McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Guía de usuario

Busca en linea o descarga Guía de usuario para Servidores McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE. McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Product guide Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir

Indice de contenidos

Pagina 1 - Software

Best Practices GuideMcAfee Endpoint Encryption 7.0 Patch 1SoftwareFor use with ePolicy Orchestrator 4.6 Software

Pagina 2 - License Agreement

The overall experience and tasks of an administrator and users in installing and using EEPC are exactlythe same regardless of whether the target syste

Pagina 3 - Contents

Task1Click Menu | Reporting | Queries. The Queries page opens.2Select Endpoint Encryption from Shared Groups in Groups pane. The standard EE query lis

Pagina 4 - Index 61

How Endpoint Encryption worksA boot sequence is executed by the BIOS (Windows) or firmware (Mac) leading to the starting of thebootable operating syst

Pagina 5 - About this guide

information about installing or using McAfee ePO, see the ePolicy Orchestrator product documentationfor version 4.6.Supported environments for McAfee

Pagina 6 - Find product documentation

1Install the EEGO extension (EEGO.ZIP) in McAfee ePO. Repeat the same procedures used forinstalling the product extension.2Check in the EEGO software

Pagina 7 - Introduction

3Software configuration and policiesWhen planning for a rollout and deployment of EEPC/EEMac, we recommend that you understand thefollowing important

Pagina 8 - Abbreviations

Active Directory configurationEndpoint Encryption users are not created from the McAfee ePO server. They are assigned to the clientsystems from an Act

Pagina 9

EE LDAP Server User/Group SynchronizationMake sure you use the correct user attribute format in the EE LDAP Server User/GroupSynchronization task. Mat

Pagina 10 - Endpoint Encryption Policies

EE LDAP Server User/Group Synchronization task logThe administrator can also view a log of this particular server task by double clicking the particul

Pagina 11 - Design overview

The McAfee ePO server allows the administrator to filter user accounts that can be imported intoEEPC/EEMac, based on a portion of LDAP. For example, i

Pagina 12 - McAfee ePO requirements

COPYRIGHTCopyright © 2013 McAfee, Inc. Do not copy without permission.TRADEMARK ATTRIBUTIONSMcAfee, the McAfee logo, McAfee Active Protection, McAfee

Pagina 13 - Software requirements

Recommended Product Settings PolicyThe Product Settings Policy controls the behavior of the Endpoint Encryption client. For example, itcontains the op

Pagina 14 - Pre‑boot Smart Check

Table 3-1 Recommended Product Settings Policies PolicyOptionsRecommendationsGeneral Tab• Enable Policy — Leave this option checked (enabled). This po

Pagina 15

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsspecifying the Windows or Mac drive letters/volume names. Part

Pagina 16

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsLog On Tab• Enable automatic booting — Leave this option unche

Pagina 17 - Display Name

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsand hence EEPC is activated, even if the administrator has not

Pagina 18 - Adding users

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsuser for which it was captured. When you select the Enable SSO

Pagina 19 - Figure 3-4 Adding EE users

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsBoot OptionsTab(Windowsonly)• Enable Boot Manager — Leave this

Pagina 20

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsEncryptionProviders Tab(Windowsonly)• Use compatible MBR — Lea

Pagina 21

Recommended User-Based Policy SettingsThe User‑Based Policy controls the parameters for Endpoint Encryption user accounts. For example, itcontains the

Pagina 22

Table 3-2 Recommended User Based Policy Settings PolicyOptionsRecommendationsAuthentication Tab• Token type: Select Password only. There are a number

Pagina 23

ContentsPreface 5About this guide ... 5Audience ... 5Conventions ...

Pagina 24

Table 3-2 Recommended User Based Policy Settings (continued)PolicyOptionsRecommendationsPassword ContentRules Tab• Password length — Use default.• En

Pagina 25

• Deploy the EEAgent and EEPC packages to the client system.• Activate EEPC and restart client system.Best practices and recommendations for using Int

Pagina 26

• Create a query in ePolicy Orchestrator to find all systems that need to stop autobooting and assignthe second policy to these systems.• Send an agen

Pagina 27

4Deployment and activationThe purpose of this section is to provide guidance with troubleshooting on why the Windows or Macoperating system will not s

Pagina 28

Basic preparations and recommendationsThe following recommendations will make sure that your data is protected during and after theencryption process.

Pagina 29

• Create and test the customized EETech WinPE V1 or V3 or V4 (for UEFI systems) Disk with EEPCdrivers installed.• Create and test an EETech Standalone

Pagina 30 - AMT and EEPC

High level process of the installationThis section lists the steps and considerations involved in Endpoint Encryption deployment andactivation.This pr

Pagina 31 - Phased deployment strategies

Order of the EEAgent and Endpoint Encryption deploymentIt is not mandatory to have two different tasks for the product deployment. You can create one

Pagina 32 - Auto booting

So, it is always better to execute the deployment using a single task wherein you need to deploy theEEAgent package first then the EEPC/EEMac package.

Pagina 33 - Deployment and activation

End user experienceThe deployment task pushes both the Endpoint Encryption Agent and the EEPC/EEMac components tothe selected systems. The installatio

Pagina 34

6 Migration and upgrade 51Best practices for migration and upgrade ... 51Export user assignments from 5.x.x database ...

Pagina 35

When enabled, the EEAgent queries the client system for the currently/previously logged on domainusers to the client. The EEAgent will then send the c

Pagina 36

Endpoint Encryption activation sequenceWhen the EEAgent and EEPC/EEMac packages are successfully deployed, the users will be prompted torestart their

Pagina 37

Single Sign On (SSO)The EEPC client system then boots to Windows. This first boot establishes SSO (if it has beenenabled). On future restarts, the use

Pagina 38

Skip Unused SectorsSkip Unused Sectors is one of the new features of offline activation that is introduced in EEPC 7.0Patch 1. For more information ab

Pagina 39 - Add group users

4Deployment and activationSkip Unused Sectors44McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide

Pagina 40 - At the server side

5Operations and maintenanceManaging your systems in different batches, branches or groups will make a great impact for EndpointEncryption deployment.

Pagina 41 - Endpoint Encryption Status

What if a user is disabled from LDAP?If a user account that is initialized on the client system, and is later removed from LDAP, then it will beautoma

Pagina 42 - Single Sign On (SSO)

What happens to the Machine Key when you delete an Endpoint Encryption activesystem from ePolicy Orchestrator?The Machine Key remains in the ePolicy O

Pagina 43 - Skip Unused Sectors

How to destroy the recovery information for an Endpoint Encryption installedsystem?When you want to secure‑erase the drives in your Endpoint Encryptio

Pagina 44

You can create different permission roles and assign them with different Endpoint Encryption Permission Setsto different users.Figure 5-1 Endpoint En

Pagina 45 - Operations and maintenance

PrefaceThis guide provides the information on best practices on using McAfee Endpoint Encryption.Contents About this guide Find product document

Pagina 46 - Manage Machine Keys

• Longer ASCI interval• Password only deployments should remove certificate query from EE LDAP User/Group Synchronizationtask.The User Certificate att

Pagina 47

6Migration and upgradeEEPC 7.0 Patch 1 has an improved architecture and interface.Due to these improvements, some functionality from earlier versions

Pagina 48 - Encryption

Importing the systems or users from 5.x.x database into the McAfee ePO server• Make sure that 5.x.x and 7.0 Patch 1 are connected to the same LDAP ser

Pagina 49 - EEPC 7.0 Patch 1 scalability

General recommendations• Retain the 5.x.x database for some time, so that you can access it case any loss or theft of adevice after the migration.• Mi

Pagina 50

• It is important to understand the export options; Machines and Users in the export wizard. You canselect any one of the options to export the requir

Pagina 51 - Migration and upgrade

attributes. The results are color‑coordinated, so that it is easy for the administrator to analyze theresults.• Green indicates a single match• Orange

Pagina 52

What happens to a partially encrypted 5.x.x system after the migration?A partially encrypted 5.x.x system gets fully encrypted or decrypted as per the

Pagina 53 - Best practices

7Use ePolicy Orchestrator to report clientstatusMcAfee ePolicy Orchestrator provides comprehensive management and reporting tools for EndpointEncrypti

Pagina 54

Track the progress of the deployment and encryption statusThe progress of the EEPC/EEMac deployment and the number of encrypted drives can be easilyde

Pagina 55 - Upgrade to EEPC 7.0 Patch 1

Endpoint Encryption makes this task easy. An administrator can log on to McAfee ePO and, in just afew clicks, be able to produce a report showing that

Pagina 56 - EETech recovery tool

Find product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and trou

Pagina 57

7Use ePolicy Orchestrator to report client statusReport encryption status from McAfee ePO60McAfee Endpoint Encryption 7.0 Patch 1 Software Best Pract

Pagina 58

IndexAabbreviations 8about this guide 5activation 33AD 16, 36add local domain users 20, 39, 42, 45, 46add users 16Agent wake-up call 41algorithm 55AMT

Pagina 59

McAfee ServicePortal, accessing 6migration 51OOpal 9, 46operations 45OU 16, 39Ppassword 28, 39PBA 7, 11, 20, 33, 39, 41, 42, 45, 51permission sets 48,

Pagina 61

1IntroductionMcAfee Endpoint Encryption provides superior encryption across a variety of endpoints such asdesktops and laptops. The Endpoint Encryptio

Pagina 62

• AD/LDAP• The associated Endpoint Encryption communicationThis document encapsulates the professional opinions of Endpoint Encryption certified engin

Pagina 63

2Design overviewThe McAfee ePO server is a central store of configuration information for all systems, servers, policies,and users.Each time the admin

Comentarios a estos manuales

Sin comentarios