Administrator Guide
Table Of Contents
- Dell Encryption Enterprise Advanced Installation Guide v11.1
- Contents
- Introduction
- Requirements
- Registry Settings
- Install Using the Master Installer
- Uninstall the Master Installer
- Install Using the Child Installers
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Commonly Used Scenarios
- Download the Software
- Pre-Installation Configuration for SED UEFI, and BitLocker Manager
- Designate the Dell Server through Registry
- Extract Child Installers
- Configure Key Server
- Use the Administrative Download Utility (CMGAd)
- Configure Encryption on a Server Operating System
- Configure Deferred Activation
- Troubleshooting
- Glossary
Commonly Used Scenarios
● To install each client individually, the child executable files must first be extracted from the master installer, as shown in
Extract the Child Installers from the Master Installer.
● Command line switches and parameters are case-sensitive.
● Be sure to enclose a value that contains one or more special characters, such as a blank space in the command line, in
escaped quotation marks.
● Use these installers to install the clients using a scripted installation, batch files, or any other push technology available to
your organization.
● The reboot has been suppressed in the command line examples. However, an eventual reboot is required. Encryption cannot
begin until the computer has rebooted.
● Log files - Windows creates unique child installer installation log files for the logged in user at %temp%, located at C:
\Users\<UserName>\AppData\Local\Temp.
If you decide to add separate a log file when you run the installer, ensure that the log file has a unique name, as child
installer log files do not append. The standard .msi command can be used be create a log file by using /l*v C:\<any
directory>\<any log file name>.log.
● All child installers use the same basic .msi switches and display options, except where noted, for command line installations.
The switches must be specified first. The /v switch is required and takes an argument. Other parameters go inside an
argument that is passed to the /v switch.
Display options can be specified at the end of the argument passed to the /v switch to achieve the expected behavior. Do
not use both /q and /qn in the same command line. Only use ! and - after /qb.
Switch
Meaning
/v Pass variables to the .msi inside the *.exe
/s Silent mode
/i Install mode
Option Meaning
/q No Progress dialog, restarts itself after process completion
/qb Progress dialog with Cancel button, prompts for restart
/qb- Progress dialog with Cancel button, restarts itself after process completion
/qb! Progress dialog without Cancel button, prompts for restart
/qb!- Progress dialog without Cancel button, restarts itself after process completion
/qn No user interface
● Instruct users to see the following document and help files for application assistance:
○ See the Dell Encrypt Help to learn how to use the features of Encryption. Access the help from <Install dir>:
\Program Files\Dell\Dell Data Protection\Encryption\Help.
○ See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from
<Install dir>:\Program Files\Dell\Dell Data Protection\Encryption\EMS
○ See the Encryption Enterprise Help to learn how to use the features of. Access the help from <Install dir>:
\Program Files\Dell\Dell Data Protection\Authentication \Help.
9
62 Commonly Used Scenarios