McAfee EETech for Mac 6.2 User Guide

Size: px
Start display at page:

Download "McAfee EETech for Mac 6.2 User Guide"

Transcription

1 McAfee EETech for Mac 6.2 User Guide

2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2

3 Contents Introducing McAfee EETech for Mac Audience Using this guide Understanding the daily authorization code EETech for Mac Installing EETech on USB disk Booting from the EETech USB disk Authorizing with daily authorization code Authenticating with token Exporting the recovery information file from McAfee epo Authenticating with recovery file Performing self-recovery with token authentication Performing emergency boot Removing encryption and boot sector with token authentication Removing encryption and boot sector with file authentication Viewing the workspace Encrypting or Decrypting sectors Repairing preboot Glossary

4 Introducing McAfee EETech for Mac 6.2 With data breaches on the rise, it is important to protect information assets and comply with privacy regulations. McAfee Endpoint Encryption for Mac delivers powerful encryption that protects data from unauthorized access, loss, and exposure. EETech for Mac is McAfee s disaster recovery tool used in conjunction with Endpoint Encryption for Mac (EEMac). This allows to recover a non-booting Endpoint Encryption installation. The software presents a user interface with a number of options that are used to fix or recover the data on an encrypted hard disks. NOTE: EETech for Mac 6.2 is to be used with EEMac 6.2 only. EETech for Mac 1.0 or 1.1 will not work with EEMac 6.2. Audience Using this guide Understanding the daily authorization code Audience This guide is mainly intended for qualified system administrators and security managers. Knowledge of basic networking and routing concepts, and a general understanding of the aims of centrally managed security is required. Using this guide This guide helps corporate security administrators to understand the disaster recovery tool McAfee EETech for Mac. This document includes procedures to recover data from systems that are unrecoverable. Understanding the daily authorization code Some recovery operations in EETech require administrative access. The user can get this access by typing a four-digit code into the authorization screen. This code changes everyday and can only be retrieved by contacting McAfee support (mysupport.mcafee.com). NOTE: All EETech operations require authentication. However, only the administrative operations require authorization with the four-digit daily authorization code. The following operations do not require the daily authorization code: Using the workspace utility to view sectors on the disk 4

5 Introducing McAfee EETech for Mac 6.2 Understanding the daily authorization code Using the disk information utility to identify encrypted regions on the disk Setting the encryption algorithm used by EETech Setting the boot disk on which EETech will perform its operations The following operations do require the daily authorization code: Removing endpoint encryption, this includes decrypting the disk as well Repairing disk information Using the crypt sectors and force crypt sectors utilities to manually encrypt or decrypt specific sectors Editing the disk crypt state 5

6 This chapter explains some of the common tasks that can be undertaken using McAfee s disaster recovery tool, McAfee EETech for Mac. Make sure that you exercise caution for all EETech procedures. Contents Installing EETech on USB disk Booting from the EETech USB disk Authorizing with daily authorization code Authenticating with token Exporting the recovery information file from McAfee epo Authenticating with recovery file Performing self-recovery with token authentication Performing emergency boot Removing encryption and boot sector with token authentication Removing encryption and boot sector with file authentication Viewing the workspace Encrypting or Decrypting sectors Repairing preboot Installing EETech on USB disk To use the EETech recovery tool on EEMac installed clients, the user must install the EETech software on a dedicated USB disk. NOTE: Any existing data on the USB disk will be deleted on installing the EETech software. Before proceeding with this task, make sure you have these prerequisites ready. Blank USB disk EpeTechEfi.efi 1 Insert a blank USB disk into a Mac system to install the EETech software. 2 From Finder, open Applications Utilities Disk Utility. 3 Select the inserted USB disk from the list at the left, and click Partition tab. 6

7 Booting from the EETech USB disk 4 Select the existing 1 Partition in the Volume Scheme list and type the name EETech for the partition. 5 Select how to format the partition that will be erased or created. 6 Click Apply. This initializes the inserted USB disk. 7 When the USB initialization is complete, copy the EpeTechEfi.efi file to the USB disk. 8 Open a terminal prompt and type the following command: sudo bless --folder "/Volumes/EETech/" --file "/Volumes/EETech/EpeTechEfi.efi" --label "McAfee EETech" 9 Enter the password if prompted. 10 Disconnect (unmount) and remove the USB disk. Booting from the EETech USB disk EETech is accessed through the EETech USB disk. When the user boots the unrecoverable system with the EETech installed USB disk, the first page that appears is the McAfee EETech interface. 1 Insert the EETech USB boot disk into the unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot Authorizing with daily authorization code You need to gain administrative access to EETech using the daily authorization code. This code is only required for certain tasks in EETech, so retrieve the code when the recovery procedure in this document states that it is required. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 1 Boot the unrecoverable system with the EETech USB boot disk while holding down the Option (or alt) key. The Boot 2 Select McAfee EETech from the Boot Menu. The McAfee EETech interface appears. 7

8 Authenticating with token 3 Click Authorize under Authorization. The Authorize dialog box appears. 4 Type the daily Authorization/Access Code and click OK. On typing the correct authorization code for the day, the Authorization status changes to Authorized. Authenticating with token You need to authenticate the recovery tasks using the Endpoint Encryption user credentials for the system. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB disk. 1 Insert the EETech USB boot disk into the unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Click Token under Authentication. The Endpoint Encryption Logon window appears and prompts for the Endpoint Encryption user credentials of the system. 5 Type the Username and Password for the client system, then click Logon. On typing the correct credential, the Authentication status changes to Authenticated with Token. Exporting the recovery information file from McAfee epo You need to export the recovery information file (.xml) for the required system from epolicy Orchestrator, to perform the recovery tasks. Every EEMac installed system that is managed through the epolicy Orchestrator server has a recovery information file in the server. Any user trying to authenticate the recovery procedures on the client systems should get the recovery file from McAfee epo administrator for EEMac. You must have appropriate permissions to perform this task. Before proceeding with this task, make sure you have these prerequisites ready. FAT-32 formatted USB disk. 1 Insert the FAT-32 formatted USB disk to the system where epolicy Orchestrator is present. 2 Log on to epolicy Orchestrator as an administrator. 8

9 Authenticating with recovery file 3 Click Menu Systems System Tree. The Systems page appears. Select the required group under System Tree pane on the left. 4 Select the required System, then click Actions Endpoint Encryption Export Recovery Information. The Export Recovery Information confirmation page appears. 5 Click Yes to export the recovery information file. The Export Recovery Information page appears with the Export information (.xml) file. 6 Right-click the.xml file and save it to the inserted USB disk. NOTE: The Recovery Information File has a general format of client system name.xml. Authenticating with recovery file You need to authenticate the recovery tasks using the Recovery Information File (.xml). The administrator needs to export the Recovery Information File for the required system from epolicy Orchestrator. NOTE: Using the wrong recovery key file might damage an encrypted drive. Make sure that you are using an appropriate recovery file for the system. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB disk. The Recovery Information File (.xml). 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. NOTE: It is the same EETech USB boot disk that will have the Recovery Information File (.xml) as well. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Click File under Authentication, then browse and select the Recovery Information File (.xml) from the USB disk. 5 Click OK. On selecting the right file, the Authentication status changes to Authenticated with File. Performing self-recovery with token authentication You might need to perform self-recovery in the client computer, if the user's password or the logon token have been lost, to recover the user. 9

10 Performing emergency boot The user must have successfully enrolled for self recovery on the client system to perform this task. This task should be performed by the client user on the client computer. Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have this prerequisites ready. The EETech USB boot disk. 1 Insert the EETech USB boot disk into unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Click Token under Authentication. The Endpoint Encryption Logon window appears and prompts for the Endpoint Encryption credentials of the user. 5 Click Options Recovery. The Recovery dialog box appears with Self-Recovery as the default option. 6 Type the Username and click OK. The Recovery dialog box appears with the questions that the user answered while enrolling for the self-recovery. 7 Type the answers for the prompted questions and click Finish. The Change Password dialog box appears. 8 Type and confirm the New Password and click OK. The Logon window appears and prompts for the Endpoint Encryption credentials of the user. The user can now type the newly set password and authenticate. Performing emergency boot You can perform the emergency boot when an EEMac installed system fails to boot or when the Endpoint Encryption logon is corrupt. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The Recovery Information File (.xml). The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. NOTE: It is the same EETech USB boot disk that will have the Recovery Information File (.xml) as well. 10

11 Removing encryption and boot sector with token authentication 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Click File under Authentication, then browse and select the Recovery Information File (.xml) from the USB disk, then click OK. On selecting the right file, the Authentication status changes to Authenticated with File. NOTE: The authentication can also be achieved using the token authentication. 6 Click Emergency Boot under Actions. The confirmation message EETech will now emergency boot into the operating system appears. 7 Click OK to confirm the emergency boot. NOTE: This may modify the GPT partition. When the client system boots into Mac OS X, if it is connected to the epolicy Orchestrator server, then the system synchronizes with the server and fully repairs itself. The Endpoint Encryption System Status will now appear as Recovery and you can confirm the Endpoint Encryption System Status by clicking the Encryption (lock) icon McAfee Endpoint Encryption System Status option on the menu bar that is present on the desktop of the client. The Endpoint Encryption System Status Recovery will change to Active after the first successful communication of the client with McAfee epo server. NOTE: If the McAfee Agent is unable to establish connection with epolicy Orchestrator, continue to use the EETech Emergency Boot option to boot the system until a connection to the server is established. Removing encryption and boot sector with token authentication The Remove EE function can be used to completely decrypt the system and remove the Pre-Boot portion of the Endpoint Encryption software. Use this task when: Mac OS X becomes corrupt You cannot access the data of an encrypted system Encryption or decryption fails due to an operating system error Make sure that the system s main power supply is plugged in for this task. Do not attempt to perform this task on battery only. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 11

12 Removing encryption and boot sector with file authentication 1 Insert the EETech USB boot disk into the unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token and confirm the authentication status. 6 Click Remove EE under Actions. The Remove EE window appears. 7 Click Remove to begin the removal. This removes encryption and boot sector from the client system, however, this does not remove Endpoint Encryption client files. It might take a few hours depending on the system performance and the storage capacity of the drive or partition. Removing encryption and boot sector with file authentication When the Endpoint Encryption software does not work, you might have to remove the encryption and boot sector from the client system. CAUTION: This procedure should only be attempted under the guidance of McAfee Support. For this method, the system's recovery information file should be exported from the epo server. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The USB disk containing the Recovery Information File (.xml) The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Recovery Information File (.xml) and confirm the authentication status. 6 Click Remove EE under Actions. The Remove EE window appears. 7 Click Remove to begin the removal. This removes encryption and boot sector from the client system, however, this does not remove Endpoint Encryption client files. It might take a few hours depending on the system performance and the storage capacity of the drive or partition. 12

13 Viewing the workspace Viewing the workspace The workspace contains the bytes loaded from the sectors on the disk or from a file. This option opens the Workspace window which allows the users to read sector ranges from the disk and to view the contents. This can also be used to inspect, encrypt, and decrypt sectors of the disk. By default, there is nothing loaded into the workspace. The workspace is not a view of the disk, rather it is only a view of what the user loads into it. The user can choose to load the contents of sectors or the contents of a file. Once the user loads any of these, it is displayed in the workspace. CAUTION: It is entirely the responsibility of the qualified system administrators and security managers to take appropriate precautions before performing this task. The user needs to take maximum care while performing this task, otherwise, it may cause the system to become corrupt and that might result in the loss of data. Contact McAfee support for assistance on how to use the EETech workspace. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. Recovery Information File (.xml) or Authentication Token 1 Insert the EETech USB boot disk into unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token or Recovery Information File (.xml) and confirm the authentication status. 6 Click Workspace under Actions. The Workspace window appears with these options: Load From File It loads a previously saved workspace that was not encrypted and replaces the current contents of the workspace. It just loads the bytes and displays them. Save To File This option saves the current content (bytes) of the workspace in a file. Load From Disk This loads the bytes from the sectors on the disk. Save To Disk This option saves the current content (bytes) of the workspace on the specified sectors of the disk. Zero Workspace This option fills the current content of the workspace with zeros. Encrypt Workspace This option encrypts the entire contents of the workspace. Decrypt Workspace This option decrypts the entire contents of the workspace. 7 Click First Sector to view the first sector from the sectors loaded on the workspace. 13

14 Encrypting or Decrypting sectors 8 Click Previous Sector to view the previous sector of the current sector loaded on the workspace. 9 Click Next Sector to view the next sector of the current sector loaded on the workspace. 10 Click Last Sector to view the last sector from the sectors loaded on the workspace. Encrypting or Decrypting sectors This option allows you to safely verify which sectors are encrypted on the disk. This option follows the crypt list to validate the ranges you submit, so it does not encrypt sectors which are currently encrypted, and will not decrypt sectors which are currently not encrypted. This option supports power fail protection. Crypt Sectors option cannot be used if Endpoint Encryption has become corrupt on the disk, or the crypt state has been corrupted, however, the Force Crypt Sectors option can be used in such cases. While changing the encryption state with this option, it effects with appropriate modifications to the disk Crypt List. For example, while you encrypt a new range, it creates a new Region definition. While you decrypt within an existing Region, the existing region is split into two, if you completely decrypt a region, it removes the Region from the crypt list. CAUTION: It is entirely the system administrator's responsibility, to take appropriate precautions before performing this task. The user needs to take maximum care while performing this task, otherwise, it may cause the system to become corrupt and that might result in the loss of data. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The daily Authorization/Access code. NOTE: Users with a valid support contract with McAfee can only obtain the daily Authorization code from McAfee Support. Recovery Information File (.xml) or Authentication Token 1 Insert the EETech USB boot disk into unrecoverable system. 2 Boot the unrecoverable system while holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token or Recovery Information File (.xml) and confirm the authentication status. 6 Click Crypt Sectors and select the disk from the Select Disk list, then type the Start Sector and the Number of Sectors. 7 Click Encrypt/Decrypt to encrypt or decrypt a range of sectors. NOTE: Follow the same procedure for Force Crypt Sectors. 14

15 Repairing preboot Repairing preboot The EETech for Mac tool provides this operation that is used to verify and rebuild the contents of the NVRAM variables that are used to load the EE Pre-Boot drivers and start the Pre-Boot Authentication. Before proceeding with this task, make sure you have these prerequisites ready. The EETech USB boot disk. The USB disk containing the recovery information file (.xml) 1 Insert the EETech USB boot disk containing the Recovery Information File (.xml) into the unrecoverable system. 2 Boot the unrecoverable system whilst holding down the Option (or alt) key. The Boot 4 Authorize with daily Authorization code and confirm the authorization status. 5 Authenticate with Token or Recovery Information File (.xml) and confirm the authentication status. 6 Click Repair preboot under Actions. The Warning window appears. 7 Click OK in the Warning window to confirm that you want to rebuild the contents of the NVRAM variables. NOTE: After you authenticate through file or token and use the Repair preboot option, it replaces the code portion of the NVRAM variables with the one that was present after installing and activating Endpoint Encryption for Mac. CAUTION: Repair preboot should be performed on a system where the boot disk is not encrypted, else an error message Missing Operating System is displayed. 15

16 Glossary There are a number of options that an administrator needs to be aware of while using EETech for Mac. Those options and their functionalities are listed in the table below. Topic Description Disk Information Disk Power Fail Status Endpoint Encryption for Mac tracks the progress of encryption on the drive to make sure that if power is lost during encryption, the process is recoverable. Status Determines whether the drive is currently in powerfail state. A status of Inactive indicates that the current encryption process has finished. Disk Crypt List Crypt List Region Count The number of defined crypted areas of this logical disk. This usually corresponds to the number of partitions on the drive. Region Each region is defined as follows: Start Sector The physical start sector of the region End Sector The last physical sector included in the region Sector Count The number of sectors included in this region Disk Partitions A section per Logical partition on this physical drive as follows: Partition Count The unique partition number. Partition Type The file system detected on this partition. Partition Bootable Whether the partition is bootable or not. Partition Recognized Whether the partition is recognized as viable. Partition Drive Letter The detected drive letter of this partition. Partition Start Sector The physical start sector of the partition. Partition End Sector The physical end sector of the partition. Partition Sector Count The number of sectors in the partition. Partition Bus Type Bus type used in particular partition. Repair preboot The EETech for Mac tool provides an operation that can be used to verify and rebuild the contents of the NVRM 16

17 Glossary Topic NVRAM info Force Crypt Sectors Description variables that are used to load the EE Pre-Boot drivers and start the Pre-Boot Authentication. This is a diagnostic feature which is part of the EETech Mac tool. This displays the contents of the NVRAM variables. Before using this option call McAfee Technical support for assistance. Unlike the Crypt Sectors Encrypt/Decrypt option, the Force Crypt Sectors option does not consider the disk crypt state. It simply performs the operation blindly according to user input. Force Crypt does not support power fail, nor does it apply any logic or parameter validation on the input. You should use the Force Crypt Sectors option only when everything else fails. For example, when the on-disk structures are completely corrupted. CAUTION: This option will cause irretrievable data loss if used incorrectly. If you are forced to use this option, you should make a recording of each operation you apply to support in data recovery. CAUTION: Make sure that there is no possibility of losing power while using this option as this option does not support power fail protection. Edit Disk Crypt State The disk crypt state contains information about which range of sectors are encrypted. This option allows you to change the ranges. CAUTION: Call McAfee Technical support for assistance before using this option, because using this option inappropriately will cause irretrievable data loss. CAUTION: Make sure that there is no possibility of losing power while using this option as this option does not support power fail protection. 17

18 Index A Authenticate from file 13, 14, 15 Authenticate from token 13, 14 authentication 9 Authentication 8 Authentication Code 10 Authorization 7 Authorization Code 7 C Create EETech USB Disk 6 Crypt Sectors 14 D Decrypt 13, 14 E EE credential 11 EETech 4, 10 EETech for Mac 6 EETech USB disk 7 Emergency Boot 10 Encrypt 13, 14 Endpoint Encryption for Mac 4 export 8 F file authentication 12 R recovery change password 9 self-recovery 9 Recovery 6 recovery information file 8, 9 Recovery Information file 12, 15 Recovery Information File 10 Remove EE 11, 12 Repairing preboot 15 S system administrator 4 T token authentication 11 Token Authentication 8 U USB 6 W Workspace 13 18

McAfee Endpoint Encryption for PC 6.2

McAfee Endpoint Encryption for PC 6.2 EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 EETech User Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Endpoint Encryption 7.0

McAfee Endpoint Encryption 7.0 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Endpoint Encryption 7.0 Patch 1 Software

McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide McAfee Endpoint Encryption 7.0 Patch 1 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3 The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release. Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

McAfee Drive Encryption 7.1.0 Software

McAfee Drive Encryption 7.1.0 Software Best Practices Guide McAfee Drive Encryption 7.1.0 Software For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Entrust Certificate Services for Adobe CDS

Entrust Certificate Services for Adobe CDS Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

SecureDoc for Mac v6.1. User Manual

SecureDoc for Mac v6.1. User Manual SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and

More information

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012 Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

McAfee Drive Encryption 7.1.0

McAfee Drive Encryption 7.1.0 Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013

Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013 Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later Technical Paper October 2013 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Administration Guide. McAfee SaaS Email Archiving

Administration Guide. McAfee SaaS Email Archiving Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

McAfee Drive Encryption 7.1

McAfee Drive Encryption 7.1 Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

White Paper: Whole Disk Encryption

White Paper: Whole Disk Encryption How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

Time Machine Setup for Routers

Time Machine Setup for Routers User Manual August 2015 202-11590-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Secure Perfect RAID Recovery Instructions

Secure Perfect RAID Recovery Instructions Secure Perfect RAID Recovery Instructions Contents Overview Dell PowerEdge 2500 RAID Level 1 Recovery Instructions Overview NOTE If you possess a previous version of this document, you may notice changes

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark

More information

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac quick startup guide Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 2 Working with SafeGuard

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting

More information

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Implementing McAfee Device Control Security

Implementing McAfee Device Control Security Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site.

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site. 1 of 5 Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of Symantec Endpoint Encryption Full Disk for Mac OS X. Symantec Corporation

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

WatchDox for Mac User Guide

WatchDox for Mac User Guide WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized

More information

McAfee Endpoint Encryption (SafeBoot) User Documentation

McAfee Endpoint Encryption (SafeBoot) User Documentation TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee Endpoint Encryption Reporting Tool

McAfee Endpoint Encryption Reporting Tool McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information