Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

Commonly Used Scenarios

  • To install each client individually, the child executable files must first be extracted from the Endpoint Security Suite Enterprise master installer, as shown in Extract the Child Installers from the Master Installer.
  • The Advanced Threat Prevention child installer component should be installed by command line only. Double-clicking to install this component installs a non-Dell, non-managed version of the product, which is not supported. If this is accidentally done, simply go to Add/Remove Programs and uninstall that version.
  • Command line switches and parameters are case-sensitive.
  • Be sure to enclose a value that contains one or more special characters, such as a blank space in the command line, in escaped quotation marks.
  • Use these installers to install the clients using a scripted installation, batch files, or any other push technology available to your organization.
  • The reboot has been suppressed in the command line examples. However, an eventual reboot is required. Encryption cannot begin until the computer has rebooted.
  • Log files - Windows creates unique child installer installation log files for the logged in user at %temp%, located at C:\Users\<UserName>\AppData\Local\Temp.

    If you decide to add separate a log file when you run the installer, ensure that the log file has a unique name, as child installer log files do not append. The standard .msi command can be used be create a log file by using /l*v C:\<any directory>\<any log file name>.log.

  • All child installers use the same basic .msi switches and display options, except where noted, for command line installations. The switches must be specified first. The /v switch is required and takes an argument. Other parameters go inside an argument that is passed to the /v switch.

    Display options can be specified at the end of the argument passed to the /v switch to achieve the expected behavior. Do not use both /q and /qn in the same command line. Only use ! and - after /qb.

    Switch

    Meaning

    /v

    Pass variables to the .msi inside the *.exe

    /s

    Silent mode

    /i

    Install mode

    Option

    Meaning

    /q

    No Progress dialog, restarts itself after process completion

    /qb

    Progress dialog with Cancel button, prompts for restart

    /qb-

    Progress dialog with Cancel button, restarts itself after process completion

    /qb!

    Progress dialog without Cancel button, prompts for restart

    /qb!-

    Progress dialog without Cancel button, restarts itself after process completion

    /qn

    No user interface

  • Instruct users to see the following document and help files for application assistance:

    • See the Dell Encrypt Help to learn how to use the features of Encryption. Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\Encryption\Help.
    • See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\Encryption\EMS
    • See the Endpoint Security Suite Enterprise Help to learn how to use the features of Advanced Threat Prevention. Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\Advanced Threat Prevention\Help.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\