Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.

Endpoint Security Suite Pro Advanced Installation Guide v1.8

PDF

Commonly Used Scenarios

  • To install each client individually, the child executable files must first be extracted from the Endpoint Security Suite Pro master installer, as shown in Extract the Child Installers from the Master Installer.
  • The SED client is required for Advanced Authentication in v8.x, which is why it is part of the command line in the following examples.
  • Command line switches and parameters are case-sensitive.
  • Be sure to enclose a value that contains one or more special characters, such as a blank space in the command line, in escaped quotation marks.
  • Use these installers to install the clients using a scripted installation, batch files, or any other push technology available to your organization.
  • The reboot has been suppressed in the command line examples. However, an eventual reboot is required. Encryption cannot begin until the computer has rebooted.
  • Log files - Windows creates unique child installer installation log files for the logged in user at %temp%, located at C:\Users\<UserName>\AppData\Local\Temp.

    If you decide to add separate a log file when you run the installer, ensure that the log file has a unique name, as child installer log files do not append. The standard .msi command can be used be create a log file by using /l*v C:\<any directory>\<any log file name>.log.

  • All child installers use the same basic .msi switches and display options, except where noted, for command line installations. The switches must be specified first. The /v switch is required and takes an argument. Other parameters go inside an argument that is passed to the /v switch.

    Display options can be specified at the end of the argument passed to the /v switch to achieve the expected behavior. Do not use both /q and /qn in the same command line. Only use ! and - after /qb.

    Switch

    Meaning

    /v

    Pass variables to the .msi inside the *.exe

    /s

    Silent mode

    /i

    Install mode

    Option

    Meaning

    /q

    No Progress dialog, restarts itself after process completion

    /qb

    Progress dialog with Cancel button, prompts for restart

    /qb-

    Progress dialog with Cancel button, restarts itself after process completion

    /qb!

    Progress dialog without Cancel button, prompts for restart

    /qb!-

    Progress dialog without Cancel button, restarts itself after process completion

    /qn

    No user interface

  • Instruct users to see the following document and help files for application assistance:

    • See the Dell Encrypt Help to learn how to use the feature of the Encryption client. Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\Encryption\Help.
    • See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\Encryption\EMS
    • See the Endpoint Security Suite Pro Help to learn how to use the features of Advanced Authentication and Threat Protection. Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\ Endpoint Security Suite \Threat Protection \Help.

Évaluez ce contenu

Précis
Utile
Facile à comprendre
Avez-vous trouvé cet article utile ?
0/3000 characters
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez indiquer si l’article a été utile ou non.
  Les commentaires ne doivent pas contenir les caractères spéciaux : <>()\