Product guide
Manuals
Brands
McAfee Manuals
Other
ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE
51
52
53
54
55
56
57
58
59
60
Table Of Contents
Contents
Preface
About this guide
Audience
Conventions
Find product documentation
1 Introduction
Comprehensive McAfee Endpoint Encryption
Purpose of this guide
Abbreviations
2 Design overview
Support for the self-encrypting (Opal from Trusted Computing Group) drive
Endpoint Encryption Policies
Configure UBP enforcement
PBA in Endpoint Encryption 7.0 Patch 1
How Endpoint Encryption works
McAfee ePO requirements
Requirements testing for client systems
3 Software configuration and policies
Active Directory configuration
EE LDAP Server User/Group Synchronization
Recommended Product Settings Policy
Recommended User-Based Policy Settings
Checklist for using IntelĀ® AMT and EEPC
Phased deployment strategies
4 Deployment and activation
Basic preparations and recommendations
High level process of the installation
Client task to deploy the EEAgent and Endpoint Encryption packages
Add group users
Users
Add local domain users
Endpoint Encryption activation sequence
Activate Endpoint Encryption using Add local domain users
Skip Unused Sectors
5 Operations and maintenance
How does disabling/deleting a user in Active Directory affect the Endpoint Encryption user
Manage Machine Keys
Configure role based access control for managing Endpoint Encryption
EEPC 7.0 Patch 1 scalability
6 Migration and upgrade
Best practices for migration and upgrade
Export user assignments from 5.x.x database
Import user assignments to McAfee ePO
Upgrade to EEPC 7.0 Patch 1
7 Use ePolicy Orchestrator to report client status
Track the progress of the deployment and encryption status
Report encryption status from McAfee ePO
Index
A
B
C
D
E
G
H
I
L
M
O
P
Q
R
S
T
U
7
Use ePolicy Orchestrator to report client status
Report encryption status from McAfee ePO
60
McAfee Endpoint Encryption 7.0 Patch 1 Softw
are
Best Practices Guide
1
...
...
58
59
60
61
62
...
63