McAfee Endpoint Encryption for PC 7.0
|
|
|
- Godwin Hampton
- 10 years ago
- Views:
Transcription
1 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software
2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Endpoint Encryption for PC 7.0 Migration Guide
3 Contents Preface 5 About this guide Audience Conventions What's in this guide Find product documentation Introduction 7 Using this guide Differences since EEPC 5.x.x Best practices Requirements Migrating to EEPC 7.0 without the migration tool 11 Migrate to EEPC 7.0 without the migration tool Migrating from EEPC 5.x.x 13 Overview of the migration process Components that are exported Components and settings that must be reconfigured Exporting user assignments from the EEPC 5.x.x database 15 Overview of the export process Run the export from the command prompt Run the export wizard Importing users or user assignments into EEPC Overview of the import process Import user assignments using McAfee epo Import scenarios Upgrading from EEPC 5.x.x 27 Supported versions Upgrade from EEPC 5.x.x to EEPC User experience summary Upgrading from EEPC 6.x.x 29 Supported versions Overview of the upgrade process User experience summary Migrating from HPPT to EEPC Supported versions Overview of the migration process Migrate HPPT to EEPC McAfee Endpoint Encryption for PC 7.0 Migration Guide 3
4 Contents 9 Managing EEPC migration reports 35 Queries as dashboard monitors View the EEPC migration reports Migration checklist 37 Frequently Asked Questions 39 Index 43 4 McAfee Endpoint Encryption for PC 7.0 Migration Guide
5 Preface This guide provides the information on migrating to EEPC 7.0 from the previous versions. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who use the computer where the software is running and can access some or all of its features. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Endpoint Encryption for PC 7.0 Migration Guide 5
6 Preface Find product documentation What's in this guide This guide is organized to help you find the information you need. Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Endpoint Encryption for PC 7.0 Migration Guide
7 1 Introduction 1 McAfee Endpoint Encryption for PC 7.0 has an improved architecture and interface. Due to these improvements, some features and settings from earlier versions of the product are now handled differently. In this guide, EEPC 5.x.x refers to EEPC and later versions. EEPC 6.x.x refers to EEPC 6.1 Patch 2 and later versions. The EEPC migration process consists of the following tasks: Export the user assignments from the 5.x.x database Import the user assignments into the McAfee epolicy Orchestrator (McAfee epo ) server that has EEPC 7.0 Export and import the 5.x.x password token when it is available and assign it to EEPC 7.0 users EEPC 7.0 user names are obtained from Active Directory. Migrate supported tokens from EEPC 5.x.x to EEPC 7.0, this may include the Single Sign On (SSO) and Self recovery information Export the audit information Import the audit information Migrate the client system from EEPC 5.x.x Upgrade the client system from EEPC 6.x.x Make sure that the Active Directory server used to add the EEPC 7.0 users contains the same user information that you want to import from 5.x.x. Contents Using this guide Differences since EEPC 5.x.x Best practices Requirements Using this guide The information in this guide helps you to migrate EEPC 5.x.x systems into EEPC 7.0. This guide helps you to: Understand the differences between the EEPC versions Export the combination of user groups and users from the 5.x.x database McAfee Endpoint Encryption for PC 7.0 Migration Guide 7
8 1 Introduction Differences since EEPC 5.x.x Import the exported users, password token, SSO, Self recovery and audit details into McAfee epo Re create any settings that are not migrated Upgrade the client systems to EEPC 7.0 Differences since EEPC 5.x.x The differences are discussed for each major feature. Migration from version 5.x.x EEPC 7.0 allows the administrator to extract users and token details from the 5.x.x database, import into epolicy Orchestrator, and upgrade the clients to EEPC 7.0. To help you export or import the users, Password token, SSO, Self Recovery, and the audit details to the McAfee epo server, this release has an integrated migration tool. Token support A list of prioritized tokens that are already supported in EEPC 5.x.x are now supported in EEPC 7.0 and the available password token can now be exported and imported to EEPC 7.0. Best practices Follow these recommendations to make the migration process easier and more effective. Migration tool Make sure that you have the latest EEMigration.ZIP file of EEPC 7.0 to implement and perform the export. We recommend that you copy and extract the EEMigration.ZIP file to the folder where Endpoint Encryption Manager (EEM) is installed. Exporting 5.x.x database Make sure that you have access rights to view system and user properties on Endpoint Encryption Manager and the McAfee epo server. Importing the user assignments from 5.x.x database into the McAfee epo server Make sure that the Active Directory server used to add the EEPC 7.0 users contains the same user information that you want to import from 5.x.x. Make sure that you have registered an LDAP server on the McAfee epo server before initiating the import process. Make sure that you have scheduled and run the EE LDAP Server User/Group Synchronization server task before initiating the import process. Make sure that you have added the required client systems to epolicy Orchestrator to which you want to match and assign the users. Analyze the import preview results and perform manual assignments where automatic assignments have not been possible. 8 McAfee Endpoint Encryption for PC 7.0 Migration Guide
9 Introduction Best practices 1 Do not navigate away or close the browser when the import is running on epolicy Orchestrator. Doing so interrupts the import thread and stops the import process. When the import is running, you can see the message "Please wait, assigning users to systems" in the top left of the McAfee epo page. After you import the users from 5.x.x database into the McAfee epo server, check that the users, password token, SSO, Self recovery, and the audit details are imported as you expected. Conduct a policy review after the import process. If you need your 5.x.x policy settings for 7.0, you must set them before upgrading the client. Make sure that you enable the Encrypt product setting policy under Endpoint Encryption 7.0 Product Settings Encrypt. If this is not set, encrypted client system starts decrypting by default. To initiate the encryption on the client, you must select any one of the options other than None. The default option None does not initiate the encryption. Upgrading to EEPC 7.0 Make sure that the system to be migrated is managed by the McAfee epo server. Migration of users directly from 5.x.x client to the new 7.0 client is not supported. Any migration of user assignments must be done on McAfee epo before deploying EEPC 7.0 to the client system. To upgrade the client, first install the EE Agent, then the EEPC software packages. If the user is not initialized, initialize the user account and enroll for self recovery after upgrading the 5.x.x client. General recommendations Retain the 5.x.x database for some time, so that you can access it in case of loss or theft of a device after the migration. Migrate only a small number of systems, for example 100 systems, as an initial test before doing a large scale migration. If you are using the $autoboot$ user id in 5.x.x to boot your systems without actually having to authenticate through Pre Boot Authentication, please be advised that the same option is now a feature in 7.0. So, make sure that you enable this policy feature (Menu Policy Policy Catalog Endpoint Encryption 7.0 Product Settings Logon Enable Automatic Booting) to activate Autoboot while migrating the users and systems from 5.x.x to 7.0. For detailed procedures, see McAfee Endpoint Encryption for PC 7.0 Best Practices Guide. The Enable Automatic Booting option in the Product Setting Policy allows access to the EEPC installed systems without actually having to authenticate to PBA. However, it is the administrators responsibility to ensure that system security is not compromised, if this option is selected. If you enable this option, be aware that the McAfee Endpoint Encryption for PC software doesn't protect the data on the drive when it is not in use. The Enable Automatic Booting feature in EEPC 7 doesn't require the $autoboot$ user id to be created in the Active Directory. McAfee Endpoint Encryption for PC 7.0 Migration Guide 9
10 1 Introduction Requirements Requirements The following tables explain in detail about software and operating system requirements. Software requirements Software McAfee management software McAfee Endpoint Encryption for PC Export/Migration tool with SbAdmDll.dll file Requirements See the Release Notes for McAfee Endpoint Encryption for PC or later (5.x.x) and 6.1 Patch 2 or later (6.x.x) 7.0 Operating system requirements Systems McAfee epo server systems Client systems for EEPC 7.0 Software See the product documentation for your version of McAfee epo. Windows Server 2008 (32 and 64 bit) Windows XP Professional SP3 (32 bit only) Windows Vista SP1 or later (32 and 64 bit) Windows 7 and SP1 (32 and 64 bit), (Not XP Mode) 10 McAfee Endpoint Encryption for PC 7.0 Migration Guide
11 2 Migrating 2 to EEPC 7.0 without the migration tool This section describes how to migrate from EEPC 5.x.x to EEPC 7.0 by directly assigning users to the client system or by using the product setting policy option Add Local domain users. You can directly assign users to the client system using: Menu Data Protection Encryption Users Add local domain users (add all previous and current local domain users of the system) under Endpoint Encryption 7.0 Product Setting Policy Log on (Endpoint Encryption) Add local domain user is supported with Active Directory only. On selecting the Add local domain users option, any domain users who have previously and are currently logged on to the client system, are able to authenticate through Pre Boot, even if the administrator has not explicitly assigned the user to the client system. The Add local domain users option adds the previously and currently logged on domain users to the client system. If this is enabled, the EEAgent queries the system for the domain users that have logged on to the client. The EEAgent sends the collected data to the McAfee epo server. The collected data is a list of user names and the domain names. See the product documentation for epolicy Orchestrator 4.6 for steps to directly assign users to system using Menu Data Protection Encryption Users. Migrate to EEPC 7.0 without the migration tool Use epolicy Orchestrator to migrate from EEPC 5.x.x to EEPC 7.0. Before you begin Make sure that the client system's domain is a registered server on the McAfee epo server. Make sure that the McAfee Agent for Windows 4.6 or later is deployed to all the EEPC 5.x.x clients that need to migrate to 7.0. Additionally, the client system needs to be in successful communication with and managed by the McAfee epo server. The Password token is not migrated as part of this migration process. Task 1 Install the necessary EEPC 7.0 extensions into the McAfee epo server. 2 Check in the EEPC 7.0 software packages to the McAfee epo server. McAfee Endpoint Encryption for PC 7.0 Migration Guide 11
12 2 Migrating to EEPC 7.0 without the migration tool Migrate to EEPC 7.0 without the migration tool 3 Schedule and run the server task EE LDAP Server User/Group Synchronization for the registered LDAP server. 4 Define and assign the appropriate product and user based policies to system and users. Make sure that you enable the option Add local domain users under Endpoint Encryption 7.0 Product Setting Policy Log On (Endpoint Encryption). 5 Deploy EEAgent 7.0 and EEPC 7.0 to the client system where 5.x.x is currently installed. 6 Restart the client system when prompted. The EEPC 7.0 encryption status dialog box shows the status as 'Upgradable'. The user will still see the 5.x.x PBA. 7 Force a policy enforcement (during ASCI) from the McAfee Agent. The EEAgent now queries the system for the domain users that are logged on to the client. The EEAgent then sends the collected data to the McAfee epo server. On successful policy enforcement, the EEPC 7.0 encryption status dialog box shows the status as Active. 8 Restart the client system and initialize the user in the 7.0 PBA screen. 12 McAfee Endpoint Encryption for PC 7.0 Migration Guide
13 3 Migrating 3 from EEPC 5.x.x This section describes how to export the user data and configuration from the EEPC 5.x.x database using the migration tool and import them to the McAfee epo server, then upgrade the EEPC clients to EEPC 7.0. The encrypted disks on the client systems remain encrypted during the migration process. On migrating from EEPC 5.x.x to EEPC 7.0, the available user password token, SSO, and Self Recovery details are transferred to EEPC 7.0. To use 5.x.x SSO and Self recovery data in 7.0, you need to enable Self recovery and SSO in the 7.0 policies after importing the users. Contents Overview of the migration process Components that are exported Components and settings that must be reconfigured Overview of the migration process Use this high level process to migrate from EEPC 5.x.x. 1 Obtain the EEMigration tool from the EEPC 7 product package and install it on the 5.x.x database server. 2 Select the information to extract from the 5.x.x database. The export tool extracts the necessary data. 3 Make sure that the McAfee Agent for Windows 4.6 or later is deployed to all the systems that need to migrate to 7.0. Additionally, the client system needs to be in successful communication with and managed by the McAfee epo server. 4 Make sure that the Active Directory Server used to populate the EEPC 7.0 users contains the same user information that you want to import from 5.x.x. 5 Install the EEPC extensions and check in the software packages to McAfee epo. 6 Schedule and run the server task EE LDAP Server User/Group Synchronization. 7 Define the required policy settings in Import the users exported from 5.x.x database into the McAfee epo server. 9 In the import data, review the users and user groups that are not automatically matched with an LDAP user or group and manually match them to LDAP users and groups. 10 In the imported user to system assignments, review the systems that cannot be automatically identified in epolicy Orchestrator and manually match them to systems in McAfee epo. McAfee Endpoint Encryption for PC 7.0 Migration Guide 13
14 3 Migrating from EEPC 5.x.x Components that are exported 11 Deploy the EEPC software packages to the selected systems. 12 Send an agent wake up call from the McAfee epo server to the client system that needs to be upgraded. Components that are exported This information lists the components and settings that are automatically exported as part of the migration process. User to user group assignments from the EEPC 5.x.x database. User and user group assignment to machines and machine groups from the EEPC 5.x.x database. User binding information, if it is available. This is used to locate the user on the Active Directory server. User password token, SSO, and Self recovery details, if they are available. To use 5.x.x SSO and Self recovery data in 7.0, you need to enable them in the 7.0 policies after importing the users. Audit information such as user audit and system audit. Components and settings that must be reconfigured This information lists the components and settings that are not exported and imported as part of the migration process, and must be reconfigured in McAfee epo and the client system. Systems are not exported from the 5.x.x database, however, the user to machine assignments are exported. User tokens other than the password cannot be exported from the 5.x.x database. If you need any other token, assign it to the user manually. AD/LDAP/NT connectors credential information are not exported. It is the administrator's responsibility to register the McAfee epo Registered LDAP server. EEPC 5.x.x policies are not exported. If you need your 5.x.x policy settings for 7.0, you must configure them before upgrading the client. 14 McAfee Endpoint Encryption for PC 7.0 Migration Guide
15 4 Exporting 4 user assignments from the EEPC 5.x.x database The command line and GUI applications allow the administrator to export the users or the users assigned to 5.x.x systems from the 5.x.x database. The purpose of exporting the users that are assigned to systems is to reduce the amount of configuration required in epolicy Orchestrator when upgrading to 7.0. Due to the complexity of exporting the user data from the EEPC 5.x.x database, the export can be a relatively slow operation this is particularly true when exporting users with password tokens. On a typical server, it is common for the EEMigration tool to export password token users at a rate of 3,000 users per hour. This rate should be used to calculate the likely duration of the export and guide your decision to export users in small batches. Contents Overview of the export process Run the export from the command prompt Run the export wizard Overview of the export process With the migration tool you can export the user assignments based on the scenario that best suits your configuration. You can export the information based on: Individual machine Group of machines Individual user Group of users Use the following high level process to export the data from the 5.x.x database. 1 Run the migration tool EEMigration.exe on the 5.x.x database server. 2 Specify the user assignments based on: Machines/machine groups Users/user groups 3 Provide the location of the CMSettings.xml to reduce the amount of work required in epolicy Orchestrator during the import. McAfee Endpoint Encryption for PC 7.0 Migration Guide 15
16 4 Exporting user assignments from the EEPC 5.x.x database Run the export from the command prompt 4 Select the system or users and audit events to be included in the export. 5 Specify the additional details such as file name and location for the migration data file. The export output is a.zip file, which can be imported into the McAfee epo server. It contains these components and settings: User to user group assignments from the EEPC 5.x.x database. User and user group assignment to machines and machine groups from the EEPC 5.x.x database. User binding information, if it is available. This is used to locate the user on the Active Directory server. User password token, SSO, and Self recovery details, if they are available. To use 5.x.x SSO and Self recovery data in 7.0, you need to enable them in the 7.0 policies after importing the users. Audit information such as user audit and system audit. Run the export from the command prompt The export process can also be performed using the command line interface, which can be used to support third party tools. Before you begin Make sure that you have appropriate permission to perform this task. Run the export commands to retrieve the export file, which is a.zip file. After a successful export, this output file has the users or the users assigned to 5.x.x systems in the 5.x.x database. This file needs to be imported into the McAfee epo server. Task 1 Copy and extract the EEMigration.ZIP file to the folder where Endpoint Encryption Manager is installed. 2 From the command prompt, change directory to where Endpoint Encryption Manager is installed. 16 McAfee Endpoint Encryption for PC 7.0 Migration Guide
17 Exporting user assignments from the EEPC 5.x.x database Run the export from the command prompt 4 3 Run the export command SBADMCL and include export parameters as needed. Table 4-1 Parameters to export users and user assignments by selecting machine groups and machines Parameters AdminUser:<username> AdminPwd:<password> [ Database:<database connection>] Command:MigrationExport MachineGroup:<machine group name> This can be repeated as many times as required. Machine:<machine name> This can be repeated as many times as required. File:<exportoutput.zip> [ Cm:<"CMSettings.xml fully qualified file name">] [ Audit:<All numberofdays>] Details Input the administrator user name of the 5.x.x database. Input the administrator password of the 5.x.x database. Select the Database Connection name that is used to define parameters for the MigrationExport command. If you do not select the database connect name, then it exports the details from the default database. This is the command to export the selected data. Input the required machine group name of the 5.x.x database. Input the required machine name of the 5.x.x database. Specify the output file name with the file format (.ZIP). Specify the path to the CMSettings.xml file. (Optional) Specify the number of days to limit the audit events export. (Optional) Importing the audit logs increases the size of the McAfee epo database. We recommend that you keep the number of days as small as possible. Table 4-2 Parameters to export users and user assignments by selecting users groups and users AdminUser:<username> AdminPwd:<password> [ Database:<database connection>] Command:MigrationExport UserGroup:<user group name> This can be repeated as many times as required. Input the administrator user name of the 5.x.x database. Input the administrator password of the 5.x.x database. Select the Database Connection name that is used to define parameters for the MigrationExport command. If you do not select the database connect name, then it exports the details from the default database. This is the command to export the selected data. Input the required user group name of the 5.x.x database. McAfee Endpoint Encryption for PC 7.0 Migration Guide 17
18 4 Exporting user assignments from the EEPC 5.x.x database Run the export wizard Table 4-2 Parameters to export users and user assignments by selecting users groups and users (continued) User:<user name> Input the required user name of the 5.x.x database. This can be repeated as many times as required. File:<exportoutput.zip> [ Cm:<"CMSettings.xml fully qualified file name">] [ Audit:<All numberofdays>] Specify the output file name with the file format (.ZIP). Specify the path to the CMSettings.xml file. (Optional) Specify the number of days to limit the audit events export. (Optional) Importing the audit logs increases the size of the McAfee epo database. We recommend that you keep the number of days as small as possible. The machine or machine groups and user or user groups parameters cannot be specified at the same time. 4 Browse to the specified output location and retrieve the export file. The export file is a.zip file containing XML files. Run the export wizard Run the export wizard (EEMigration.exe), which guides you through specifying the parameters of the export. This is another method to retrieve the export output file, which is a.zip file. Before you begin Make sure that you have the latest EEMigration.ZIP file to implement and perform the export. Make sure that you have access rights to view system and user properties. After a successful export, this output file has the users or the users assigned to 5.x.x systems in the 5.x.x database. This file needs to be imported into the McAfee epo server. Task 1 Copy and extract the EEMigration.ZIP file to the folder where Endpoint Encryption Manager is installed. A confirmation message to replace the SbAdmDll.dll file appears. 2 Click Yes to replace the SbAdmDll.dll file. 3 Run the EEMigration.exe tool to initiate the McAfee Endpoint Encryption Migration wizard. This checks if there is an SbAdmDll.dll file present at the same path that supports the MigrationExport command. If it is present, the application automatically uses the file and the wizard starts with the Endpoint Encryption Administrator Credentials page. a In the Locate SbAdmDll page, type the path to the SbAdmDll.dll file, or click Browse and select the SbAdmDll.dll file when the suitable SbAdmDll.dll file is not found. b Click Next. The Endpoint Encryption Administrator Credentials page appears. 18 McAfee Endpoint Encryption for PC 7.0 Migration Guide
19 Exporting user assignments from the EEPC 5.x.x database Run the export wizard 4 4 Type the administrator Username, Password, and select the Database Connection name, then click Next. The Export Machines or Users page appears. The password is disabled message appears without a timeout while exceeding three wrong password attempts. However, when you log on to the EEM console, all cumulated timeouts that occurred on the EEMigration console are considered as timeouts on the EEM console. 5 Select Machines or Users to export the Machine Groups and Machines or User Groups and Users, then click Next. The Select Items page appears. Selecting machine Exports all the users assigned to the selected machine. You can also select specific machine to be exported. Selecting users Exports all the user assignments pertaining to the selected users. 6 Select the groups and group members to export. From here, you can: Select All groups Deselect All groups Select members; systems or users (dependent on selection on previous screen) 7 Click Next. The Optional Settings page appears. 8 Type the path or click Browse and select the CmSettings.xml file. If the CmSettings.xml file is not present, then you need to provide the binding details in epolicy Orchestrator during the import process. 9 Select Export Machine and User audit events to export all audit events. By default no system or user audit event data is exported. 10 Select Only export audit events created within the last days to limit the audit events export to the specified days, then click Next. The Locate Output page appears. Importing the audit logs increases the size of the McAfee epo database. We recommend that you keep the number of days as low as possible. 11 Specify the full path or click Browse to select the location for the output file, then click Next. This creates all the individual export files as one output.zip file. If you do not specify any file extension for the output file, the application appends the.zip extension to the file name. McAfee Endpoint Encryption for PC 7.0 Migration Guide 19
20 4 Exporting user assignments from the EEPC 5.x.x database Run the export wizard 12 Click Finish to run the export. The Export Status page appears. The application starts exporting each object and displays the message "Migration export completed successfully after completing the export", on the Export Status page. 13 Click Close to complete the export. You should now be able to get the export file from the specified location. The export file is a.zip file containing XML files. Use this table to determine which user assignments are exported when you run the EEPC migration tool. Export Type Items selected for export Exported systems Exported users Notes Machine Selected Machine Groups All systems in the selected Machine Group. Every User Group (and individuals in those groups) assigned to the systems exported. Every User explicitly assigned to the exported systems. Selected Machines All specified systems. Every User Group (and all individual group members) assigned to the specified systems. Every user explicitly assigned to the specified systems. Users Selected User Groups Selected Users Every system that a specified User Group (or individual user from a specified User Group) is assigned to. Every system that the specified user is assigned to and any system that has a User Group that includes the specified user. All specified User Groups and the individual users in those groups. All specified users. All User Groups where the specified users are members (populated only with the specified users). You can use the Users export type to export users and User Groups that are not assigned to any systems. Non password token data is not exported but the user is exported. If you attempt to import an already imported user, then the user will not be imported. After you migrate a password token user to EEPC 7, there is no synchronization of password or other user information between the EEPC 5 and the EEPC 7 user. 20 McAfee Endpoint Encryption for PC 7.0 Migration Guide
21 5 5 Importing users or user assignments into EEPC 7.0 The EE Admin extension for EEPC 7.0 provides a user interface on the McAfee epo console to import the export output file, obtained using the export process. This import wizard is available on the McAfee epo server only after installing the EE Admin extension. Contents Overview of the import process Import user assignments using McAfee epo Import scenarios Overview of the import process Use this high level process to import the user and system information, available within the export output file, into the McAfee epo server. 1 Make sure that the Active Directory server used to add the EEPC 7.0 users contains the same user information that you want to import from 5.x.x. 2 Install the EEPC 7.0 extensions into McAfee epo. 3 Schedule and run the server task EE LDAP Server User/Group Synchronization. 4 Make sure that you have added the required client systems to epolicy Orchestrator to which you want to match and assign the users. 5 Select the export file to import into the McAfee epo server. 6 Specify the bindings details and rules associated with the import process. 7 Match the user groups to AD/LDAP Organizational Unit or Groups. 8 Review any missing matches and select how to proceed with them. 9 Apply the changes to the McAfee epo database. McAfee Endpoint Encryption for PC 7.0 Migration Guide 21
22 5 Importing users or user assignments into EEPC 7.0 Import user assignments using McAfee epo Import user assignments using McAfee epo To import the users and systems information from the 5.x.x database to the McAfee epo server, you need to import the export output file to the McAfee epo server. The export file (.ZIP) is the output file that you created during the export from 5.x.x database. Before you begin Make sure that you have appropriate permission to perform the Allow Import of v5 users task in McAfee epo. You can enable this permission by navigating through Menu Users Permission sets Endpoint Encryption Allow Import of v5 users. Make sure that you have copied the export file (.ZIP) to a location where you can access it from the McAfee epo server. Make sure that the systems to be matched are managed by McAfee epo. Make sure to register the LDAP server on the McAfee epo server and make sure it is the same server registered on the 5.x.x database. Make sure to schedule and run the server task EE LDAP Server User/Group Synchronization. Task 1 Make sure the McAfee Agent has been deployed to all target systems, and ensure all target systems are displayed in the System Tree. For more details on how to deploy the McAfee Agent to the client systems, refer to the McAfee Agent documentation. 2 On the McAfee epo console, click Menu Data Protection Encryption Users. The My Organization page appears. 3 Click Tasks Import v5 users to display the Upload page. 4 Click Browse and select the export (.zip) file that you created during the export process, then click Next. This uploads and validates the export file. On successful validation, the XML files are extracted to a temporary folder on epolicy Orchestrator and the Bindings page opens. The validation checks for the existence of the bindings.xml file. If the file is not valid, then the McAfee epo server displays a confirmation message No bindings available, rules will be used for matching users. 5 Complete the binding mapping by selecting the LDAP Attribute and the corresponding LDAP Server. The binding names are automatically filled in if the binding attributes are available, otherwise, you must input them manually. For each binding attribute, you can select a corresponding LDAP server to use for locating the user. The LDAP server is also automatically selected based upon the information available with the CmSettings.xml file. 6 After selecting the binding information, click Verify Next to open the Rules page. This page allows you to define rules to locate the users when the binding match fails. These rules can also be used to match manually added 5.x.x users, that are not imported from the LDAP. 7 From the Available Properties list, define the rules by selecting the available user property. The user is not permitted to use the and option in the criteria builder. 22 McAfee Endpoint Encryption for PC 7.0 Migration Guide
23 Importing users or user assignments into EEPC 7.0 Import user assignments using McAfee epo 5 8 Under Comparison, select the comparison criteria from the list. 9 Under Value, select the required user attribute name for the corresponding LDAP server. For example, use CN attribute while defining a rule, so that a user name in 5.x.x database is compared to the user names available in the LDAP server, and the best match is found. 10 Click + or to add or remove rules with different user attributes and comparison criteria. Click Next. The Assignments page appears with User Groups. By default, the machine group users are assigned to the individual system. 11 Under User Groups, select the V5 User Group Name and click Actions Assign LDAP Group or De assign LDAP Group. On selecting Assign LDAP Group, the Assign LDAP Group to V5 User Group page appears with V5 User Group name and LDAP OU or LDAP Group list. Select a LDAP OU or LDAP Group from LDAP Group list, then browse the epo LDAP browser and select the LDAP OU or LDAP Group. Click OK. This assigns the 5.x.x user groups to system in the McAfee epo server. On selecting De assign LDAP Group, the group membership will not be used for user assignment. This will result in individual user assignments being used for matching. If there are no user assignments to individual machines then no users will be imported. 12 Click Next. The Preview page appears with the assigned users under Users tabs. The application performs the system matching using the 5.x.x machine name and the McAfee epo system name. The results are color coordinated, so that it is easy for the administrator to analyze the results. Green indicates a successful matching Red indicates an unsuccessful matching The application performs the user matching using the binding attributes if they are present. If no match is found, the rules are used to search every Active Directory server that has been set up with EE LDAP Synch attributes. We recommend that you initiate the user matching using the binding attributes, if not the import process will be slow. If there are multiple Active Directory servers, then the speed of the overall import process will be impacted. The import results are color coordinated, so that it is easy for the administrator to analyze the results. Green indicates a single match Orange indicates more than one match Red indicates no match 13 Click Next. The Results page appears with the results of the import. The overall import result is also color coordinated, so that it is easy for the administrator to analyze the failure and success. Navigating away or shutting the browser while the import is running stops the import thread and stops the import. While the import is running, the administrator can see the message "Please wait, assigning users to systems" in the top left of the page. McAfee Endpoint Encryption for PC 7.0 Migration Guide 23
24 5 Importing users or user assignments into EEPC 7.0 Import scenarios Import scenarios The following import scenarios demonstrate some of the possible scenarios that can be encountered when users import the systems and users from version 5.x.x database into the McAfee epo server. Table 5-1 User groups Possible scenarios Scenario Description Pre conditions Flow Post conditions Results Description Not mapping user groups to LDAP organizational units or LDAP user groups. This scenario deals with importing a 5.x.x export file into the McAfee epo server. All users groups within version 5.x.x database were obtained from an LDAP server. Machine exists in version 5.x.x administrator system, with one or more user groups assigned. Machine has been added to McAfee epo and has McAfee Agent installed. Administrator imports the 5.x.x export file into epolicy Orchestrator using the Endpoint Encryption extension wizard. This should use the default binding attributes. Administrator elects not to assign user groups to an LDAP organizational unit or LDAP user groups. List of machine assignments appear for administrator to confirm. List of user assignments appear for administrator to confirm. 5.x.x users assigned to 5.x.x machines, are added to the individual machine(s) in McAfee epo. 5.x.x users within the 5.x.x user groups, are added to the individual machine(s) in McAfee epo. Table 5-2 Alternative 1 Possible scenarios Scenario Description Pre conditions Flow Description Mapping user groups to LDAP organizational units or LDAP user groups. This scenario deals with importing a 5.x.x export file into the McAfee epo server. All user within 5.x.x database should have been obtained from an LDAP server. Machine should exist in 5.x.x administrator system, with one or more users assigned. Machine should have been added to epolicy Orchestrator by installing McAfee Agent. Administrator imports the 5.x.x export file into McAfee epo using the Endpoint Encryption extension wizard. This should use the default binding attributes. Administrator selects to assign user groups to LDAP organizational unit or LDAP user groups. 24 McAfee Endpoint Encryption for PC 7.0 Migration Guide
25 Importing users or user assignments into EEPC 7.0 Import scenarios 5 Table 5-2 Alternative 1 (continued) Possible scenarios Post conditions Results Description List of machine assignments appear for administrator to confirm. List of user assignments appear for administrator to confirm. 5.x.x users assigned to 5.x.x machines, are added to the individual machine(s) in McAfee epo. LDAP organizational unit or LDAP group assigned to 5.x.x user groups that were assigned to machines, are added to the individual machine(s) in McAfee epo. If 5.x.x users are found in the assigned LDAP OU/Group, then the 5.x.x password token, SSO and Self Recovery data will be transferred to 7.0. If new users are present in the assigned LDAP OU/Group, then they are added to 7.0 as non initialized users. If 5.x.x users are found in the assigned LDAP OU/Group, then the 5.x.x password token, SSO and Self Recovery data will be transferred to 7.0. If new users are present in the assigned LDAP OU/Group, then they are added to 7.0 as non initialized users. 5.x.x users within the 5.x.x user groups not assigned to a LDAP organization unit or LDAP group, are added to the individual machine(s) in McAfee epo. McAfee Endpoint Encryption for PC 7.0 Migration Guide 25
26 5 Importing users or user assignments into EEPC 7.0 Import scenarios 26 McAfee Endpoint Encryption for PC 7.0 Migration Guide
27 6 Upgrading 6 from EEPC 5.x.x This section describes what happens during the upgrade of the McAfee Endpoint Encryption for PC 5.x.x. The primary goal of upgrading the EEPC 5.x.x series is to retain the disk encryption, to make sure that a decryption and a re encryption of the disk is not required during the upgrade. Only one encryption algorithm can be active for all disks, so irrespective of the settings in 7.0, if the original 5.x.x specifies a different algorithm, that algorithm will be used for all disks, even after migration. The only way to change the client algorithm is to allow the client to completely deactivate and decrypt all disks, then reactivate it. The RC5 algorithms have keys that are four times as large as the keys of AES algorithm. Hence all the recovery settings have four times as many lines as the AES algorithm. So, setting recovery key size as Low gives four lines of response code with RC5 algorithm. On migrating from EEPC 5.x.x to EEPC 7.0, the available user password token, SSO, and Self recovery details are transferred to EEPC 7.0. To use 5.x.x SSO and Self recovery data in 7.0, you need to enable Self recovery and SSO in the 7.0 policies after importing the users. Contents Supported versions Upgrade from EEPC 5.x.x to EEPC 7.0 User experience summary Supported versions EEPC Migration tool supports the client upgrade from EEPC 5.x.x to EEPC 7.0. Any user willing to upgrade the client system from a lower version needs to first upgrade it to EEPC 5.x.x, then to EEPC 7.0. If EEPC 5.x.x is in FIPS mode, then you should upgrade to EEPC 7.0 in FIPS mode only. For more details on how to deploy and upgrade the EEPC client packages in FIPS mode, refer to EE 7.0 Product Guide. Upgrade from EEPC 5.x.x to EEPC 7.0 You need to upgrade the client systems from EEPC 5.x.x to EEPC 7.0 only after importing the users and systems from the 5.x.x database to the McAfee epo server. Use the McAfee epo server to upgrade from EEPC 5.x.x to EEPC 7.0. Before you begin Make sure that the McAfee Agent for Windows 4.6 or later is deployed to all the EEPC 5.x.x clients that need to migrate to 7.0. Additionally, the client system needs to be in successful communication with and managed by the McAfee epo server. Make sure that you have already imported the 5.x.x users to the McAfee epo server. McAfee Endpoint Encryption for PC 7.0 Migration Guide 27
28 6 Upgrading from EEPC 5.x.x User experience summary Task 1 Register the LDAP server on the McAfee epo server and make sure it is the same server registered on the 5.x.x database. 2 Install the EEPC extensions into McAfee epo. 3 Schedule and run the server task EE LDAP Server User/Group Synchronization. 4 Check in the EEPC 7.0 software packages to McAfee epo. 5 Define the appropriate policy settings for Deploy the EEAgent 7.0 software package to the client system where 5.x.x is currently installed. 7 Deploy the EEPC 7.0 software package to the client system where 5.x.x is currently installed. 8 Restart the client system when prompted. The EEPC 7.0 encryption status dialog box shows the status as Upgradable. 9 Configure and assign the product and user based policies to system and users. Make sure to enable UBP enforcement setting for the users not using the default UBP. 10 Force a policy enforcement from the McAfee Agent. On successful policy enforcement, the EEPC 7.0 encryption status dialog shows the status as Active. 11 Restart the client system and initialize the user at the EEPC 7.0 PBA screen. User experience summary This table highlights the summary of different phases and status before, during, and after the client upgrade from EEPC 5.x.x to EEPC 7.0. State Pre Boot Windows EE Logon Before deploying EEPC 7.0 packages When deploying EEPC 7.0 to the client After restarting the system due to the EEPC 7.0 deployment EEPC 5.x.x EEPC 5.x.x EEPC 5.x.x EEPC 5.x.x EEPC 5.x.x EEPC 5.x.x Comments The client system has EEPC 5.x.x installed. The EEPC 7.0 deployment prompts for a restart of the client system. The EEPC 7.0 status appears as Upgradable. Single Sign On to Windows works with EEPC 5.x.x credentials. After policy enforcement (during ASCI) and user assignment EEPC 7.0 Windows EE Logon screen will not appear for EEPC 7.0 The 5.x.x EE System Tray disappears. The EEPC 7.0 status changes to Active. Restart the client system and authenticate using the EEPC 7.0 user name and the imported password. This is similar to a first time activation of EEPC McAfee Endpoint Encryption for PC 7.0 Migration Guide
29 7 Upgrading 7 from EEPC 6.x.x This section describes what happens during the upgrade of EEPC 6.x.x. The primary goal of upgrading EEPC 6x.x is to update the components and to provide additional token support. All of the existing encryption, policies, users, authentication details, SSO details, audit, and tokens are retained. Contents Supported versions Overview of the upgrade process User experience summary Supported versions EEPC 7.0 supports upgrade from EEPC 6.x.x. If EEPC 6.x.x is in FIPS mode, then you should upgrade to EEPC 7.0 in FIPS mode only. For more details on how to deploy and upgrade the EEPC client packages in FIPS mode, refer to EE 7.0 Product Guide. Overview of the upgrade process Use the following high level process to upgrade EEPC 6.x.x. 1 Install the necessary EEPC 7.0 extensions on the McAfee epo server. This automatically upgrades any previous version of extensions installed. 2 Check in the EEPC and EEAgent packages to McAfee epo. 3 Define the appropriate policy settings for 7.0, as needed. The existing policies are maintained during the upgrade. Make sure that you have enforced the required user based policy to the user assigned to the client system. A requirement of EEPC 7.0 is that you need to specify which groups of users are allowed or not to use the Policy Assignment Rules. The allowed users get their required User Based Policies. Users that are not allowed to use the Policy Assignment Rules inherit the default User Based Policies assigned to the system. For procedures and details on how to configure UBP enforcement, see the product documentation for McAfee Endpoint Encryption for PC 7.0. McAfee Endpoint Encryption for PC 7.0 Migration Guide 29
30 7 Upgrading from EEPC 6.x.x User experience summary 4 Deploy EEAgent 7.0 and restart the client system when prompted. 5 Deploy EEPC 7.0 and restart the client system when prompted. This upgrades the EEPC 6.x.x client files into the EEPC 7.0 client files. The new files and drivers are in place, and the EEPC 7.0 encryption status dialog box shows the status as Active throughout the upgrade process. After the upgrade, the only visible change is the changed version numbers of the modules lists. User experience summary The below table highlights the summary of different phases and status before, during, and after the client upgrade from EEPC 6.x.x to EEPC 7.0. Table 7-1 User experience summary State Pre Boot Windows EE Logon Before deploying the EEPC 7.0 packages When deploying EEAgent 7.0 and EEPC 7.0 to the client EEPC 6.x.x EEPC 6.x.x EEPC 6.x.x EEPC 6.x.x Comments The client system has EEPC 6.x.x installed. Deploy EEAgent 7.0 and restart the client system when prompted. Deploy EEPC 7.0 and restart the client system when prompted. After restarting the system due to the EEPC 7.0 deployment EEPC 7.0 Windows EE Logon screen will not appear for EEPC 7.0 The 6.x.x status remains as Active throughout the upgrade process. The user credentials for both Windows and Pre Boot logons are the same as 6.x.x for 7.0. SSO to Windows continues to function as it did before the upgrade. Modules are updated after the upgrade. 30 McAfee Endpoint Encryption for PC 7.0 Migration Guide
31 8 Migrating 8 from HPPT to EEPC 7.0 This section describes how to migrate the HP client systems, that have been encrypted using the HP ProtectTools (HPPT) software to EEPC 7.0, which is the drive encryption software managed by McAfee epo. Contents Supported versions Overview of the migration process Migrate HPPT to EEPC 7.0 Supported versions EEPC 7.0 supports upgrade from these versions of HPPT for both software and hardware (OPAL). HPPT 2011 (v6) HPPT 2012 (v7) Overview of the migration process Use this high level process to migrate from HPPT to EEPC Register your LDAP server on the McAfee epo server. 2 Install the EEPC 7.0 extensions into McAfee epo. 3 Check in the EEPC 7.0 software packages (EEAgent and EEPC) to McAfee epo. 4 Schedule and run the server task EE LDAP Server User/Group Synchronization. 5 Make sure that the McAfee Agent for Windows 4.6 or later is deployed to all the systems that need to migrate to EEPC Configure the required Product Settings Policies and User Based Policies in McAfee epo and assign them to the target systems. 7 Set the required encryption provider in the Product Settings policy depending upon the upgrade performed. To upgrade the HPPT Software encrypted client system, select the PC Software encryption provider. To upgrade the HPPT Hardware (OPAL) encrypted client system, select the PC OPAL encryption provider. McAfee Endpoint Encryption for PC 7.0 Migration Guide 31
32 8 Migrating from HPPT to EEPC 7.0 Migrate HPPT to EEPC Deploy the EEAgent 7.0 and EEPC 7.0 packages to the target systems using a single Product Deployment client task, and restart the client system when prompted. For more information, see the product documentation for EEPC 7.0. The Show Endpoint Encryption Status appears as Upgradable at this stage. 9 If users are already assigned to the client system, just send an agent wake up call. If not, add the EEPC users to the client system and then send an agent wake up call. For more information, see the product documentation for EEPC 7.0. The Show Endpoint Encryption Status changes from Upgradable to Active only after adding the user(s) and enforcing the policies correctly. 10 Verify the Endpoint Encryption System Status by right clicking McAfee Agent System Tray on the client system, then clicking Quick Settings Show Endpoint Encryption Status. The status should show up as Active which marks the completion of the migration process. Migrate HPPT to EEPC 7.0 Use this task to migrate the client systems that have been encrypted using the HP ProtectTools (HPPT) software to EEPC 7.0, which is the drive encryption software managed by McAfee epo. Before you begin You must have appropriate permissions to perform this task. Register your LDAP server on the McAfee epo server. Task 1 Log on to the epolicy Orchestrator server as an administrator. 2 Install the EEPC 7.0 extensions into McAfee epo. 3 Check in the EEPC 7.0 software packages (EEAgent and EEPC) to McAfee epo. 4 Schedule and run the server task EE LDAP Server User/Group Synchronization. 5 Make sure that the McAfee Agent for Windows 4.6 or later is deployed to all the systems that need to migrate to EEPC 7.0. Additionally, make sure the client system can communicate successfully with the McAfee epo server. For more information on how to deploy McAfee Agent to the client system, see the product documentation for epolicy Orchestrator 4.6. Or You need to install the McAfee Agent on the client system using the install.sh file. You can get this file from the McAfee epo server. The client system is automatically added to the System Tree in epolicy Orchestrator on successful installation of the McAfee Agent on the client system. If you select to install the McAfee Agent, make sure that you use the administrator rights on the client system. If the McAfee Agent is installed using the install.sh file, the system will appear under the lost & found folder. Also, the McAfee Agent Monitor will appear in the client system and can be viewed by right clicking McAfee Shield. 6 Configure the required Product Settings Policies and User Based Policies in McAfee epo and assign them to the target systems. 32 McAfee Endpoint Encryption for PC 7.0 Migration Guide
33 Migrating from HPPT to EEPC 7.0 Migrate HPPT to EEPC Set the required encryption provider in the Product Settings policy depending upon the upgrade performed. To upgrade the HPPT Software encrypted client system, select the PC Software encryption provider. To upgrade the HPPT Hardware (OPAL) encrypted client system, select the PC OPAL encryption provider. 8 Deploy the EEAgent 7.0 and EEPC 7.0 packages to the client system where the HPPT software is currently installed using a single Product Deployment client task, and restart the system when prompted. For more information, see the product documentation for EEPC 7.0. Even though the best practice is to deploy EEAgent and EEPC using separate tasks, in this case, we recommend that you deploy them using a single task. The Show Endpoint Encryption Status appears as Upgradable at this stage. 9 If users are already assigned to the client system, just send an agent wake up call. If not, add the EEPC users to the client system and then send an agent wake up call. While sending the agent wake up call, make sure that you select the Force complete policy and task update checkbox corresponding to the required system name. 10 Verify the Endpoint Encryption System Status by right clicking McAfee Agent System Tray on the client system, then clicking Quick Settings Show Endpoint Encryption Status. The status should show up as Active which marks the completion of the migration process. On restarting the client system, the EEPC Pre Boot logon window should be available and you can log on with any of the user accounts that were assigned to the system. McAfee Endpoint Encryption for PC 7.0 Migration Guide 33
34 8 Migrating from HPPT to EEPC 7.0 Migrate HPPT to EEPC McAfee Endpoint Encryption for PC 7.0 Migration Guide
35 9 9 Managing EEPC migration reports McAfee Endpoint Encryption for PC migration queries are configurable objects that retrieve and display data from the database. These queries can be displayed in charts and tables. Any query result can be exported to a variety of formats, any of which can be downloaded or sent as an attachment to an message. Contents Queries as dashboard monitors View the EEPC migration reports Queries as dashboard monitors Most queries can be used as a dashboard monitor (except those using a table to display the initial results). Dashboard monitors are refreshed automatically on a user configured interval (five minutes by default). Exported results McAfee Endpoint Encryption query results can be exported to four different formats. Exported results are historical data and are not refreshed like other monitors when used as dashboard monitors. Like query results and query based monitors displayed in the console, you can drill down into the HTML exports for more detailed information. Reports are available in several formats: CSV Use the data in a spreadsheet application (for example, Microsoft Excel). XML Transform the data for other purposes. HTML View the exported results as a web page. PDF Print the results. McAfee Endpoint Encryption for PC 7.0 Migration Guide 35
36 9 Managing EEPC migration reports View the EEPC migration reports View the EEPC migration reports Use epolicy Orchestrator to run and view the standard EEPC migration report from the Queries page. Task 1 Click Menu Reporting Queries. The Queries page opens. 2 From Shared Groups in Groups pane, select Endpoint Encryption. The migration related queries with the standard EEPC query list appear. Query EE: Migration log Description Displays the log details and the results of the 5.x.x user import. EE: Migration lookup Displays the details about the assignments of the machine group, user group, machines, and users. EE: V5 Audit Displays the imported audit logs from 5.x.x. If only you selected the audit option during the export process, the audit log will be displayed. 3 Select a query from the Queries list. 4 Click Actions Run. The query results appear. Drill down into the report and take actions on items as necessary. Available actions depend on the permissions of the user. The user has an option to edit the query and to view the details of the query. 5 Click Close when finished. 36 McAfee Endpoint Encryption for PC 7.0 Migration Guide
37 Migration checklist Print this page and use it as a checklist to verify that you have completed each important stage of the migration. Migration Checklist 1. The migration is supported only from EEPC 5.x.x (5.2.6 or above) to EEPC 7.0 and it is not supported for versions below Creating the export file 2. Copy and extract the EEMigration.ZIP file to the EEM installed folder. Example: c:\program Files\McAfee \Endpoint Encryption Manager. 3. Create and save the export file (.ZIP). Importing the export file into epo 4. Make sure that the system(s) to be migrated is managed by the McAfee epo server. 5. Install all the extensions and packages of EEPC 7.0 into McAfee epo. 6. Make sure that the permission is set to allow import of 5.x.x users in McAfee epo. 7. Register the same LDAP server used in 5.x.x database, on the McAfee epo server. 8. Schedule the server task EE LDAP Server User/Group Synchronization 9. Place the export file (.ZIP) in a location where the file can be accessed from McAfee epo. 10. Import the export file (.ZIP) into McAfee epo. 11. Assign the 5.x.x user group to an LDAP group if required. 12. Assign any unmatched system(s) to a system(s) in McAfee epo if required. 13. Assign any unmatched user(s) to a user(s) in LDAP if required. 14. Review the import results and it should display as Success in the Results column. Client upgrade from 5.x.x to Change the default policies of 7.0 to match the policies of 5.x.x. 16. Deploy the Endpoint Encryption Agent 7.0 to the selected client. 17. Deploy the EEPC software package to the selected client and restart the client system when prompted. 18. Enforce the policy update. 19. Initialize the user at the Pre Boot Authentication page when restarting the client after upgrading it. Client upgrade from 6.x.x to Change the default policies of 7.0 if required. 21. Deploy the Endpoint Encryption Agent 7.0 to the selected client system and restart it when prompted. 22. Deploy the EEPC software package to the selected client system and restart it when prompted. McAfee Endpoint Encryption for PC 7.0 Migration Guide 37
38 Migration checklist 38 McAfee Endpoint Encryption for PC 7.0 Migration Guide
39 Frequently Asked Questions Q: What version of EEPC v5 is supported for migration? A: EEPC 7.0 migration supports the client upgrade from EEPC 5.x.x (5.2.6 or above) to EEPC 7.0. Any user willing to upgrade from the lower version should first upgrade it to EEPC 5.x.x, then to EEPC 7.0. Q: Do 5.x.x policies get imported to 7.0? A: No, 5.x.x policies are not imported as part of the migration process. You should set the required 5.x.x policies, more importantly the Encrypt policy, in 7.0 before upgrading the client. However, on migrating from EEPC 5.x.x to EEPC 7.0, the available user password token, SSO, and Self Recovery details are transferred to EEPC 7.0. To use 5.x.x SSO and Self Recovery data in 7.0, you need to enable Self Recovery and SSO in the 7.0 policies after importing the users. If you do not change the default Encrypt policy in 7.0 before the upgrade, the client system will start decrypting after the upgrade. Q: What happens if the LDAP server used by 5.x.x is not registered in McAfee epo? A: All imported users of 5.x.x appear as unmatched users in McAfee epo. So, make sure that you register the same LDAP server used by 5.x.x, then run the EE LDAP Server User/Group Synchronization task. Q: What happens if the LDAP server has been registered, but the EE LDAP Server User/Group Synchronization task hasn't been scheduled and run? A: The McAfee epo server displays an error message when the user initiates the import process. Closing the error message guides the user directly to EE LDAP Server User/Group Synchronization task page. Q: What happens if the 5.x.x systems are not managed by McAfee epo? A: All imported systems of 5.x.x will appear as unmatched systems in McAfee epo. So, make sure that the system to be migrated is managed by McAfee epo before initiating the import process. Q: What happens if the 5.x.x user has been disabled in the AD? A: The 5.x.x user disabled in AD will be imported, however the properties of the user will be determined by the Endpoint Encryption server settings policies in McAfee epo. Q: What happens to a partially encrypted 5.x.x system after the migration? A: A partially encrypted 5.x.x system gets fully encrypted/decrypted as per the policies set in 7.0. McAfee Endpoint Encryption for PC 7.0 Migration Guide 39
40 Frequently Asked Questions Q: What happens if the user initiates the upgrade process while the 5.x.x client is in encrypting or decrypting state? A: It completes the encryption or decryption process as per the policies set in 7.0. Q: What happens to a removable media that is encrypted with 5.x.x? A:We recommend that you decrypt your removable media before initiating the upgrade. Be aware that there is no way to decrypt your removable media after the upgrade, other than using the EETech recovery tool. Q: Will the 5.x.x token details be migrated? A: Yes, the 5.x.x token details (Password token, SSO, and Self recovery) are migrated when they are available. Q: Will the self recovery information be migrated? A: On migrating from EEPC 5.x.x to EEPC 7.0, the available Self Recovery details are transferred to EEPC 7.0. To use 5.x.x Self Recovery data in 7.0, you need to enable Self Recovery in the 7.0 policies after importing the users. Q: Will the SSO and Self Recovery details be migrated? A: Yes, the Single Sign On and Self recovery details from the 5.x.x database, are migrated if only the user token is migrated. Q: What happens to a 5.x.x system after migration if it has been encrypted using an algorithm that is different from EEPC 7.0? A: The system remains encrypted after migration as per the policies set in 7.0, and you can apply all the policies of 7.0 to the migrated system. Only one encryption algorithm can be active for all disks, so irrespective of the settings in 7.0, if the original 5.x.x specifies a different algorithm, that algorithm will be used for all disks, even after migration. The only way to change the client algorithm is to allow the client to completely deactivate and decrypt all disks, then reactivate it. The RC5 algorithms have keys that are four times as large as the AES ones. Hence all the recovery settings have four times as many lines as the keys of AES algorithm. So, setting recovery key size as Low gives four lines of response code with RC5 algorithm. Q: What happens to a user account that has been manually added to v5 and not present in the AD? A: All manually added users of 5.x.x appear as unmatched users in McAfee epo. So, ensure to assign these unmatched users to LDAP users. Q: Is McAfee epo updated with the changes made on 5.x.x database after the migration? A: No, any change made on the 5.x.x database after the completion of export will not have an effect upon McAfee epo. Q: What happens if you log on to an upgraded system with a user name that is already initialized in a different 6.x.x system? Should it be initialized again? A: No, any user initialized in a 6.x.x system need not be initialized again on a different system that is upgraded. 40 McAfee Endpoint Encryption for PC 7.0 Migration Guide
41 Frequently Asked Questions Q: Is Windows operating system upgrade supported in the EEPC installed systems? A: No, Windows operating system upgrade in the EEPC installed systems is not supported. We recommend that you completely remove EEPC before doing any operating system upgrade. McAfee Endpoint Encryption for PC 7.0 Migration Guide 41
42 Frequently Asked Questions 42 McAfee Endpoint Encryption for PC 7.0 Migration Guide
43 Index A about this guide 5 Active Directory registering 8, 13, 21, 27, 31, 32 Active Directory group, assigning and de-assigning 22 Active Directory, registering 22 agent wake-up call, sending 13, 31 algorithm, selecting 27 B binding details, specifying 21 C client system managing 27, 29, 31 upgrading command prompt, using 16 components configuring 14 exported 14 conventions and icons used in this guide 5 D disk encryption, retaining 27, 29 documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 E encryption provider, setting 31 Endpoint Encryption for PC, upgrading 27, 29, 31 export command, running 16 export file retrieving 16, 18 selecting 21 export wizard, running 18 exporting audit information 7, 14 client systems 7 encryption keys 14 machine information 15 exporting (continued) systems 16, 18 user assignments 15 user information 15 users 16, 18 extension installing 11, 13, 21, 27, 29, 31, 32 H HP client, migrating 31 I importing audit information 7 machine group 22 output file 21 password and self-recovery 7 password token 8 systems 21 user 21 user assignments 21 user group 22 users 13, 21 L local domain users adding 11 M McAfee ServicePortal, accessing 6 migrating opal systems 32 migration data file 15 exporting systems 7 exporting users 7, 8 migration tool 13 reports 36 running the tool 13 upgrading 27, 29 upgrading systems 8 without the tool 11 McAfee Endpoint Encryption for PC 7.0 Migration Guide 43
44 Index O opal drive encryption provider 31 opal drives, migrating 31 P policies assigning 11 configuring 14 defining 13, 27, 29, 31 enabling 14, 27, 29 reviewing 8 Q queries, Endpoint Encryption for PC creating 35 dashboard monitor 35 dashboard monitors 35 running 35, 36 R recovery key, setting 27, 29 reports, migration 36 requirements, Endpoint Encryption for PC 10 S scenarios importing 24 self-recovery, enabling 13 ServicePortal, finding product documentation 6 software package checking in 11, 27, 29, 31 deploying 13, 27, 29, 31 software packages checking in 32 deploying 32 summary user experience 28, 30 supported versions, HPPT 31 system matching 21 selecting 18 system branch, assigning and de-assigning 22 system status active 28, 30 inactive 28, 30 systems matching 22 T Technical Support, finding product information 6 tokens assigning 14 supported 8 U upgrading client system 7 user password 16, 18 selecting 18 user groups, matching 21 users adding 11, 32 assigning 13, 31 exporting 13 initializing 11 matching 21, 22 selecting 15 W what's in this guide 6 44 McAfee Endpoint Encryption for PC 7.0 Migration Guide
45 00
Data Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
McAfee Endpoint Encryption 7.0
Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee
McAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
McAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
Data Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
McAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
McAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
Setup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
McAfee Client Proxy 1.0.0 Software
Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
McAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Setup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
McAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
Product Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
McAfee Drive Encryption 7.1.0
Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Installation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
McAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3
The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Product Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Setup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
McAfee Endpoint Encryption for PC 6.2
EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
McAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Installation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting
McAfee Endpoint Encryption 7.0 Patch 1 Software
Best Practices Guide McAfee Endpoint Encryption 7.0 Patch 1 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
epolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Drive Encryption 7.1
Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
Best Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Product Guide. McAfee epolicy Orchestrator 5.0.0 Software
Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0
Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
McAfee Endpoint Encryption for PC 7.0
EETech User Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances
Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
McAfee Drive Encryption 7.1.0 Software
Best Practices Guide McAfee Drive Encryption 7.1.0 Software For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Release Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
McAfee VirusScan Enterprise for Storage 1.1.0
Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
Product Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
Product Guide. McAfee epolicy Orchestrator 5.3.0 Software
Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
McAfee Data Loss Prevention 9.3.0
Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
McAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
McAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
Product Guide. McAfee Agent 4.8.0
Product Guide McAfee Agent 4.8.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
McAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
McAfee Policy Auditor 6.2.0 software
McAfee Policy Auditor 6.2.0 software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances
Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Product Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
Installation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
Administration Guide. McAfee SaaS Email Archiving
Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
McAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
McAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Policy Auditor 6.2.0 software Installation Guide
McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Virtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Performance Optimizer 1.0.0 Software
Product Guide Performance Optimizer 1.0.0 Software For use with epolicy Orchestrator 4.6.6-5.1.1 Introduction The Performance Optimizer analyzes the performance of your McAfee epolicy Orchestrator (McAfee
Full Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
McAfee Directory Services Connector extension
Setup Guide Revision B McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 and later COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
Installation Guide. McAfee Vulnerability Manager 7.5
Installation Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
McAfee Enterprise Mobility Management 12.0 Software
Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK
McAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
