Administrator Guide

Install Using the Master Installer
Command line switches and parameters are case-sensitive.
To install using non-default ports, use the child installers instead of the master installer.
Endpoint Security Suite Pro master installer log les are located at C:\ProgramData\Dell\Dell Data Protection\Installer.
Instruct users to see the following document and help les for application assistance:
See the Dell Encrypt Help to learn how to use the feature of the Encryption client. Access the help from <Install dir>:\Program Files
\Dell\Dell Data Protection\Encryption\Help.
See the Encryption External Media Help to learn how the features of Encryption External Media. Access the help from <Install dir>:
\Program Files\Dell\Dell Data Protection\Encryption\EMS.
See the Endpoint Security Suite Pro Help to learn how to use the features of Advanced Authentication and Threat Protection.
Access the help from <Install dir>:\Program Files\Dell\Dell Data Protection\Client Security Framework\Help.
Users should update their policies by right-clicking the Dell Encryption icon in the system tray and selecting Check for Policy Updates
after installation completes.
The master installer installs the entire suite of products. There are two methods to install using the master installer. Choose one of the
following.
Install Interactively Using the Master Installer
or
Install by Command Line Using the Master Installer
Install Interactively Using the Master Installer
The Endpoint Security Suite Pro master installer can be located at:
From Your Dell FTP Account - Locate the installation bundle at Endpoint-Security-Suite-Pro_Ent-1.x.x.xxx.zip
Use these instructions to install Endpoint Security Suite Pro interactively using the Endpoint Security Suite Pro master installer. This
method can be used to install the suite of products on one computer at a time.
1 Locate DDSSuite.exe in the Dell installation media. Copy it to the local computer.
2 Double-click to launch the installer. This may take several minutes.
3 Click Next in the Welcome dialog.
4 Read the license agreement, accept the terms, and click Next.
5 In the Enterprise Server Name eld, enter the fully qualied host name of the Security Management Server/Security Management
Server Virtual that will manage the target user, such as server.organization.com.
In the Device Server URL eld, enter the URL of the Device Server (Security Server) with which the client will communicate.
The format is https://server.organization.com:8443/xapi/ (including trailing forward slash).
Click Next.
3
16 Dell Data Security Endpoint Security Suite Pro
Install Using the Master Installer