp.

    If you decide to add separate a log file when you run the installer, ensure that the log file has a unique name, as child installer log files do not append. The standard .msi command can be used be create a log file by using /l*v C:\<any directory>\<any log file name>.log.

  • All child installers use the same basic .msi switches and display options, except where noted, for command line installations. The switches must be specified first. The /v switch is required and takes an argument. Other parameters go inside an argument that is passed to the /v switch.

    Display options can be specified at the end of the argument passed to the /v switch to achieve the expected behavior. Do not use both /q and /qn in the same command line. Only use ! and - after /qb.

    Switch

    Meaning

    /v

    Pass variables to the .msi inside the  setup.exe. The content must always be enclosed in plain-text quotes.

    /s

    Silent mode

    /x

    Uninstall mode

    NOTE:

    With /v, the Microsoft default options are available. For a list of options, see this article.

    Option

    Meaning

    /q

    No Progress dialog, restarts itself after process completion

    /qb

    Progress dialog with Cancel button, prompts for restart

    /qb-

    Progress dialog with Cancel button, restarts itself after process completion

    /qb!

    Progress dialog without Cancel button, prompts for restart

    /qb!-

    Progress dialog without Cancel button, restarts itself after process completion

    /qn

    No user interface

    /norestart

    Suppress reboot

  • Instruct users to see the following document and help files for application assistance:

    • See the Dell Encrypt Help to learn how to use the features of Encryption. Access the help from <Install dir>\Program Files\Dell\Dell Data Protection\Encryption\Help.
    • See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from <Install dir>\Program Files\Dell\Dell Data Protection\Encryption\EMS.
    • See the Encryption Enterprise to learn how to use the features of PBA authentication . Access the help from <Install dir>\Program Files\Dell\Dell Data Protection\Client Security Framework\Help.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\