McAfee Endpoint Encryption 7.0

Save this PDF as:
Size: px
Start display at page:

Download "McAfee Endpoint Encryption 7.0"

Transcription

1 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software

2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Endpoint Encryption 7.0 Product Guide

3 Contents Preface 7 About this guide Audience Conventions Find product documentation Introduction 9 Comprehensive McAfee Endpoint Encryption What is McAfee Endpoint Encryption How McAfee Endpoint Encryption works Product components Features Requirements Requirements testing for client systems Installing EEPC 17 Installing the EEPC client Overview of the installation process Install the EEPC and Help extensions Check in the EEPC software packages Register Windows Active Directory Configure automation server task for LDAP synchronization Deploy EEPC to the client system Send an agent wake-up call Install EEPC using a third-party tool Add users to a system Assign a policy to users Configure UBP enforcement Assign a policy to a system Enforce EEPC policies on a system Edit the client tasks Enable the Pre-Boot Smart Check feature Upgrading from EEPC 6.x.x Overview of the upgrade process User experience summary Uninstalling the EEPC client Deactivate the EEPC client Remove EEPC from the client system Remove the EEPC extensions Remove the EEPC software packages Manually uninstall EEPC from the client system EEPC offline activation 33 How offline activation works Create and download the McAfee Agent installation package McAfee Endpoint Encryption 7.0 Product Guide 3

4 Contents Extracting the MSI packages (EEAgent and EEPC) Extract the EpeOaGenXML.exe file Extract and download the Key Server Public Key Create the user configuration file Creating the offline activation package Generate the offline activation package Performing offline activation Install the McAfee Agent package Install the EEAgent and EEPC software packages Install the offline activation package and activate EEPC Log on to the client system Perform recovery tasks using EETech Installing EEMac 43 Installing the EEMac client Overview of the installation process Deploy McAfee Agent to the Mac OS X client Deploy McAfee Agent to Mac OS X client through SSH Install the EEMac extensions Check in the EEMac software packages Register Windows Active Directory Configure automation task for LDAP synchronization Deploy EEMac to the client system Send an agent wake-up call Add users to a system Assign a policy to a system Enforce EEMac policies on a system Edit the client tasks How to run the MER tool for EEMac Upgrading from EEMac 1.x/6.x to EEMac Overview of the upgrade process User experience summary Uninstalling the EEMac client Deactivate the Endpoint Encryption Agent Remove EEMac from the client system Remove the EEMac extensions Remove the EEMac software packages Manually uninstall EEMac from the client system Managing McAfee Endpoint Encryption policies 57 Policy management Policy categories Create a policy from the Policy Catalog Edit EE policy settings from Policy Catalog Assign a policy to a system group Enforce EE policies on a system group Managing McAfee Endpoint Encryption users 71 View the list of users assigned to a system Remove users from a system Edit user inheritance How EEPC controls the Windows logon mechanism Enable Single-Sign-On (SSO) on a system Synchronize the EEPC password with the Windows password Configure password content rules Manage a disabled user in Windows Active Directory McAfee Endpoint Encryption 7.0 Product Guide

5 Contents Managing the blacklist rule with the ALDU function Add an ALDU blacklist policy Configure global user information Manage logon hours Define EE permission sets for McAfee epo users Managing client computers 81 Add a system to an existing system group Move systems between groups Select the disks for encryption Enable or disable the automatic booting Enable or disable the temporary automatic booting for PC Enable or disable the temporary automatic booting for Mac Set the priority of encryption providers Maintain a list of incompatible products Enable Accessibility (USB audio devices) in the Pre-Boot environment Allow user to update self-recovery answers Manage the default and customized themes Assign a customized theme to a system Manage simple words Endpoint Encryption system recovery McAfee Endpoint Encryption out-of-band management 93 The EEDeep extension Enable the out-of-band feature Configure the Out Of Band - Remediation functionality Configure the Out Of Band - Unlock PBA feature Configure the Out Of Band - User Management feature Configuring and managing tokens/readers 99 Modify the token type associated with a system or group How to use a Stored Value token in Endpoint Encryption for PC Associate a Stored Value token with a system or group How to make Single-Sign-On (SSO) work How to use a PKI token in Endpoint Encryption Associate a PKI token with a system or group How to make SSO work for EEPC How to use a Self-Initializing token in Endpoint Encryption Associate a Self-Initializing token with a system or group How to make SSO work for EEPC Setup scenarios for the 'Read Username from Smartcard' feature Set up using the Subject field Set up using the Subject Alternative Name - Other Name field How to use a Biometric token in Endpoint Encryption for PC How to use a UPEK Biometric token in Endpoint Encryption for PC How to use a Validity Biometric token in Endpoint Encryption for PC Managing EE reports 107 Queries as dashboard monitors Create EE custom queries View the standard EE reports Endpoint Encryption client events Create the EE dashboard View the EE dashboard Report the encrypted and decrypted systems McAfee Endpoint Encryption 7.0 Product Guide 5

6 Contents 11 Recovering users and systems 115 Enable or disable the self-recovery functionality Perform the self-recovery on the client computer Enable or disable the administrator recovery functionality Perform administrator recovery on the client computer Generate the response code for the administrator recovery End user self-recovery in Mac systems Perform end user self-recovery on a Mac system FIPS certification 121 Pre-requisites to use EEPC in FIPS mode Install the EEPC client packages in FIPS mode Impact of FIPS mode Uninstalling the EEPC client packages in FIPS mode Common Criteria EAL2+ mode operation 123 Administrator guidance User guidance Index McAfee Endpoint Encryption 7.0 Product Guide

7 Preface This guide provides the information you need to configure, use, and maintain your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who use the computer where the software is running and can access some or all of its features. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Endpoint Encryption 7.0 Product Guide 7

8 Preface Find product documentation Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 8 McAfee Endpoint Encryption 7.0 Product Guide

9 1 Introduction 1 McAfee Endpoint Encryption delivers powerful encryption that protects data from unauthorized access, loss, and exposure. With data breaches on the rise, it is important to protect information assets and comply with privacy regulations. Contents Comprehensive McAfee Endpoint Encryption What is McAfee Endpoint Encryption How McAfee Endpoint Encryption works Product components Features Requirements Requirements testing for client systems Comprehensive McAfee Endpoint Encryption This guide indicates Endpoint Encryption (EE) as the term to describe EEPC and EEMac. The content that refers to the term Endpoint Encryption (EE) is applicable to both EEPC and EEMac. Procedures and other details that are different for EEPC and EEMac setup are described in separate sections indicating its individual product name, for example, EEPC or EEMac. The McAfee Endpoint Encryption (EE) suite provides multiple layers of defense against data loss with several integrated modules that address specific areas of risk. The suite provides protection for individual computers, roaming laptops, MacBooks, and Mac desktops with 64 bit Extensible Firmware Interface (EFI). This guide discusses these McAfee Endpoint Encryption solutions: McAfee Endpoint Encryption for PC McAfee Endpoint Encryption for Mac What is McAfee Endpoint Encryption McAfee Endpoint Encryption (EE) is a strong cryptographic facility for denying unauthorized access to data stored on any system or disk when it is not in use. It prevents the loss of sensitive data, especially from lost or stolen equipment. It protects the data with strong access control using Pre Boot Authentication and a powerful encryption engine. To log on to a system, the user must first authenticate through the Pre Boot environment. On a successful authentication, the client system's operating system (Microsoft Windows or Mac OS X) loads and gives access to normal system operation. McAfee Endpoint Encryption is completely transparent to the user and has little impact on the computer's performance. McAfee Endpoint Encryption 7.0 Product Guide 9

10 1 Introduction How McAfee Endpoint Encryption works McAfee Endpoint Encryption is the encryption software installed on client systems and the managing component on the servers. It is deployed and managed through McAfee epolicy Orchestrator (McAfee epo ) using policies. A policy is a set of rules that determine how McAfee Endpoint Encryption software functions on the user s computer. How McAfee Endpoint Encryption works McAfee Endpoint Encryption protects the data on a system by taking control of the hard disk or self encrypting drive (Opal), from the operating system. For more information about Opal, see Features. The Endpoint Encryption driver encrypts all data written to the disk; it also decrypts the data read off the disk. The McAfee Endpoint Encryption software is installed on the client system. After the installation has completed, and depending on the settings within the Endpoint Encryption policy assigned to the client system, the client system might start to activate Endpoint Encryption. Until a successful activation, encryption doesn't start, and Pre Boot Authentication does not appear if the system is restarted. During the activation process, the system synchronizes with McAfee epolicy Orchestrator (McAfee epo) and acquires user data, token data, and Pre Boot theme data. However, the system can be activated without synchronizing with the McAfee epo server while following the Offline Activation process. Only once this activation process is successfully completed; Endpoint Encryption takes control of the disk and starts to enforce any encryption policy. Once activation has successfully completed, restart the system so that the user authenticates and logs on through the Pre Boot environment, which will then load the operating system. Product components Each McAfee Endpoint Encryption component or feature as explained below plays a part in protecting your systems. McAfee epolicy Orchestrator Administration The McAfee epo server provides a scalable platform for centralized policy management and enforcement of your security products and systems on which they reside. The McAfee epo console allows the administrator to manage McAfee Endpoint Encryption policies on the client computer. The console also allows you to deploy and manage McAfee Endpoint Encryption products. It provides comprehensive reporting and product deployment capabilities; all through a single point of control. This guide does not provide detailed information about installing or using the McAfee epo software. See the product documentation for your version of McAfee epo. Policies McAfee Endpoint Encryption is managed through McAfee epo using a combination of User Based Policies and Product Settings Policies. The McAfee epo console allows the administrator to enforce policies across groups of computers or on a single computer. Any new policy enforcement through McAfee epo overrides the existing policy that is already set on the individual systems. For information regarding policies and how they are enforced, see the product documentation for your version of McAfee epo. 10 McAfee Endpoint Encryption 7.0 Product Guide

11 Introduction Product components 1 EEPC/EEMac The EEPC/EEMac extension installed in McAfee epo defines the encryption algorithm, product settings, and server settings for the client system. The EEPC/EEMac software package checked in to McAfee epo defines the actual Endpoint Encryption software that is installed on the client system. Endpoint Encryption Admin The Endpoint Encryption administration system called EE Admin defines the generic Endpoint Encryption settings for Product Settings Policies, User Based Policies, Add local domain user settings, and Server settings for the users. This is common for both EEPC and EEMac. LDAP Server McAfee Endpoint Encryption acquires users through the Windows Active Directory (AD). You must have a registered LDAP server to use Policy Assignment Rules, to enable dynamically assigned permission sets, and to enable manual and automatic user account creation. Client system components For McAfee epo to communicate, the client system should be configured with the components such as: For EEPC Windows operating system McAfee Agent for Windows For EEMac Mac OS X platform McAfee Agent for Mac The epolicy Orchestrator server deploys the EE Agent and the EE product to the client system. The user installs the McAfee Agent on a Mac client system using install.sh file, which is picked up from the Windows based system where the McAfee epo server is installed. However, on Windows based systems, epolicy Orchestrator itself deploys the McAfee Agent to the client system. For more details and procedures, see the product documentation for your version of McAfee epo. McAfee Endpoint Encryption product components are depicted in Figure 1. McAfee Endpoint Encryption 7.0 Product Guide 11

12 1 Introduction Features Figure 1-1 Product components Features These features of McAfee Endpoint Encryption are important for your organization's system security and protection. EE leverages the McAfee epo infrastructure for automated security reporting, monitoring, deployment, and policy administration. EE integrates itself fully into McAfee epo so that the management can be performed from this console. EE enables transparent encryption without hindering users or system performance. EE enforces strong access control with Pre Boot Authentication. EEPC supports locking/unlocking and managing of self encrypting drives (Opal 1.0) from Trusted Computing Group (TCG). EEPC supports Intel Active Management Technology (Intel AMT) for remotely managing and securing systems in conjunction with epo Deep Command. EEMac allows an end user to self remediate most of the Pre Boot issues on a Mac OSX system, without contacting the administrator. The McAfee Recovery feature in EEMac allows the end user to perform emergency when the system fails to reboot or its PBFS is corrupt. Support for self encrypting (Opal from Trusted Computing Group) drive EEPC 7.0 provides a management facility for Opal drives, which are self contained, standalone Hard Disk Drives (HDD) that conform to the TCG Opal standard. The drive is always encrypted by the on board crypto processor, however, it might or might not be locked. Though Opal drives handle all of the encryption, they need to be managed by management software like McAfee epo. If an Opal drive is not managed, it behaves and responds like a normal HDD. Opal is now supported on Windows 8 and UEFI systems that support Secure Boot. 12 McAfee Endpoint Encryption 7.0 Product Guide

13 Introduction Requirements 1 Opal self encrypting drives will be supported on UEFI systems where the system is Windows 8 logo compliant and if the system was shipped from the manufacturer fitted with an Opal self encrypting drive. Opal self encrypting drives may not be supported on UEFI systems if the system is not Windows 8 logo compliant, or if the system did not ship from the manufacturer fitted with an Opal self encrypting drive. This is because a UEFI security protocol that is required for Opal management is only mandatory on Windows 8 logo compliant system where a Opal self encrypting drive is fitted at the time of shipping. Those shipped without self encrypting drives may or may not include the security protocol. Without the security protocol, Opal management is not possible. EEPC 7.0 will support the Opal encryption provider on UEFI systems fitted with an Opal drive if the UEFI protocol EFI_STORAGE_SECURITY_COMMAND_PROTOCOL is present on the system. However, this does not affect support for Opal drives under BIOS. The combination of EEPC and McAfee epo for Opal provides: Centralized management Reporting and recovery functionality Secure Pre Boot Authentication that unlocks the Opal drive Efficient user management Continuous policy enforcement The overall experience and tasks of an administrator and users in installing and using EEPC, are the same, whether the target system has an Opal drive or a normal HDD. The installation of the product extension, deployment of the software packages, policy enforcement, and the method of management are the same for systems with Opal and Non Opal HDD. To activate a system using Opal locking, Windows 7 SP1 or above is required. On systems with Opal drives where the Operating System is Windows 7 RTW or below, PC software encryption will be used. When any OPAL system activated using OPAL encryption is reimaged and restarted without removing Endpoint Encryption, the user is locked out of the system. This happens because: The Pre Boot is held off the disk and it is still active. The Pre Boot File System is destroyed during the imaging process. Opal activation might occasionally fail because the Microsoft defragmentation API used fails to defragment the host. For this to happen, the activation will restart at the next ASCI. Requirements These are the requirements for your computer that you should be aware of before installing EEPC and EEMac. McAfee Endpoint Encryption 7.0 Product Guide 13

14 1 Introduction Requirements Table 1-1 System requirements Systems McAfee epo server systems Client systems for EEPC Requirements See the product documentation for your version of McAfee epo. CPU: Pentium III 1 GHz or higher RAM: 512 MB minimum (1 GB recommended) Hard Disk: 200 MB minimum free disk space For requirements on Intel AMT systems, see the product documentation for epo Deep Command. Client systems for EEMac CPU: EEMac works on all Intel based Mac CPU with 64 bit EFI RAM: 1 GB minimum Hard Disk: 1 GB minimum free disk space Table 1-2 Software requirements Software Requirements McAfee epo EEPC 7.0 See the McAfee Endpoint Encryption for PC 7.0 Release Notes EEMac 7.0 See the McAfee Endpoint Encryption for Mac 6.2 Release Notes McAfee Endpoint Encryption for PC software (for Windows) Extensions EEADMIN.zip EEPC.zip help_ee_700.zip EEDEEP.ZIP Before installing this extension, you have to install the epo Deep Command extension. McAfee Endpoint Encryption for Mac software (for Mac OS X) EEPC software package EE Agent Extensions MfeEEPC.zip MfeEEAgent.zip EEADMIN.zip EEMAC.zip help_ee_700.zip EEMac software package MfeEeMac x.zip EEMac Agent MfeEEAgent x.zip Microsoft Windows Installer 3.0 Redistributable package (for McAfee epo) Microsoft.NET Framework 2.0 Redistributable package (for McAfee epo) Microsoft MSXML 6 (for McAfee epo) See the product documentation for your version of McAfee epo. See the product documentation for your version of McAfee epo. See the product documentation for your version of McAfee epo. 14 McAfee Endpoint Encryption 7.0 Product Guide

15 Introduction Requirements testing for client systems 1 Table 1-3 Operating system requirements Systems McAfee epo server systems Client systems for EEPC Software See the product documentation for your version of McAfee epo. Windows Server 2003 SP1 or later (32 bit only) Windows Server 2008 (32 and 64 bit) Windows XP Professional SP3 (32 bit only) Windows Vista SP1 or later (32 and 64 bit) Windows 7 and SP1 (32 and 64 bit), (Not XP Mode) For Opal activation, Windows 7 SP1 is required. Windows 8 (32 and 64 bit) EEPC 7.0 supports Windows 8 in UEFI boot mode that runs only on Windows 8 logo certified hardware. Client systems for EEMac Lion: and later (32 and 64 bit) Mountain Lion: and later (32 and 64 bit) Table 1-4 Hardware support for Mac Systems Types Macs with 64 bit EFI MacBook, MacBook Pro, MacBook Air, and Mac desktops. For more information about supported Mac hardware, refer to this KnowledgeBase article link kc.mcafee.com/corporate/index?page=content&id=kb72604 Requirements testing for client systems McAfee Endpoint Encryption for PC requirements must be met before it can be installed on a client system. McAfee Endpoint Encryption GO (EEGO) 7.0 McAfee provides the McAfee Endpoint Encryption GO (EEGO) 7.0 utility for system administrators to determine which systems are compatible for installing and activating EEPC. EEGO runs a set of compatibility tests on a client system, and then creates a report through the McAfee epo console that summarizes the readiness of the managed systems. The McAfee Endpoint Encryption system policy can be configured to prevent activation of encryption on client systems that fail EEGO testing. Make sure that EEGO is not a pre requisite for installing EEPC and it comes as a separate package. If the system is connected to the McAfee epo server, the system sends the readiness status to McAfee epo through McAfee Agent. The overall EEGO installation and deployment process can be simplified into the following steps. This assumes that the user has already successfully installed McAfee epo and has McAfee Agent installed on all appropriate client systems that successfully communicates with McAfee epo. McAfee Endpoint Encryption 7.0 Product Guide 15

16 1 Introduction Requirements testing for client systems 1 Install the EEGO extension (EEGO.ZIP) in McAfee epo. Repeat the same procedures used for installing the product extension. 2 Check in the EEGO software package (EegoPackage.ZIP) to McAfee epo. Repeat the same procedures used for checking in the product package. 3 Deploy Endpoint Encryption GO to the client system. Repeat the same procedures used for the product deployment task. 4 Enforce EEGO policies to the client system. After restarting, the client system communicates with the McAfee epo server and pulls down the assigned Endpoint Encryption GO policy, runs the tests and reports the system diagnostic information according to the defined policies. If you select the Only activate if health check (Endpoint Encryption : Go) passes option and then uninstall EEGO from the client, it is not possible to deselect this option. As a result of this, EEPC will fail to activate. Also, the status of EEGO endpoints can be monitored through various chart representations available in McAfee epo. EEGO runs these tests for installing EEPC: Incompatible product detection: SafeBoot, HP ProtectTools 2009, Bitlocker, PointSec, Truecrypt, GuardianEdge, Symantec Endpoint Encryption, SafeGuardEasy and PGP Whole Disk Encryption. Smart Controller predictive failure, a test that reports if the Operating System is reporting that the S.M.A.R.T. controller is indicating an imminent failure. Disk Status, a test for BIOS based systems, reports if the disk (MBR and partition structure) is suitable to install EEPC. Make sure to note that EEGO is not supported for UEFI systems. Datachannel communication status, a test reporting of the success or failure of the Datachannel communication from the client to the McAfee epo server. Datachannel communication delay, a test in milliseconds of the delay of the communication between the McAfee epo server and the endpoint. If any of these requirements is not valid, and the EEPC system policy is configured to abandon activation if the EEGO tests fail, EEPC activation will be abandoned. EEGO is capable of detecting a series of circumstances that might impact the rollout of EEPC. However, EEGO does not replace the need to perform due diligence testing prior to a rollout. Pre boot Smart Check The Pre Boot Smart Check is functionality in EEPC that performs various tests to ensure that the EEPC pre boot environment can work successfully on a device. It will test the areas that have been identified to cause incompatibility issues in the past. If a device fails the Pre Boot Smart Check it will not activate EEPC and will not proceed. You can view the audit log to get the latest information on any progress of the check from the last time the device synchronized with McAfee epo. The Pre Boot Smart Check can be used in conjunction with EEGO and help administrators during initial deployments. EEGO will perform checks and validation in the operating system, and the Pre Boot Smart Check will perform checks/validations outside of the operating system. The combined usage can give administrators the highest confidence of a successful deployment. 16 McAfee Endpoint Encryption 7.0 Product Guide

17 2 Installing EEPC This chapter covers the high level process of installing, upgrading, and uninstalling the EEPC client. Contents Installing the EEPC client Upgrading from EEPC 6.x.x Uninstalling the EEPC client Installing the EEPC client The EEPC extensions and software packages are checked in to the McAfee epo server for the management functionality. This is necessary before deploying the software and configuring the policies. This release supports migrating your EEPC 5.x.x installed systems and upgrading EEPC 6.x.x installed systems to EEPC 7.0. For more details and procedures on migrating your EEPC 5.x.x installed systems to EEPC 7.0, see the McAfee Endpoint Encryption for PC 7.0 Migration Guide. In this guide, EEPC 5.x.x refers to EEPC or later versions EEPC 6.x.x refers to EEPC 6.1 Patch 2 or later versions Make sure that you remove any competitor's encryption products from your system. Also, do not install any other encryption products after installing EEPC. Overview of the installation process The EEPC client software is deployed from the McAfee epo server and installed on the client system through the McAfee Agent. The client system requires a restart to complete the installation. After the restart, the client communicates with the McAfee epo server, pulls down the assigned Endpoint Encryption policies, assigned users, and encrypts the system according to the defined policies. EEPC creates the Pre Boot File System (PBFS) on the client system at the time of activation. The assigned users can be initialized through the Pre Boot screen after the subsequent restart. The overall EEPC installation and deployment process can be simplified into the following steps. The entire installation and deployment process is the same for both PC software and Opal encrypted drives. This assumes that the user has already installed McAfee epo and has the McAfee Agent installed on various systems, which successfully communicate with the McAfee epo server. McAfee Endpoint Encryption 7.0 Product Guide 17

18 2 Installing EEPC Installing the EEPC client 1 Install the EEAdmin, EEPC, and EEDeep extensions into McAfee epo. Make sure to note that EEDeep is an optional extension and can be installed only if you want to use epo DeepCommand with EEPC. 2 Check in the EEPC software packages (MfeEEAgent.zip and MfeEEPC.zip in the order) to the McAfee epo server. 3 Configure the registered server (Windows Active Directory). 4 Configure and run the automation server task for LDAP Synchronization. 5 Deploy the Endpoint Encryption Agent to the client system. 6 Deploy the EEPC software package to the client system. 7 Restart the client system. You should now be able to see the Quick Settings Show Endpoint Encryption Status option in McAfee Agent System Tray on the client system. 8 Add users to the system or a group of systems. 9 Create a custom product settings policy or edit the default policy, then assign it to the system or a group of systems. 10 Create a custom user based policy or edit the default policy, then assign it to a user or a group of users on a system. Configure UBP enforcement if using Policy Assignment Rules. The Show Endpoint Encryption Status changes from Inactive to Active only after adding the user(s) and enforcing the policies correctly. 11 Verify the Endpoint Encryption System Status by right clicking McAfee Agent System Tray on the client system, then clicking Quick Settings Show Endpoint Encryption Status. In some cases, EEPC installed systems might fail to lock OPAL disks during reboot. Subsequent policy enforcement might fail until a full power cycle is performed. For more details, refer to the KnowledgeBase article Install the EEPC and Help extensions You can view and configure the policies and settings of EEPC by installing the product and help extensions into the repository on the McAfee epo server 4.6. You must have appropriate permissions to perform this task. You must install the extensions in order: EEADMIN.zip, EEPC.zip, help_ee_700.zip, and EEDeep.zip. 1 Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Software Extensions Install Extension to open the Install Extension dialog box. 3 Click Browse and select the extension file EEADMIN.zip, then click OK. The Install Extension page appears with the extension name and version details. 4 Click OK. 5 Repeat steps 2 through 4 to install EEPC.zip, help_ee_700.zip, and EEDeep.zip extensions. 18 McAfee Endpoint Encryption 7.0 Product Guide

19 Installing EEPC Installing the EEPC client 2 Check in the EEPC software packages The software package needs to be checked in to the master repository so that you can deploy the software to the client system using epolicy Orchestrator. You must check in two packages: MfeEEAgent.zip and MfeEEPC.zip in the order. You must have appropriate permissions to perform this task. Before checking in the software packages, make sure there are no pull or replication tasks running. If you are installing the EEPC 7.0 on the Windows 8 client system, we recommend that you install the McAfee Agent 4.6 Patch 2 package 1 Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Software Master Repository, then click Actions Check In Package to open the Check In Package wizard. 3 From the Package type list, select Product or Update (.zip), then browse and select the MfeEEAgent.zip package file. 4 Click Next to open the Package Options page. 5 Click Save. When the package is checked in, it appears in Packages in the Master Repository list on the Master Repository page. 6 Repeat steps 2 through 5 to install the MfeEEPC.zip package. The new package appears in the Packages in Master Repository list on the Master Repository page under the respective branch in the repository. Register Windows Active Directory It is necessary to register Windows Active Directory with McAfee epo to in order to create EEPC users. Make sure that you have the appropriate permissions to modify the server settings, permission sets, users, and registered servers. 1 Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Configuration Registered Servers, then click New Server to open the Registered Server Builder wizard. 3 From the Server type drop down list on the Description page, select LDAP Server, specify a unique user friendly name and any details, then click Next. McAfee Endpoint Encryption 7.0 Product Guide 19

20 2 Installing EEPC Installing the EEPC client 4 On the Details page: a Select Active Directory from LDAP server type, then type the Domain name or the Server name. Use DNS style domain name. While using DNS style domain name, make sure that the McAfee epo system is configured with appropriate DNS setting and can resolve the DNS style domain name of the Active Directory. The Server name is the name or IP address of the system where the Windows Active Directory is present. b Type the User name. The User name should be of the format: domain\username for Active Directory accounts. c d Type the Password and confirm it. Click Test Connection to verify that the connection to the server works, then click Save. Configure automation server task for LDAP synchronization You can create many tasks that run at scheduled intervals to manage the McAfee epo server and McAfee Endpoint Encryption software. Run this task to synchronize EEPC with the user Active Directory. You must have appropriate permissions to perform this task. 1 Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Automation Server s to open the Server s page. 3 Click Actions New to open the Server Builder wizard. 4 On the Description page, name the task, add a description about the task, select Enabled under Schedule status, then click Next. 5 From the Actions drop down list, select EE LDAP Server User/Group Synchronization and accept the default values. 6 Click Next to open the Schedule page. 7 Schedule the task, then click Next to display the Summary page. 8 Review the task details, then click Save. In addition to the task running at the scheduled time, you can run this task immediately by clicking Run next to the task on the Server s page. Deploy EEPC to the client system The McAfee epo repository infrastructure allows you to deploy the EEPC product to your managed systems from a central location. Once you have checked in the software package, use this Product Deployment client task to install the product on managed systems. For more details and procedures on how to perform this task, see the product documentation for your version of McAfee epo. You must have appropriate permissions to perform this task. 20 McAfee Endpoint Encryption 7.0 Product Guide

21 Installing EEPC Installing the EEPC client 2 To perform a check on requirements and compatibility of the client system, you need to deploy EEGO 7.0 to the client system. For more information about deploying EEGO 7.0 to the client system, see the Requirements testing for client systems section. 1 Click Menu Policy Client Catalog, select McAfee Agent Product Deployment as Client Types, then click Actions New. The New dialog box appears. 2 Make sure that Product Deployment is selected, then click OK. 3 Type a name for the task you are creating and add any notes. 4 Next to Target platforms, select Windows to use the deployment. 5 Next to Products and components set the following: a Select Endpoint Encryption Agent for Windows x to specify the version of the EEAgent to be deployed. b c Click + and select Endpoint Encryption for PC x to specify the version of the EEPC package to be deployed. Set the Action to Install, then select the Language of the package, and the Branch. 6 Next to Options, select if you want to run this task for every policy enforcement process (Windows only) and click Save. 7 Click Menu Systems System Tree Systems, then select the system on which you want to deploy product and click Actions Agent Modify s on a single system. 8 Click Actions New Client Assignment. The Client Assignment Builder wizard appears. 9 On the Select page, select Product as McAfee Agent and Type as Product Deployment, then select the task you created for deploying product. 10 Next to Tags, select the desired platforms to which you are deploying the packages, then click Next: Send this task to all computers Send this task to only computers that have the following criteria Use one of the edit links to configure the criteria. 11 On the Schedule page, select whether the schedule is enabled, and specify the schedule details, then click Next. 12 Review the summary, then click Save. Send an agent wake-up call The client computer gets the policy update whenever it connects to the McAfee epo server during the next Agent Server Communication Interval (ASCI). The policy update can be scheduled or forced. The agent wake up call option forces the policy update to the client system. For information on adding a new system, see the product documentation for your version of McAfee epo. You must have appropriate permissions to perform this task. McAfee Endpoint Encryption 7.0 Product Guide 21

22 2 Installing EEPC Installing the EEPC client 1 Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Systems System Tree, then select a system or a group of system(s) from the left pane. 3 Select the System Name(s) of that group. 4 Click Actions Agents Wake Up Agents from the drop down menu. 5 Select a Wake up call type and a Randomization period (0 60 minutes) by which the system(s) respond to the wake up call sent by epolicy Orchestrator. 6 Select Get full product properties for the agent(s) to send complete properties instead of sending only the properties that have changed since the last agent to server communication. 7 Select Force complete policy and task update for the agent to send the complete policy and task update. 8 Click OK. To view the status of the agent wake up call, navigate to Menu Automation Server Log. Install EEPC using a third-party tool Although McAfee epo has all required features for deploying EEPC, you might need to use a third party tool to deploy the product. Make sure that your McAfee epo version is at least 4.6 Patch 4 or later. Make sure that your McAfee Agent for Windows version is at least 4.6 or later. Make sure that you have installed the EEPC 7.0 extensions (EEAdmin.zip and EEPC.zip) on McAfee epo. Make sure that your LDAP server is registered in McAfee epo. There are two files required to be installed, and two versions of each file, different per OS type. Agent installer files: MfeEEAgent32.msi or MfeEEAgent64.msi Plug in installer files: MfeEEPc32.msi or MfeEEPc64.msi For more information about enabling the logs when installing EEPC through msi, see kc.mcafee.com/corporate/index?page=content&id=kb Determine whether your client computer is running a 32 bit or a 64 bit version of Windows operating system. 2 Log on to the target computer using an administrator account that has sufficient rights for installing the software. 3 Copy the agent and plug in installer files for your operating system, to a temporary location on the client system. 4 Install the agent: double click the agent installer file for your operating system. 22 McAfee Endpoint Encryption 7.0 Product Guide

23 Installing EEPC Installing the EEPC client 2 5 Install the plug in: double click the plug in installer file for your operating system. 6 Restart the client system to complete the installation of EEPC. After restarting the client system, you need to add users and configure the required encryption policies on McAfee epo. On enabling the correct encryption policy, the encryption begins after the next agent to server communication. Add users to a system Use the epolicy Orchestrator server to add the EEPC users to the client system. The EEPC software can be activated on a client system only after adding a user and enforcing the required encryption policies correctly. You must have appropriate permissions to perform this task. 1 Click Menu Data Protection Encryption Users to open the My Organization page. 2 Select a group or system(s) from the System Tree pane on the left. To add users to a particular system, select the required system from the System Tab under the My Organization pane on the right. 3 Click Actions Endpoint Encryption Add Users to open the Add Endpoint Encryption Users page. 4 Add users: Click + in the Users field, browse to the users list, select the Users, then click OK. 5 Add groups: Click + in the From the groups field, browse to the users groups list, select the groups, then click OK. 6 Add an organizational unit: Click + in the From the organizational units field, browse to the organizational unit list, select the unit, then click OK. 7 In the Add Endpoint Encryption Users page, click OK. Assign a policy to users You need to configure and assign the policies to the users, if required, and specify which user or group of users are allowed or not allowed to use the Policy Assignment Rules. The allowed users get their required User Based Policies. You must have appropriate permissions to perform this task. For more details and procedures on how to perform this task, see the product documentation for your version of McAfee epo. You can apply a Policy Assignment Rule to custom policies apart from My Default policies. 1 Click Menu Policy Policy Assignment Rules to open the Policy Assignment Rules page. 2 Click Actions New Assignment Rule. The Policy Assignment Builder wizard opens to the Details page. 3 Type the Name and Description, then click Next. McAfee Endpoint Encryption 7.0 Product Guide 23

24 2 Installing EEPC Installing the EEPC client 4 In the Rule Type field, select either System Based or User Based accordingly. 5 Click Next to open the Assigned Policies page. 6 Click Add Policy to select a policy, define these options: From this drop down list... Select this... Product Endpoint Encryption Category User Based Policies Policy My Default 7 Click Next to open the Selection Criteria page. 8 In the Comparison field, select either System is in group or subgroup or System is in group. In the Value field, the My Organization system tree group is selected by default. 9 Click Next to open the Summary page. 10 Click Save. A policy is assigned to selected users. Configure UBP enforcement By default, all users inherit the default user based policy assigned to a system, and are prevented from using Policy Assignment Rules. This allows maximum system scalability. To allow a user to use a non default UBP, you must enable the Configure UBP enforcement option for that user. This allows Policy Assignment Rules to be performed to select a specific non default user based policy for the user. If not enabled, Policy Assignment Rules are not performed and the user inherits the default user based policy. When the Configure UBP enforcement option is enabled for a user who is not assigned with a Policy Assignment Rule, activation will fail on the client systems. EEPC 7.0 requires that you specify which groups of users are allowed to use the Policy Assignment Rules. The allowed users get their required user based policy. Users who are not allowed to use the Policy Assignment Rules inherit the default user based policy assigned to the system. 1 Click Menu Reporting Queries & Reports then select Endpoint Encryption from Shared Groups in the Groups pane. The standard EE query list appears. 2 Run the EE: Users query to list all the Endpoint Encryption users. 3 Select a user (or users) from the list to enforce the policy. 4 Click Actions Endpoint Encryption Configure UBP enforcement. The Configure UBP enforcement page appears. 5 Select Enable or Disable, then click OK to configure the UBP enforcement state. At each ASCI, McAfee epo ensures that all the relevant user based policies are deployed to each client in addition to the user based policy for the logged on user configured with UBP enforcement. On selecting Enable, Policy Assignment Rules are enabled for the selected users, and a specific UBP is assigned to the user according to the rule defined. Policy Assignment Rules are enabled for the selected users only if a rule has been set for those users. 24 McAfee Endpoint Encryption 7.0 Product Guide

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Drive Encryption 7.1.0

McAfee Drive Encryption 7.1.0 Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Endpoint Encryption 7.0 Patch 1 Software

McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide McAfee Endpoint Encryption 7.0 Patch 1 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Encryption for Files and Folders 4.2

McAfee Endpoint Encryption for Files and Folders 4.2 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Drive Encryption 7.1.0 Software

McAfee Drive Encryption 7.1.0 Software Best Practices Guide McAfee Drive Encryption 7.1.0 Software For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Endpoint Encryption for PC 6.2

McAfee Endpoint Encryption for PC 6.2 EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3 The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 EETech User Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Policy Auditor 6.2.0 software Installation Guide

McAfee Policy Auditor 6.2.0 software Installation Guide McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Drive Encryption 7.1

McAfee Drive Encryption 7.1 Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Yale Software Library

Yale Software Library e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or helpdesk@yale.edu Installation PGP Desktop for Windows Operating Systems Preparing your computer:

More information

CCEVS Approved Assurance Continuity Maintenance Report

CCEVS Approved Assurance Continuity Maintenance Report Record ID: VID10486-0004-ACMR TM CCEVS Approved Assurance Continuity Maintenance Report Product: Orchestrator 4.6 EAL: 2 augmented with ALC_FLR.3 Date of Activity: 25 March 2013 References: Documentation

More information

Product Guide. McAfee Agent 4.8.0

Product Guide. McAfee Agent 4.8.0 Product Guide McAfee Agent 4.8.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Policy Auditor 6.2.0 software

McAfee Policy Auditor 6.2.0 software McAfee Policy Auditor 6.2.0 software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0 Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Installation Guide. McAfee Vulnerability Manager 7.5

Installation Guide. McAfee Vulnerability Manager 7.5 Installation Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

SafeGuard Easy startup guide. Product version: 7

SafeGuard Easy startup guide. Product version: 7 SafeGuard Easy startup guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 About Sophos SafeGuard (SafeGuard Easy)...4 2.1 About Sophos SafeGuard (SafeGuard Easy) 7.0...6

More information

http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx

http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

McAfee Risk Advisor 2.7

McAfee Risk Advisor 2.7 Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Compatibility with Encryption Products

Compatibility with Encryption Products Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Data Loss Prevention Endpoint 9.3.416

McAfee Data Loss Prevention Endpoint 9.3.416 Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.416 For use with McAfee epolicy Orchestrator Contents About this release Resolved issues Installation instructions Known issues Find product

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

McAfee Encrypted USB Manager 3.1 Deployment and Administration Guide

McAfee Encrypted USB Manager 3.1 Deployment and Administration Guide McAfee Encrypted USB Manager 3.1 Deployment COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions

More information