McAfee EETech for Mac 6.2 User Guide
|
|
- Philomena Sherman
- 8 years ago
- Views:
Transcription
1 McAfee EETech for Mac 6.2 User Guide
2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2
3 Contents Introducing McAfee EETech for Mac Audience Using this guide Understanding the daily authorization code EETech for Mac Installing EETech on USB disk Booting from the EETech USB disk Authorizing with daily authorization code Authenticating with token Exporting the recovery information file from McAfee epo Authenticating with recovery file Performing self-recovery with token authentication Performing emergency boot Removing encryption and boot sector with token authentication Removing encryption and boot sector with file authentication Viewing the workspace Encrypting or Decrypting sectors Repairing preboot Glossary
4 Introducing McAfee EETech for Mac 6.2 With data breaches on the rise, it is important to protect information assets and comply with privacy regulations. McAfee Endpoint Encryption for Mac delivers powerful encryption that protects data from unauthorized access, loss, and exposure. EETech for Mac is McAfee s disaster recovery tool used in conjunction with Endpoint Encryption for Mac (EEMac). This allows to recover a non-booting Endpoint Encryption installation. The software presents a user interface with a number of options that are used to fix or recover the data on an encrypted hard disks. NOTE: EETech for Mac 6.2 is to be used with EEMac 6.2 only. EETech for Mac 1.0 or 1.1 will not work with EEMac 6.2. Audience Using this guide Understanding the daily authorization code Audience This guide is mainly intended for qualified system administrators and security managers. Knowledge of basic networking and routing concepts, and a general understanding of the aims of centrally managed security is required. Using this guide This guide helps corporate security administrators to understand the disaster recovery tool McAfee EETech for Mac. This document includes procedures to recover data from systems that are unrecoverable. Understanding the daily authorization code Some recovery operations in EETech require administrative access. The user can get this access by typing a four-digit code into the authorization screen. This code changes everyday and can only be retrieved by contacting McAfee support (mysupport.mcafee.com). NOTE: All EETech operations require authentication. However, only the administrative operations require authorization with the four-digit daily authorization code. The following operations do not require the daily authorization code: Using the workspace utility to view sectors on the disk 4
5 Introducing McAfee EETech for Mac 6.2 Understanding the daily authorization code Using the disk information utility to identify encrypted regions on the disk Setting the encryption algorithm used by EETech Setting the boot disk on which EETech will perform its operations The following operations do require the daily authorization code: Removing endpoint encryption, this includes decrypting the disk as well Repairing disk information Using the crypt sectors and force crypt sectors utilities to manually encrypt or decrypt specific sectors Editing the disk crypt state 5
6 This chapter explains some of the common tasks that can be undertaken using McAfee s disaster recovery tool, McAfee EETech for Mac. Make sure that you exercise caution for all EETech procedures. Contents Installing EETech on USB disk Booting from the EETech USB disk Authorizing with daily authorization code Authenticating with token Exporting the recovery information file from McAfee epo Authenticating with recovery file Performing self-recovery with token authentication Performing emergency boot Removing encryption and boot sector with token authentication Removing encryption and boot sector with file authentication Viewing the workspace Encrypting or Decrypting sectors Repairing preboot Installing EETech on USB disk To use the EETech recovery tool on EEMac installed clients, the user must install the EETech software on a dedicated USB disk. NOTE: Any existing data on the USB disk will be deleted on installing the EETech software. Before proceeding with this task, make sure you have these prerequisites ready. Blank USB disk EpeTechEfi.efi 1 Insert a blank USB disk into a Mac system to install the EETech software. 2 From Finder, open Applications Utilities Disk Utility. 3 Select the inserted USB disk from the list at the left, and click Partition tab. 6
7 Booting from the EETech USB disk 4 Select the existing 1 Partition in the Volume Scheme list and type the name EETech for the partition. 5 Select how to format the partition that will be erased or created. 6 Click Apply. This initializes the inserted USB disk. 7 When the USB initialization is complete, copy the EpeTechEfi.efi file to the USB disk. 8 Open a terminal prompt and type the following command: sudo bless --folder "/Volumes/EETech/" --file "/Volumes/EETech/EpeTechEfi.efi" --label "McAfee EETech" 9 Enter the password if prompted. 10 Disconnect (unmount) and remove the USB disk. Booting from the EETech USB disk EETech is accessed through the EETech USB disk. When the user boots the unrecoverable system with the EETech installed USB disk, the first page that appears is the McAfee EETech interface. 1 Insert the EETech USB boot disk into the unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot Authorizing with daily authorization code You need to gain administrative access to EETech using the daily authorization code. This code is only required for certain tasks in EETech, so retrieve the code when the recovery procedure in this document states that it is required. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 1 Boot the unrecoverable system with the EETech USB boot disk while holding down the Option (or alt) key. The Boot 2 Select McAfee EETech from the Boot Menu. The McAfee EETech interface appears. 7
8 Authenticating with token 3 Click Authorize under Authorization. The Authorize dialog box appears. 4 Type the daily Authorization/Access Code and click OK. On typing the correct authorization code for the day, the Authorization status changes to Authorized. Authenticating with token You need to authenticate the recovery tasks using the Endpoint Encryption user credentials for the system. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB disk. 1 Insert the EETech USB boot disk into the unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Click Token under Authentication. The Endpoint Encryption Logon window appears and prompts for the Endpoint Encryption user credentials of the system. 5 Type the Username and Password for the client system, then click Logon. On typing the correct credential, the Authentication status changes to Authenticated with Token. Exporting the recovery information file from McAfee epo You need to export the recovery information file (.xml) for the required system from epolicy Orchestrator, to perform the recovery tasks. Every EEMac installed system that is managed through the epolicy Orchestrator server has a recovery information file in the server. Any user trying to authenticate the recovery procedures on the client systems should get the recovery file from McAfee epo administrator for EEMac. You must have appropriate permissions to perform this task. Before proceeding with this task, make sure you have these prerequisites ready. FAT-32 formatted USB disk. 1 Insert the FAT-32 formatted USB disk to the system where epolicy Orchestrator is present. 2 Log on to epolicy Orchestrator as an administrator. 8
9 Authenticating with recovery file 3 Click Menu Systems System Tree. The Systems page appears. Select the required group under System Tree pane on the left. 4 Select the required System, then click Actions Endpoint Encryption Export Recovery Information. The Export Recovery Information confirmation page appears. 5 Click Yes to export the recovery information file. The Export Recovery Information page appears with the Export information (.xml) file. 6 Right-click the.xml file and save it to the inserted USB disk. NOTE: The Recovery Information File has a general format of client system name.xml. Authenticating with recovery file You need to authenticate the recovery tasks using the Recovery Information File (.xml). The administrator needs to export the Recovery Information File for the required system from epolicy Orchestrator. NOTE: Using the wrong recovery key file might damage an encrypted drive. Make sure that you are using an appropriate recovery file for the system. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB disk. The Recovery Information File (.xml). 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. NOTE: It is the same EETech USB boot disk that will have the Recovery Information File (.xml) as well. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Click File under Authentication, then browse and select the Recovery Information File (.xml) from the USB disk. 5 Click OK. On selecting the right file, the Authentication status changes to Authenticated with File. Performing self-recovery with token authentication You might need to perform self-recovery in the client computer, if the user's password or the logon token have been lost, to recover the user. 9
10 Performing emergency boot The user must have successfully enrolled for self recovery on the client system to perform this task. This task should be performed by the client user on the client computer. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have this prerequisites ready. The EETech USB boot disk. 1 Insert the EETech USB boot disk into unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Click Token under Authentication. The Endpoint Encryption Logon window appears and prompts for the Endpoint Encryption credentials of the user. 5 Click Options Recovery. The Recovery dialog box appears with Self-Recovery as the default option. 6 Type the Username and click OK. The Recovery dialog box appears with the questions that the user answered while enrolling for the self-recovery. 7 Type the answers for the prompted questions and click Finish. The Change Password dialog box appears. 8 Type and confirm the New Password and click OK. The Logon window appears and prompts for the Endpoint Encryption credentials of the user. The user can now type the newly set password and authenticate. Performing emergency boot You can perform the emergency boot when an EEMac installed system fails to boot or when the Endpoint Encryption logon is corrupt. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The Recovery Information File (.xml). The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. NOTE: It is the same EETech USB boot disk that will have the Recovery Information File (.xml) as well. 10
11 Removing encryption and boot sector with token authentication 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Click File under Authentication, then browse and select the Recovery Information File (.xml) from the USB disk, then click OK. On selecting the right file, the Authentication status changes to Authenticated with File. NOTE: The authentication can also be achieved using the token authentication. 6 Click Emergency Boot under Actions. The confirmation message EETech will now emergency boot into the operating system appears. 7 Click OK to confirm the emergency boot. NOTE: This may modify the GPT partition. When the client system boots into Mac OS X, if it is connected to the epolicy Orchestrator server, then the system synchronizes with the server and fully repairs itself. The Endpoint Encryption System Status will now appear as Recovery and you can confirm the Endpoint Encryption System Status by clicking the Encryption (lock) icon McAfee Endpoint Encryption System Status option on the menu bar that is present on the desktop of the client. The Endpoint Encryption System Status Recovery will change to Active after the first successful communication of the client with McAfee epo server. NOTE: If the McAfee Agent is unable to establish connection with epolicy Orchestrator, continue to use the EETech Emergency Boot option to boot the system until a connection to the server is established. Removing encryption and boot sector with token authentication The Remove EE function can be used to completely decrypt the system and remove the Pre-Boot portion of the Endpoint Encryption software. Use this task when: Mac OS X becomes corrupt You cannot access the data of an encrypted system Encryption or decryption fails due to an operating system error Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 11
12 Removing encryption and boot sector with file authentication 1 Insert the EETech USB boot disk into the unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token and confirm the authentication status. 6 Click Remove EE under Actions. The Remove EE window appears. 7 Click Remove to begin the removal. This removes encryption and boot sector from the client system, however, this does not remove Endpoint Encryption client files. It might take a few hours depending on the system performance and the storage capacity of the drive or partition. Removing encryption and boot sector with file authentication When the Endpoint Encryption software does not work, you might have to remove the encryption and boot sector from the client system. CAUTION: This procedure should only be attempted under the guidance of McAfee Support. For this method, the system's recovery information file should be exported from the epo server. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The USB disk containing the Recovery Information File (.xml) The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Recovery Information File (.xml) and confirm the authentication status. 6 Click Remove EE under Actions. The Remove EE window appears. 7 Click Remove to begin the removal. This removes encryption and boot sector from the client system, however, this does not remove Endpoint Encryption client files. It might take a few hours depending on the system performance and the storage capacity of the drive or partition. 12
13 Viewing the workspace Viewing the workspace The workspace contains the bytes loaded from the sectors on the disk or from a file. This option opens the Workspace window which allows the users to read sector ranges from the disk and to view the contents. This can also be used to inspect, encrypt, and decrypt sectors of the disk. By default, there is nothing loaded into the workspace. The workspace is not a view of the disk, rather it is only a view of what the user loads into it. The user can choose to load the contents of sectors or the contents of a file. Once the user loads any of these, it is displayed in the workspace. CAUTION: It is entirely the responsibility of the qualified system administrators and security managers to take appropriate precautions before performing this task. The user needs to take maximum care while performing this task, otherwise, it may cause the system to become corrupt and that might result in the loss of data. Contact McAfee support for assistance on how to use the EETech workspace. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. Recovery Information File (.xml) or Authentication Token 1 Insert the EETech USB boot disk into unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token or Recovery Information File (.xml) and confirm the authentication status. 6 Click Workspace under Actions. The Workspace window appears with these options: Load From File It loads a previously saved workspace that was not encrypted and replaces the current contents of the workspace. It just loads the bytes and displays them. Save To File This option saves the current content (bytes) of the workspace in a file. Load From Disk This loads the bytes from the sectors on the disk. Save To Disk This option saves the current content (bytes) of the workspace on the specified sectors of the disk. Zero Workspace This option fills the current content of the workspace with zeros. Encrypt Workspace This option encrypts the entire contents of the workspace. Decrypt Workspace This option decrypts the entire contents of the workspace. 7 Click First Sector to view the first sector from the sectors loaded on the workspace. 13
14 Encrypting or Decrypting sectors 8 Click Previous Sector to view the previous sector of the current sector loaded on the workspace. 9 Click Next Sector to view the next sector of the current sector loaded on the workspace. 10 Click Last Sector to view the last sector from the sectors loaded on the workspace. Encrypting or Decrypting sectors This option allows you to safely verify which sectors are encrypted on the disk. This option follows the crypt list to validate the ranges you submit, so it does not encrypt sectors which are currently encrypted, and will not decrypt sectors which are currently not encrypted. This option supports power fail protection. Crypt Sectors option cannot be used if Endpoint Encryption has become corrupt on the disk, or the crypt state has been corrupted, however, the Force Crypt Sectors option can be used in such cases. While changing the encryption state with this option, it effects with appropriate modifications to the disk Crypt List. For example, while you encrypt a new range, it creates a new Region definition. While you decrypt within an existing Region, the existing region is split into two, if you completely decrypt a region, it removes the Region from the crypt list. CAUTION: It is entirely the system administrator's responsibility, to take appropriate precautions before performing this task. The user needs to take maximum care while performing this task, otherwise, it may cause the system to become corrupt and that might result in the loss of data. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. Recovery Information File (.xml) or Authentication Token 1 Insert the EETech USB boot disk into unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token or Recovery Information File (.xml) and confirm the authentication status. 6 Click Crypt Sectors and select the disk from the Select Disk list, then type the Start Sector and the Number of Sectors. 7 Click Encrypt/Decrypt to encrypt or decrypt a range of sectors. NOTE: Follow the same procedure for Force Crypt Sectors. 14
15 Repairing preboot Repairing preboot The EETech for Mac tool provides this operation that is used to verify and rebuild the contents of the NVRAM variables that are used to load the EE Pre-Boot drivers and start the Pre-Boot Authentication. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The USB disk containing the recovery information file (.xml) 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token or Recovery Information File (.xml) and confirm the authentication status. 6 Click Repair preboot under Actions. The Warning window appears. 7 Click OK in the Warning window to confirm that you want to rebuild the contents of the NVRAM variables. NOTE: After you authenticate through file or token and use the Repair preboot option, it replaces the code portion of the NVRAM variables with the one that was present after installing and activating Endpoint Encryption for Mac. CAUTION: Repair preboot should be performed on a system where the boot disk is not encrypted, else an error message Missing Operating System is displayed. 15
16 Glossary There are a number of options that an administrator needs to be aware of while using EETech for Mac. Those options and their functionalities are listed in the table below. Topic Description Disk Information Disk Power Fail Status Endpoint Encryption for Mac tracks the progress of encryption on the drive to make sure that if power is lost during encryption, the process is recoverable. Status Determines whether the drive is currently in powerfail state. A status of Inactive indicates that the current encryption process has finished. Disk Crypt List Crypt List Region Count The number of defined crypted areas of this logical disk. This usually corresponds to the number of partitions on the drive. Region Each region is defined as follows: Start Sector The physical start sector of the region End Sector The last physical sector included in the region Sector Count The number of sectors included in this region Disk Partitions A section per Logical partition on this physical drive as follows: Partition Count The unique partition number. Partition Type The file system detected on this partition. Partition Bootable Whether the partition is bootable or not. Partition Recognized Whether the partition is recognized as viable. Partition Drive Letter The detected drive letter of this partition. Partition Start Sector The physical start sector of the partition. Partition End Sector The physical end sector of the partition. Partition Sector Count The number of sectors in the partition. Partition Bus Type Bus type used in particular partition. Repair preboot The EETech for Mac tool provides an operation that can be used to verify and rebuild the contents of the NVRM 16
17 Glossary Topic NVRAM info Force Crypt Sectors Description variables that are used to load the EE Pre-Boot drivers and start the Pre-Boot Authentication. This is a diagnostic feature which is part of the EETech Mac tool. This displays the contents of the NVRAM variables. Before using this option call McAfee Technical support for assistance. Unlike the Crypt Sectors Encrypt/Decrypt option, the Force Crypt Sectors option does not consider the disk crypt state. It simply performs the operation blindly according to user input. Force Crypt does not support power fail, nor does it apply any logic or parameter validation on the input. You should use the Force Crypt Sectors option only when everything else fails. For example, when the on-disk structures are completely corrupted. CAUTION: This option will cause irretrievable data loss if used incorrectly. If you are forced to use this option, you should make a recording of each operation you apply to support in data recovery. CAUTION: Make sure that there is no possibility of losing power while using this option as this option does not support power fail protection. Edit Disk Crypt State The disk crypt state contains information about which range of sectors are encrypted. This option allows you to change the ranges. CAUTION: Call McAfee Technical support for assistance before using this option, because using this option inappropriately will cause irretrievable data loss. CAUTION: Make sure that there is no possibility of losing power while using this option as this option does not support power fail protection. 17
18 Index A Authenticate from file 13, 14, 15 Authenticate from token 13, 14 authentication 9 Authentication 8 Authentication Code 10 Authorization 7 Authorization Code 7 C Create EETech USB Disk 6 Crypt Sectors 14 D Decrypt 13, 14 E EE credential 11 EETech 4, 10 EETech for Mac 6 EETech USB disk 7 Emergency Boot 10 Encrypt 13, 14 Endpoint Encryption for Mac 4 export 8 F file authentication 12 R recovery change password 9 self-recovery 9 Recovery 6 recovery information file 8, 9 Recovery Information file 12, 15 Recovery Information File 10 Remove EE 11, 12 Repairing preboot 15 S system administrator 4 T token authentication 11 Token Authentication 8 U USB 6 W Workspace 13 18
McAfee Endpoint Encryption for PC 6.2
EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Encryption for PC 7.0
EETech User Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Endpoint Encryption 7.0
Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee
More informationSetup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Endpoint Encryption 7.0 Patch 1 Software
Best Practices Guide McAfee Endpoint Encryption 7.0 Patch 1 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationThe client transfer between epo servers guide. McAfee Drive Encryption 7.1.3
The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationFull Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Client Proxy 1.0.0 Software
Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationIntegration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationAbout Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationMcAfee Drive Encryption 7.1.0 Software
Best Practices Guide McAfee Drive Encryption 7.1.0 Software For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
More informationEntrust Certificate Services for Adobe CDS
Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationImage Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
More informationAdministration Guide Revision E. Account Management. For SaaS Email and Web Security
Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee epolicy Orchestrator 5.0.0 Software
Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationSecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
More informationAdministering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
More information2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationSafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
More informationMcAfee Drive Encryption 7.1.0
Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationAdministering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013
Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later Technical Paper October 2013 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationAdministration Guide. McAfee SaaS Email Archiving
Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
More informationMcAfee Drive Encryption 7.1
Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
More informationWhite Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
More informationVirtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationImage Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
More informationGoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
More informationInstallation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationProduct Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSymantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
More informationMcAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationHow Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
More informationBounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
More informationTime Machine Setup for Routers
User Manual August 2015 202-11590-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label
More informationTable of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
More informationPGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationSecure Perfect RAID Recovery Instructions
Secure Perfect RAID Recovery Instructions Contents Overview Dell PowerEdge 2500 RAID Level 1 Recovery Instructions Overview NOTE If you possess a previous version of this document, you may notice changes
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationMcAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationHP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
More informationSophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac quick startup guide Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 2 Working with SafeGuard
More information4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
More informationPOC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting
More informationMcAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationImplementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationHP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationNote: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site.
1 of 5 Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of Symantec Endpoint Encryption Full Disk for Mac OS X. Symantec Corporation
More informationSage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
More informationWatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
More informationMcAfee Endpoint Encryption (SafeBoot) User Documentation
TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationInstallation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee Endpoint Encryption Reporting Tool
McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationSmart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
More information