Product guide

Table Of Contents
4
Deployment and activation
The purpose of this section is to provide guidance with troubleshooting on why the Windows or Mac
operating system will not start; encrypted systems do not allow access to the operating system until
PBA is completed.
Administrators should be mindful that fixing certain Windows or Mac problems on an encrypted system
may require extra caution in the event that the registry must be edited or a driver should be modified.
Traditional recovery procedures will also change on a system encrypted with Endpoint Encryption 7.0
Patch 1. For example, the entire disk is encrypted which means the file systems and disks are
accessible only when the PreBoot Authentication is complete.
The EETech User Guide provides instructions on how to create a customized preinstallation disk with
the EEPC/EEMac drivers loaded. This disk allows the administrator to access an encrypted hard drive
or Opal drive to update the drivers or the registry. For more information, refer to the EETech User
Guide.
Booting the Endpoint Encryption installed client requires the physical presence of
the client user to supply credentials at the Endpoint Encryption PBA page.
To gain access to an encrypted computer, the user must always enter credentials at the PBA screen. It
is important that this change in client operation be understood and adopted into your operating
procedures. Administrators should be mindful of dispatching drivers/service packs to client systems as
the system will inevitably require reboot after install.
The Enable Automatic Booting option in the Product Settings Policy allows access to the Endpoint Encryption
installed systems without actually having to authenticate through PBA. However, it is the
administrators’ responsibility to ensure that system security is not compromised if this option is
selected, as Autoboot effectively removes system security. Alternatively, you can also use the OS
refresh process to keep the systems secure with minimal user intervention.
Contents
Basic preparations and recommendations
High level process of the installation
Client task to deploy the EEAgent and Endpoint Encryption packages
Add group users
Endpoint Encryption activation sequence
Activate Endpoint Encryption using Add local domain users
Skip Unused Sectors
4
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
33