Product guide
Contents
Preface 5
About this guide ..................................5
Audience ..................................5
Conventions .................................5
Find product documentation ..............................6
1 Introduction 7
Purpose of this guide .................................7
Abbreviations .................................7
2 Design philosophy 9
Support for the self-encrypting (Opal from Trusted Computing Group) drive ...........9
EEPC Policies ................................... 10
Configure UBP enforcement .......................... 10
PBA in EEPC 6.2 ..................................11
How Endpoint Encryption works ............................11
McAfee ePO requirements ..............................11
3 Software configuration and policies 13
Active Directory configuration .............................14
EE LDAP Server User/Group Synchronization .......................16
Recommended Product Settings Policy .........................18
Recommended User-Based Policy Settings ........................22
Phased deployment strategies ............................ 24
4 Deployment and activation 27
Basic preparations and recommendations ........................28
High level process of the installation ..........................29
Client task to deploy the EEAgent and EEPC packages ...................30
Add group users ..................................31
Users ................................... 31
Add local domain users ............................31
EEPC activation sequence ..............................33
Activate EEPC using Add local domain users .......................34
5 Operations and maintenance 35
How does disabling/deleting a user in Active Directory affect the EEPC user ..........35
Manage Machine Keys ................................36
Configure role based access control for managing EEPC ..................38
EEPC 6.2 scalability .................................39
6 Migration and upgrade 41
Best practices for migration and upgrade ........................41
Export user assignments from 5.x.x database ......................43
Import user assignments to McAfee ePO ........................44
McAfee Endpoint Encryption for PC 6.2 Software Best Practices Guide
3