Deployment Guide
11. Once the computer restarts, authenticate to Windows.
Installation of Encryption Personal and Advanced Authentication is complete.
Encryption Personal Setup Wizard and Configuration is covered separately.
Once the Encryption Personal Setup Wizard and Configuration is complete, launch the Encryption Personal Administrator
Console.
The rest of this section details more installation tasks and may be skipped. Proceed to Advanced Authentication and Encryption
Personal Setup Wizards.
Command-Line Installation
To install Encryption Personal using command-line, the child executable files must first be extracted from the master installer.
See Extract the Child Installers from the Master Installer. Once complete, return to this section.
● Install the entitlement on the target computer if needed.
●
NOTE: Dell Encryption logs do not specify if insufficient disk storage caused installation failure.
● Switches:
For a command-line installation, the switches must be specified first. The following table details the switches available for
the installation.
Switch
Meaning
/s Silent mode
/z Pass data to the InstallScript system variable CMDLINE
● Parameters:
The following table details the parameters available for the installation.
Parameters
InstallPath=path to alternate installation location.
Installation 17