Skip to main content

Dell Encryption Personal Installation Guide v11.10

Encryption

  • Encryption Personal requires an entitlement to successfully install. The entitlement is supplied when you purchase Encryption Personal. Depending on how you purchase Encryption Personal, you may manually install the entitlement, using the simple instructions that accompany it. You may also enter the entitlement at the command line. If Encryption Personal is installed using Dell Digital Delivery, the entitlement installation is taken care of by the Dell Digital Delivery service. (The same binaries are used for Encryption Enterprise and Encryption Personal. The entitlement tells the installer which version to install.)
  • Microsoft and Office 365 accounts are supported when running Encryption Personal v11.0 or later on Windows 10.
  • To activate a Microsoft Live account with Encryption Personal, refer to KB article 124722.
  • A Windows password is required (if one does not already exist) to protect access to your encrypted data. Creating a password for your computer prevents others from logging on to your user account without your password. Encryption Personal will fail to activate if a password is not created.

  • Dell Encryption cannot be upgraded to v10.7.0 from versions earlier than v8.16.0. Endpoints running versions prior to v8.16.0 must upgrade to v8.16.0 then upgrade to v10.7.0.
  • Dell Encryption uses Intel's encryption instruction sets, Integrated Performance Primitives (IPP). For more information, see KB article 126015.
  1. Go to the Windows Control Panel (Start > Control Panel).
  2. Click the User Accounts icon.
  3. Click Create a password for your account.
  4. Enter a new password and re-enter the password.
  5. Optionally enter a password hint.
  6. Click Create Password.
  7. Restart your computer.
  • IT best practices should be followed during deployment. This includes, but is not limited to, controlled test environments for initial tests, and staggered deployments to users.
  • The user account performing the installation/upgrade/uninstallation must be a local or domain administrator user, which can be temporarily assigned by a deployment tool such as Microsoft SMS. A non-administrator user that has elevated privileges is not supported.
  • Back up all important data before beginning installation/uninstallation/upgrade.
  • Do not make changes to the computer, including inserting or removing external (USB) drives during installation/uninstallation/upgrade.
  • To reduce initial encryption time (as well as decryption time if uninstalling), run the Windows Disk Cleanup Wizard to remove temporary files and any other unnecessary data.
  • Turn off sleep mode during the initial encryption sweep to prevent an unattended computer from going to sleep. Encryption cannot occur on a sleeping computer (nor can decryption).
  • The Encryption client does not support dual boot configurations since it is possible to encrypt system files of the other operating system, which would interfere with its operation.
  • The master installer does not support upgrades from pre-v8.0 components. Extract the child installers from the master installer and upgrade the component individually. Should you have questions or concerns, contact Dell ProSupport.
  • The Encryption client now supports Audit Mode. Audit Mode allows administrators to deploy the Encryption client as part of the corporate image, rather than using a third-party SCCM or similar solutions to deploy the Encryption client. For instructions about how to install the Encryption client in a corporate image, see KB article 129990.
  • The TPM is used for sealing the General Purpose Key. Therefore, if running the Encryption client, clear the TPM in the BIOS before installing a new operating system on the target computer.
  • Encryption client is tested against and is compatible with several popular signature-based antiviruses and AI-driven antivirus solutions including McAfee Virus Scan Enterprise, McAfee Endpoint Security, Symantec Endpoint Protection, CylancePROTECT, CrowdStrike Falcon, Carbon Black Defense, and several others. Hard-coded exclusions are included by default for many antivirus providers to prevent incompatibilities between antivirus scanning and encryption.

    If your organization uses an unlisted antivirus provider or any compatibility issues are being seen, please see KB article 126046 or Contact Dell ProSupport for assistance validating configuration for interoperation between your software solutions and Dell Data Security solutions.

  • Operating system re-install is not supported. To re-install the operating system, perform a backup of the target computer, wipe the computer, install the operating system, then recover the encrypted data following established recovery procedures.

  • Be sure to periodically check dell.com/support for the most current documentation and Technical Advisories.
  • Following Windows 10 feature upgrade, a restart is required to finalize Dell Encryption. The following message displays in the notification area after Windows 10 feature upgrades:

Prerequisites

  • Microsoft .Net Framework 4.5.2 (or later) is required for the master and child installers. The installer does not install the Microsoft .Net Framework component.

    NOTE:.Net Framework 4.6 (or later) is required when running FIPS mode.
  • The master installer installs the following prerequisites if not already installed on the computer. When using the child installer, you must install this component before installing Encryption.

    Prerequisite

    • Visual C++ 2012 Update 4 or later Redistributable Package (x86 or x64)
    • Visual C++ 2017 Update 3 or later Redistributable Package (x86 or x64)

    • Applications and installation packages signed with SHA1 certificates will function but an error will display on the endpoint during installation or execution of the application without these updates installed

Hardware

  • The following table details the minimum supported computer hardware.

    Hardware

    • Intel Pentium or AMD Processor
    • 110 MB of available disk space
    • 512MB RAM

    NOTE:Additional free disk space is required to encrypt the files on the endpoint. This size varies based on policies and capacity of the drive.
  • The following table details supported optional computer hardware.

    Optional Embedded Hardware

    • TPM 1.2 or 2.0

Operating Systems

  • The following table details supported operating systems.

    Windows Operating Systems (32- and 64-bit)

Operating Systems Encryption External Media

  • External media must have approximately 55MB available plus open space on the media that is equal to the largest file to be encrypted to host Encryption External Media.
  • The following details supported operating systems when accessing Dell-protected media.

    Windows Operating Systems Supported to Access Encrypted Media (32- and 64-bit)

    Mac Operating Systems Supported to Access Encrypted Media (64-bit kernels)

    • macOS High Sierra 10.13.5 - 10.13.6
    • macOS Mojave 10.14.0 - 10.14.4
    • macOS Catalina 10.15.5 - 10.15.6

Localization

  • Encryption is multilingual user interface compliant and is localized in the following languages.

    Language Support

    • EN - English
    • JA - Japanese
    • ES - Spanish
    • KO - Korean
    • FR - French
    • PT-BR - Portuguese, Brazilian
    • IT - Italian
    • PT-PT - Portuguese, Portugal (Iberian)
    • DE - German

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\