Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

Install Using the Child Installers

  • To install or upgrade each client individually, the child executable files must first be extracted from the Endpoint Security Suite Enterprise master installer, as shown in Extract the Child Installers from the Master Installer.
  • Command examples included in this section assume the commands are run from C:\extracted.
  • Command line switches and parameters are case-sensitive.
  • Be sure to enclose a value that contains one or more special characters, such as a blank space in the command line, in escaped quotation marks.
  • Use these installers to install the clients using a scripted installation, batch files, or any other push technology available to your organization.
  • The reboot has been suppressed in the command line examples. However, an eventual reboot is required.

    Note: Policy-Based Encryption cannot begin until the computer has rebooted.

  • Log files - Windows creates unique child installer installation log files for the logged in user at %temp%, located at C:\Users\<UserName>\AppData\Local\Temp.

    If you decide to add separate a log file when you run the installer, ensure that the log file has a unique name, as child installer log files do not append. The standard .msi command can be used be create a log file by using /l*v C:\<any directory>\<any log file name>.log.

  • All child installers use the same basic .msi switches and display options, except where noted, for command line installations. The switches must be specified first. The /v switch is required and takes an argument. Other parameters go inside an argument that is passed to the /v switch.

    Display options can be specified at the end of the argument passed to the /v switch to achieve the expected behavior. Do not use both /q and /qn in the same command line. Only use ! and - after /qb.

    Switch

    Meaning

    /v

    Pass variables to the .msi inside the  setup.exe. The content must always be enclosed in plain-text quotes.

    /s

    Silent mode

    /x

    Uninstall mode

    NOTE:

    With /v, the Microsoft default options are available. For a list of options, see this article.

    Option

    Meaning

    /q

    No Progress dialog, restarts itself after process completion

    /qb

    Progress dialog with Cancel button, prompts for restart

    /qb-

    Progress dialog with Cancel button, restarts itself after process completion

    /qb!

    Progress dialog without Cancel button, prompts for restart

    /qb!-

    Progress dialog without Cancel button, restarts itself after process completion

    /qn

    No user interface

    /norestart

    Suppress reboot

  • Instruct users to see the following document and help files for application assistance:

    • See the Dell Encrypt Help to learn how to use the features of Encryption. Access the help from <Install dir>\Program Files\Dell\Dell Data Protection\Encryption\Help.
    • See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from <Install dir>\Program Files\Dell\Dell Data Protection\Encryption\EMS.
    • See the Endpoint Security Suite Enterprise Help to learn how to use the features of Advanced Threat Prevention. Access the help from <Install dir>\Program Files\Dell\Dell Data Protection\Client Security Framework\Help.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\