Product guide
1
Introduction
McAfee Endpoint Encryption for PC (EEPC) provides superior encryption across a variety of endpoints
such as desktops and laptops. The EEPC solution uses strong access control with Pre-Boot
Authentication (PBA) and a NIST approved algorithm to encrypt data on endpoints. Encryption and
decryption are completely transparent to the end user and performed without hindering system
performance.
Administrators can easily implement and enforce security policies that control how sensitive data is
encrypted. These policies allow the administrators to monitor real-time events and generate reports to
demonstrate compliance with internal and regulatory requirements.
EEPC has the advantage over other competitive encryption products, because it engages encryption
prior to loading of the Windows operating system, while data is at rest.
Purpose of this guide
This guide suggests best practices for deployment and activation. It also discusses optimization and
maintenance before and after deployment.
When planning a large scale deployment of EEPC 6.2, it is important to understand:
• The features of McAfee
®
ePolicy Orchestrator
®
(McAfee ePO
™
)
• The process of scaling the back end component
• AD/LDAP
• The associated Endpoint Encryption communication
This document encapsulates the professional opinions of Endpoint Encryption certified engineers, and
is not an exact science. You must understand both the product and the environment in which it will be
used, before deciding on an implementation strategy. Calculations and figures in this guide are based
on field evidence and not theoretical system testing; they are our best advice at the time of writing.
Please review the best practices and use the guidelines that best fit your environment.
Abbreviations
The following table lists the abbreviations used in this document.
Table 1-1 Abbreviations
Titles Designations
AD Active Directory
ASCI Agent Server Communication Interval
BIOS Basic Input/Output System
DN Domain Name
1
McAfee Endpoint Encryption for PC 6.2 Software Best Practices Guide
7