Product guide
Table Of Contents

Contents
Preface 5
About this guide .................................. 5
Audience .................................. 5
Conventions ................................. 5
Find product documentation ..............................6
1 Introduction 7
Comprehensive McAfee Endpoint Encryption ....................... 7
Purpose of this guide .................................7
Abbreviations .................................8
2 Design overview 9
Support for the self-encrypting (Opal from Trusted Computing Group) drive ...........9
Endpoint Encryption Policies ............................. 10
Configure UBP enforcement .......................... 10
PBA in Endpoint Encryption 7.0 Patch 1 .........................11
How Endpoint Encryption works ............................12
McAfee ePO requirements .............................. 12
Requirements testing for client systems ........................ 13
3 Software configuration and policies 15
Active Directory configuration .............................16
EE LDAP Server User/Group Synchronization .......................17
Recommended Product Settings Policy ......................... 20
Recommended User-Based Policy Settings ........................28
Checklist for using Intel
®
AMT and EEPC .........................30
Phased deployment strategies ............................ 31
4 Deployment and activation 33
Basic preparations and recommendations ........................34
High level process of the installation ..........................36
Client task to deploy the EEAgent and Endpoint Encryption packages .............36
Add group users .................................. 39
Users ................................... 39
Add local domain users ............................ 39
Endpoint Encryption activation sequence ........................ 41
Activate Endpoint Encryption using Add local domain users .................42
Skip Unused Sectors ................................ 43
5 Operations and maintenance 45
How does disabling/deleting a user in Active Directory affect the Endpoint Encryption user .... 45
Manage Machine Keys ................................46
Configure role based access control for managing Endpoint Encryption ............ 48
EEPC 7.0 Patch 1 scalability ............................. 49
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
3