This content is viewable by Everyone

UCSF DDPE for Windows Installation Guide

Before you begin

  1. Back up your important files.
  2. Run Microsoft Software Update to patch your workstation.
  3. Verify your system meets the minimum software and hardware requirements.
  4. Verify you are not filing for an encryption waiver.
  5. Verify your system is not encrypted with another encryption product: See How To Determine Your Computer Encryption Status.

You will be asked to log into MyAccess.

Note: If an active MyAccess session is already open, skip step 1 below. If you need help finding your MyAccess credentials, visit our MyAccess documentation: http://it.ucsf.edu/services/myaccess

How to install Dell Data Protection Encryption (DDPE) for Windows

  1. Download the UCSF DDPE for Windows installer from software.ucsf.edu​.
  2. Double-click the installer package named: UCSF-DDPE-Win-BYOD.EXE. A progress bar will appear when the installation begins.
  3. Note: Along with DDPE, IBM Endpoint Manager will also be installed.
  4. When installation is complete, the installer will open the registration page on your web browser.
  5. You will be asked to log into MyAccess.
    Credit:
    MyAccess
  6. Verify your information.
  7. Select the ownership status of your computer. (Yes = UCSF-owned; No = personally owned.)
  8. Click Submit to complete registration.
  9. Close the registration page when complete, and restart the computer.
  10. When you log into your computer after you reboot, you will be prompted to activate your DDPE software by an IBM Endpoint Management (BigFix) Action Request window.
  11. Note: The Action Request window can take up to 24 hours to appear, depending on your system and network connections.
  12. Click Take Action to reboot your workstation. Encryption will begin shortly after you log back in.
  13. At this point, the encryption process will automatically begin in the background. If your computer is a laptop, make sure it's plugged into a power source, and leave it on for 2 to 4 hours to allow encryption to complete.

Verifying encryption status