POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment

Size: px
Start display at page:

Download "POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment"

Transcription

1 POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1

2 Table of Contents 1 Introduction System requirements High level process Troubleshooting Considerations 5 2 Downloading software Download epolicy Orchestrator v4.6 & Documentation Download McAfee Agent 4.6 & Documentation Download McAfee EEFF Installation of epo Components Check in the EEFF extension into epo Check in the EEFF client package into epo Registering Windows Active Directory 12 5 Using the Product Deployment task to deploy products to managed systems 14 6 Deploying EEFF to client machines Via a Wake up agent Creating and scheduling client tasks Perform following on the Endpoint System Installing EEFF from the Endpoint System 21 7 User Case: Endpoint Encryption for Removable Media (EERM) Creating a EEFF key for EERM recovery EERM Policy Creation Grant Key for EERM Password Rules for EERM Assign Policy via the System Tree Enforce policy update via Agent Wake-Up Using McAfee EERM Use this task to initialize a removable media Recovery access to EERM EERM Password Recovery via Pop GUI EERM Password Recovery via McAfee Tray Icon Moving an Encrypted file protected with EEFF key to EERM protected Device Trouble Shooting tips for EERM Check EERM reporting capabilities Create a customized report Top 10 removable media users 48 8 User Case: Folder Encryption for Local Folders Creating a key for all Enterprise Users Creating Policy for Folder Encryption Grant Key for Corp Key Assigning Policy to Systems Wake up agent to enforce policy update Using Folder Policy for Corp Users 63 2

3 9 User Case: Folder Encryption for HR Share Wake up agent to enforce policy update Using Folder Policy for Corp Users User Driven Actions Wake up agent to enforce policy update Explicit Encryption Explicit Decryption Creation of Self Extractors Conclusion Further Information 82 3

4 1 Introduction This POC guide provides a step-by-step instruction on how to download, install and use Endpoint Encryption File and Folder v4.1.x (EEFF 4). It covers three main areas Removable media encryption, Using folder policies for local and network encryption and also user driven actions. This POC guide does not cover upgrading from Version 3.x for information on upgrading please refer to the Migration Guide (EEFF_4.0_Migration_Guide.pdf) which can be downloaded from the McAfee download site. For additional detailed subjects refer to the standard set of documents that are able to be downloaded from the McAfee Site and the Best Practices for McAfee Endpoint Encryption for Files and Folders v4.0 (EEFF 4). The links for these documents are referenced in Section 11 below. This guide will cover the following user cases Endpoint Encryption for Removable Media (EERM) Local Folder Encryption using Folder Encryption Network Folder Encryption User Driven Actions Please be aware that the screenshots in this document may not reflect the latest available version of Endpoint Encryption for Files and Folders. But it s based on the functionality of Endpoint Encryption for Files and Folders 4.1 or higher. 1.1 System requirements McAfee epolicy Orchestrator 4.6 (minimum Patch 2) McAfee Agent for Windows 4.6 4

5 1.2 High level process Navigate to the product software download site and use temporary grant number to gain access. Download epolicy Orchestrator v4.6 Download McAfee Agent 4.6 Install epolicy Orchestrator v4.6 Check EEFF extensions in to epo 4.6 Check EEFF packages in to epo 4.6 Register your Active Directory server Create epo server task for Active Directory Sync Create client tasks to deploy the EEFF components Create EEFF Keys Create Policies Test for successful deployment and encryption on an endpoint 1.3 Troubleshooting Considerations For the POC it is recommended to make the following changes on the endpoint systems which will assist in using the dump files create by Windows Operating Systems Configure Dump files settings on endpoint systems Windows XP 1 Select Control panel System Advanced 2 Click Settings button for Startup and Recovery 3 Deselect Automatically Restart under system Failure 4 Under Write debugging information (drop down list), select Kernel dump. Windows 7 1 Select Control Panel System and Security System 2 Select Advanced system settings (option on left) 3 Click Settings button for Startup and Recovery. 4 Under section Write debugging information Select Kernel dump. 5 Deselect Automatically Restart under System Failure, this will ensure the endpoint system stops after dump has been written and provides time to boot up into Safe Mode Obtaining Dump files If a crash occurs and the dump file written, press Ctrl-Alt-Delete and boot up in Safe Mode using F8. Make sure to select just Safe Mode and not SafeMode with networking! Once the machine boots into Safe Mode, restart and boot up normally again and copy the C:\windows\memory.dmp to a safe location (please also zip this file). The reason for booting into Safe Mode is that EEFF encrypts the pagefile.sys (which is partially used for the dump file), which will make Windows unable to recognize it. In Safe Mode, the EEFF driver is not active and will not encrypt the pagefile. 5

6 For additional information please refer to This article also makes reference to a Microsoft KB: 2 Downloading software Upon receiving your grant number you ll need to access the software download portal from the following link below. Type in your grant number on the product download website to access the evaluation software required. 6

7 2.1 Download epolicy Orchestrator v4.6 & Documentation Download epo 4.6 (minimum Patch 2 or higher) Download Documentation 7

8 2.2 Download McAfee Agent 4.6 & Documentation Download McAfee Agent 4.6 Download Documentation 8

9 2.3 Download McAfee EEFF 4.1 The document.zip contains following documents: 9

10 3 Installation of epo Components This POC guide will assume you have already installed McAfee epo 4.6 and Agent to the system. If this has not been performed please refer to McAfee epo product and installation documents. The following files should be what have been downloaded during section 2 above. If you are missing any of the following files please revisit the download section. EEFF software files Before you begin Make sure you have the appropriate rights to modify the server settings, permission sets, users, and registered servers. Ensure your epo server version is at 4.6 with Patch 2 or higher Ensure your McAfee Agent version is at least McAfee Agent 4.6 or higher Note the hostname or IP address of an Active Directory Domain Controller / AD Server Read the readme for known issues and other important information Consider engaging McAfee professional services to assist in your production installation The files required for the extensions are: 1. EEFF-extension zip 2. MfeEEFF_Client_ zip 3. help_eeff_410.zip (optional, but recommended) 3.1 Check in the EEFF extension into epo Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Software Extensions Install Extension the Install Extension dialog box appears. 3 Click Browse and select the extension file (EEFF-extension zip) 4 Click OK 10

11 5 Click Install Extension 6 Click Browse and select the extension file (help_eeff_410.zip) 7 Click OK The Install Extension page appears with the extension name and version details. 3.2 Check in the EEFF client package into epo Log on to the epolicy Orchestrator server as an administrator. 2 Click Menu Software Master Repository 3 Click Actions Check In Package. The Check In Package wizard opens. 4 Select Product or Update (.ZIP) from the Package type list, then browse to and select the package file (MfeEEFF_Client_ ). 5 Click Next. The Package Options page appears. 6 Click Save to begin checking in the package. Wait while the package is checked in. 7 The new package appears in the Packages in Master Repository list on the Master Repository page. 11

12 4 Registering Windows Active Directory Use this option to register a Windows Active Directory. You must have a registered LDAP server to use Policy Assignment Rules, to enable dynamically assigned permission sets, and to enable automatic and manual user account assignment. Before you begin Make sure you have the appropriate rights to modify the server settings, permission sets, users, and registered servers. Note! As there are no changes made to the AD schema a read-only account can be used for the POC an individual account can be used, for production a Service Account is recommended. Task For option definitions, click? in the interface. 1 Log on to epolicy Orchestrator server as an administrator. 2 Click Menu Configuration Registered Servers, then click New Server. The Registered Server Builder wizard opens. 3 From the Server type drop-down list on the Description page, select LDAP Server, specify a unique name (a user-friendly name) and any details, click Next. The Details page appears. 4 Select Active Directory from LDAP server type, then type the Domain name or the Server name. Note! Use DNS-style domain name. While using DNS-style domain name, ensure that the McAfee epo system is configured with appropriate DNS setting and can resolve the DNS-style domain name of the Active Directory. The Server name is the name or IP address of the system where the Windows Active Directory is present. 5 Type the User name. Note! The User name should be of the format: domain\username for Active Directory accounts. 6 Type the Password and confirm it. 7 Click Test Connection to ensure that the connection to the server works 12

13 8 Click Save. 13

14 5 Using the Product Deployment task to deploy products to managed systems Use these tasks to deploy products to managed systems with the Product Deployment client task. epolicy Orchestrator allows you to create this task for a single system, or for groups of the System Tree. Task For option definitions, click? in the interface. 1 Click Menu Policy Client Task Catalog, select McAfee Agent Product Deployment as Client Task Types, then click Actions New Task. The New Task dialog box appears. 2 Ensure that Product Deployment is selected, click OK. 3 Type a name for the task you are creating and add any notes 4 Next to Target platforms, select the type(s) of platform to use the deployment. Windows is selected by default 14

15 5 Next to Products and components set the following: Products and components: Endpoint Encryption for Files and Folders Action: Install Language: Language Neutral Branch: Current 6 Click Save. 7 Click Menu Systems System Tree Assigned Client Tasks, then select the required group in the System Tree. (TORENC) 8 Click Actions New Client Task Assignment. The Client Task Assignment Builder wizard appears. 9 On the Select Task page, select Product as McAfee Agent and Task Type as Product Deployment, then select the task you created for deploying product. (Deploy EEFF) 15

16 10 Next to Tags, select the desired platforms to which you are deploying the packages, click Next 11 On the Schedule page, select whether the schedule is enabled, and specify the schedule details, click Next. (for pushing out the deployment task through a wake-up agent, Set schedule type to Run Immediately 16

17 12 Review the summary, then click Save. The client task will have been associated to the System Tree group. 17

18 6 Deploying EEFF to client machines There are two methods to deploy EEFF to the endpoint System. This can be accomplished through epo or directly from the endpoint system. 6.1 Via a Wake up agent Creating and scheduling client tasks Task For option definitions, click? in the interface. 1 Click Menu Systems System Tree Systems, select the desired group in the System Tree, then click on the machine 2 Select system (Win701) 3 Click Wakeup Agent 18

19 4 Select Force complete policy and task update 5 Click OK 6 Check the Agent status monitor on the endpoint system 6.2 Perform following on the Endpoint System 1 Right click McAfee Shield 2 Select McAfee Agent Status Monitor The agent status monitor will show the deployment task that was received via the wake up call from epo 19

20 3 When Prompted Reboot the system The reboot is required for EEFF to enable the kernel level driver. When the machine has rebooted perform the following to confirm the installation 4 Right click McAfee Shield 5 Click About 20

21 6 The following will be displayed confirming McAfee Endpoint Encryption for File and Folders 4.1 has been installed 6 Click OK 6.3 Installing EEFF from the Endpoint System 1 Right click McAfee Shield 2 Select McAfee Agent Status Monitor 3 Click Collect and Send props 21

22 4 When prompted Reboot the system The reboot is required for EEFF to enable the kernel level driver. When the machine has rebooted perform the following to confirm the installation 5 Click About 6 The following will be displayed confirming McAfee Endpoint Encryption for File and Folders 4.1 has been installed 7 Click OK 22

23 7 User Case: Endpoint Encryption for Removable Media (EERM) Endpoint Encryption for Removable Media will allow for password authentication and portable access to any USB removable media. EERM policies can be assigned in a number of ways using User Policy Assignment rules, System Policy assignment rules or by simply assigning the EERM policy at the system tree level. Please refer to KB for further detailed information on EERM for updated articles referring to EERM For the purposes of EERM there are options for recovering a key encrypted with EERM 7.1 Creating a EEFF key for EERM recovery Task For option definitions, click? in the interface. 1 Click Menu Data Protection EEFF keys. The EEFF Key Management page appears. 2 Click Actions Create New Key. The Create a New Key dialog box appears. 23

24 3 Type a name EERM Recovery Key and description for the key Used for EERM recovery. 4 Select Never expire key or an expiration date as required. 5 Click OK 24

25 The EERM key just created will be displayed in the Key management, note the State of the key is Active 25

26 7.2 EERM Policy Creation Use this task to create the policy for EERM, login to McAfee epo Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Catalog 2 Select the Product as Endpoint Encryption for Files and Folders Select Removable Media (UBP) Category from the drop-down lists. 4 Click My Default. The policy options will be displayed 26

27 5 Set the following settings Select Use McAfee Endpoint Encryption for Removable Media (EERM) Protected Area Entire device and when a device size is greater than 64Gb set to User Managed Select Make unprotected files, folders and devices read-only (on a client machine with EEFF installed) 6 Recovery Methods select Use recovery key and click the browse button at the right 27

28 7 Select EERM Recovery Key from the drop down menu 9 Click OK Step 10 is optional! 10 Define an individual text for pop up message when inserting an unprotected removable media device by editing the Customize UI Text displayed on inserting media text box Following message will appear if the Customize UI Text displayed on inserting media text box is blank: 28

29 Note! In case of using the default message, the message will be displayed in the language based on the operating system and which is supported by Endpoint Encryption for Files and Folders. As soon as an individual text is configured there would be the need to configure a separate policy for every language. 10 Click Save. 29

30 7.3 Grant Key for EERM Use this task to grant key for EERM, login to McAfee epo Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Catalog 2 Select the Product as Endpoint Encryption for Files and Folders Select Grant Keys (UBP) Category from the drop-down lists. 7 Click My Default 30

31 8 Select the EERM Recovery Key 9 Click the button 10 Selected key will appear under selected keys, select the EERM Recovery key 11 Click Save 31

32 7.4 Password Rules for EERM Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Catalog 2 Select the Product as Endpoint Encryption for Files and Folders Select Password Rules Category from the drop-down lists. 7 Click My Default 32

33 8 Set Password rules to your needs Note! Password rules applies for EERM, User Local Keys and Self-Extractor files 7.5 Assign Policy via the System Tree Use this task to assign a policy to multiple managed nodes within a group. The policy that is used in the Use case is created at the System Tree level. These types of policies can be assigned via Policy Assignment Rules (PAR) by create a User PAR or System PAR. For more information on using Policy Assignment Rules for assignment of policies please refer to following KB Articles: KB How to create Endpoint Encryption for Files and Folders 4.x Policies KB Policy assignment interpretations in Endpoint Encryption for Files and Folders 4.0 at 33

34 Task For option definitions, click? in the interface. 1 Click Menu Systems System Tree Systems, then select the desired group in the System Tree. 2 Click Assigned Policies 3 Select Endpoint Encryption for Files and Folders from product drop-down list. 4 Make sure that the My Default policy is assigned for Removable Media and grant Keys 34

35 5 Click Edit Assignments to change policy assignment if needed. 6 Click Save 35

36 7.6 Enforce policy update via Agent Wake-Up Task For option definitions, click? in the interface. 1 Click Menu Systems System Tree Systems, select the desired group in the System Tree, then click on the machine 2 Select System by selecting the check box 3 Click Wakeup Agent 4 Select Force complete policy and task update 36

37 5 Click OK 6 Check the Agent status monitor on the endpoint system to ensure the policy gets updated. 7 Right click McAfee Shield 8 Select McAfee Agent Status Monitor 9 Check if policies have been updated 37

38 7.7 Using McAfee EERM To check if the EERM policy got enforced perform the following 1 Right click McAfee Shield 2 Select McAfee Manage Features Endpoint Encryption for Files and Folders 2 Expand Simple policies note the following settings enabled: Recovery key for EERM devices {xxxxxxxx} Use entire device for EERM Removable media work mode fail over Removable media work mode limit Make unprotected EERM files read only Use EERM encryption 38

39 When you insert a non-protected removable device on a client with EEFF installed and the policy for removable media enabled, a notification dialog box appears prompting to initialize the device. Alternatively, you can initialize the removable media using McAfee Endpoint Encryption for Files and Folders client console. 7.8 Use this task to initialize a removable media. 1 Right click McAfee Shield 2 Select McAfee Manage Features Endpoint Encryption for Files and Folders 2 On the left pane, click Initialize device. The Initialize Removable Media window appears. 39

40 3 Provide a volume label. 4 In the Authentication section select Authentication Password and enter a password. For the password method, type a password that conforms to the My Default Password Rules policy. For the Authentication certificate method, select a digital certificate from the drop-down menu. Note! The recovery methods available depends on the removable media encryption policy enforced on the system or the user. 40

41 5 Select Initialize If there is already data on the removable device following screen is displayed and asks if you want to back up the existing data. 6 Options available are Yes, No and Cancel click Yes If the following screen is displayed the password does not meet the complexity rules defined in the My Default Password Rules policy, please reenter a valid password 7 This will create the new volume 41

42 8 Confirmation the Initialization is complete will be displayed 42

43 7.9 Recovery access to EERM To recover access to a device encrypted by EERM perform one of the following two tasks on the endpoint point system EERM Password Recovery via Pop GUI 1 Plug in the Device, the following will be displayed 2 Click Recover 3 The Recovery key will be option that is selected. Click Recovery 43

44 4 Enter Password and repeat Password. If the password supplied does not meet the minimum complexity an informational window will be displayed. 5 Click OK EERM Password Recovery via McAfee Tray Icon 1 Right click McAfee Shield 2 Select McAfee Manage Features Endpoint Encryption for Files and Folders 44

45 2 Click Recover Media 3 Click Recover 4 The Recovery key option will be the only available. Click Recovery 5 Enter Password and repeat Password. If the password supplied does not meet the minimum complexity an informational window will be displayed. 6 Click OK 45

46 7.10 Moving an Encrypted file protected with EEFF key to EERM protected Device Note! When moving a file from an endpoint system that has been protected with an EEFF Key to an EERM protected device, the file will be protected with EERM protection to provide usability and portability Trouble Shooting tips for EERM When attempting to initialize a device to be protected by EERM fails a typical error will likely result in the following The following should be checked as a possibility 1 Ensure the Recovery has been granted access to be used for recovery, check the Grant Key Policy in epo or check the manage features for the available keys 2 Check the File system on the device to ensure the File system is recognized 3 Check the Device Hardware If the above does not resolve the issue with initialization a SR will have to be raised with McAfee Support in this instance it is advisable to obtain the trace file, refer to the product guide. 46

47 7.12 Check EERM reporting capabilities Task For option definitions, click? in the interface. 1 Click Menu Reporting Queries & Reports Shared Groups EEFF Queries, select Run from the Removable Media Device Events System Information User Info (DomainName\UserName) Time Stamp Agent GUID Initialization Initialization State (FAILED, CANCELLED, SUCCESSFUL) Backup State (NONE, FAILED, CANCELLED, SUCCESSFUL) Backup Size Time taken for initialization Time taken for backup Size of protected part (Valid only when initialization has completed successfully) User Response (ACCEPTED, REJECTED (when user selects to Yes/No for EERM initialization prompt)) Device Information Size (Bytes) File System of device (FAT, NTFS, EERM : in case EERM protected devices) Vendor Name Product Name Exempted (YES, NO, UNKNOWN) Protected (only EERM protected devices are considered protected) (YES, NO, UNKNOWN) 47

48 Create a customized report Top 10 removable media users Task For option definitions, click? in the interface. 1 Click Menu Reporting Queries & Reports 2 Click Actions New 3 Click Endpoint Encryption for Files and Folders from Feature Group 4 Click Removable Media Device Events Next 5 Click Single Group Summary Table from Display Result As 6 Choose Number of Removable Media Device Events from the Values are: drop down list 7 Choose User Name from the Labels are drop down list 8 Choose 10 as Maximum items 9 Click Next 48

49 10 Add User Name to the Selected Colums 11 Click Next 12 Click Run to show the results 49

50 8 User Case: Folder Encryption for Local Folders EEFF policies can be assigned in a number of ways using User Policy Assignment rules, System Policy assignment rules or by simply assigning the EERM policy at the system tree level. Please refer to Knowledge Base articles for further detailed information on this subject. 8.1 Creating a key for all Enterprise Users Task For option definitions, click? in the interface 1 Click Menu Data Protection EEFF keys. The EEFF Key Management page appears 2 Click Actions Create New Key. The Create a New Key dialog box appears 50

51 3 Type a name Corp Key and description for the key, Key for all Domain Users 4 Select Never expire key or an expiration date as required 51

52 5 Click OK The Corp Key just created will be displayed in the Key management, note the State of the key is Active Repeat Steps above 2 thru 5 for creating a Key for HR 1 Click Actions Create New Key. The Create a New Key dialog box appears 2 Type a name HR key and description for the key, Key for HR 3 Select Never expire key or an expiration date as required 4 Click OK 52

53 8.2 Creating Policy for Folder Encryption Use this task to create the policy for folder encryption, login to McAfee epo Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Catalog 2 Select the Product as Endpoint Encryption for Files and Folders Select Folder Encryption (UBP) from the drop-down lists. 4 Click Duplicate on the McAfee Default policy. Duplicate Existing Policy window is displayed 53

54 5 Type Corp Document Policy add a Description in the notes field 6 Click OK 7 Click Corp Documents Policy 54

55 8 The policy options will be displayed for the path Click the Right Arrow Select [Documents] 10 Click Browse next to Key: 11 Select Corp key by using the browse button 12 Click Save 55

56 Repeat Steps above 2 thru 8 for creating a folder policy for HR 2 Click Duplicate on the McAfee Default policy. Duplicate Existing Policy window is displayed 3 Type HR Folder Policy add a Description in the notes field 4 Click OK 5 Click HR Folder Policy 6 The Folder Encryption Options will be displayed for the path Enter UNC path to Share 7 Click Browse next to Key: 8 Select the HR key by using the browse button 9 Click Save 56

57 8.3 Grant Key for Corp Key Use this task to make Corp Key available via Grant Key policy Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Catalog 2 Select the Product as Endpoint Encryption for Files and Folders Select Grant Keys (UBP) Category from the drop-down lists. 4 Click My Default 57

58 5 Select the Corp Key 6 Click the button 7 Selected key will appear under selected keys, select the Corp key 8 Click Save 58

59 8.4 Assigning Policy to Systems Use this task to assign the policy to machines Task For option definitions, click? in the interface. 1 Click Menu Policy System Tree 2 Click My Organization Assigned Policies to assign the folder policy to this group 3 Click Edit Assignment on Actions 59

60 4 Select Corp Documents Policy from the Drop list Assigned Policy 5 Click Save 60

61 8.5 Wake up agent to enforce policy update Task For option definitions, click? in the interface. 1 Click Menu Systems System Tree Systems, select the desired group in the System Tree, then click on the machine 2 Select system (Win701) 3 Click Wakeup Agent 61

62 4 Select Force complete policy and task update 5 Click OK 6 Check the Agent status monitor on the endpoint system to ensure the policy gets updated. 7 Right click McAfee Shield 8 Select McAfee Agent Status Monitor 62

63 8.6 Using Folder Policy for Corp Users To check the EERM policy received from epo perform the following 1 Right click McAfee Shield 2 Select McAfee Manage Features Endpoint Encryption for Files and Folders 2 Expand Folder Policies and Available keys, note the following settings should be enabled Folder Policies should display [MYDOCUMENTS] Available Keys EERM Recovery Key and Corp Key 3 Open My Documents 63

64 You can see visually the files in the my documents are encrypted represented with the Padlock icon. 64

65 9 User Case: Folder Encryption for HR Share Use this task to create the policy for folder encryption, login to McAfee epo. The HR key that will be used was created in 8. If this step was missed please revisit Section 8.1 Creating a key for all Enterprise Users Step 6. Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Assignment Rules 2 Click New Assignment Rule 3 Type a name for the New Policy Assignment Rule and Description 65

66 4 Select User Based Rule Type 5 Click Add Policy 6 Select Product Endpoint Encryption for Files and Folders Category Folder Encryption Policy HR Folder 7 Click + 8 Select Product Endpoint Encryption for Files and Folders Category Grant Keys (multislot) Policy HR Grant Key Policy 66

67 9 Click Next. This will display the Policy Assignment builder 10 Click next to group Membership 11 Click Browse Button next to group membership 67

68 12 Find HR group Select the HR group 13 Click OK 14 Click Next 68

69 15 Click Save. The HR Policy Assignment Rule will show 9.1 Wake up agent to enforce policy update Task For option definitions, click? in the interface. 1 Click Menu Systems System Tree Systems, select the desired group in the System Tree, then click on the machine 2 Select system (Win701) 69

70 3 Click Wakeup Agent 4 Select Force complete policy and task update 5 Click OK 6 Check the Agent status monitor on the endpoint system to ensure the policy gets updated. 70

71 9.2 Using Folder Policy for Corp Users To check the EERM policy received from epo perform the following 1 Right click McAfee Shield 2 Select McAfee Manage Features Endpoint Encryption for Files and Folders 2 Expand Folder Policies and Available keys, note the following settings should be enabled Folder Policies should display [MYDOCUMENTS] and \\epo46srv\hr Available Keys EERM Recovery Key and Corp Key and HR Key 3 Open My Documents 71

72 You can see visually the files in the my documents are encrypted represented with the Padlock icon. Open the \\epo46srv\hr share you can see the documents are encrypted with the HR KEY. Copy a file from the HR share to the C:\drive. Login as a non HR user, you should not have access to the files in the HR share. 72

73 10 User Driven Actions There are additional options that can be provided to users to allow for additional Functionality that are controlled by the user on the end point system. These are optional functionally controlled via policy through epo. Some of the most common features include: Creation of Self Extracting files Explicit Encryption Explicit Decryption Use this task to turn on User Driven Options, login to McAfee epo Task For option definitions, click? in the interface. 1 Click Menu Policy Policy Catalog 2 Select the Product as Endpoint Encryption for Files and Folders Select General (UBP) Category from the drop-down lists. 4 Click My Default. The policy options will be displayed 73

74 5 Select Allow Explicit Encrypt Allow Explicit Decrypt 6 Click Save 74

75 10.1 Wake up agent to enforce policy update 1 Click Menu Systems System Tree Systems, select the desired group in the System Tree, then click on the machine 2 Select system (Win701) 3 Click Wakeup Agent 4 Select Force complete policy and task update 75

76 5 Click OK 6 Check the Agent status monitor on the endpoint system to ensure the policy gets updated. 7 Right click McAfee Shield 8 Select McAfee Agent Status Monitor To check the EERM policy received from epo perform the following on the endpoint system. 10 Right click McAfee Shield 11 Select McAfee Manage Features Endpoint Encryption for Files and Folders 12 Expand Simple Policies, note the following settings should be enabled 76

77 Enable Decrypt : Yes Enable Encrypt : Yes Enable Self Extractors: Yes 77

78 10.2 Explicit Encryption The Encrypt option on the context menu allows you to manually encrypt a file or a folder. This option is unavailable to the users if the file or the folder has been encrypted by policy. Perform this task from the endpoint System 1 Right Click a file 2 Select McAfee Endpoint Encryption 3 Select Encrypt 4 Select Key to use for Encryption the list is derived from the available keys provided by the policy Choose Corp Key from drop down list 5 Select OK This can also be used if a file is to be encrypted with the HR key therefore making it shareable only by the group that has been granted access to the key. 78

79 10.3 Explicit Decryption The Decrypt option on the context menu allows you to manually decrypt a file or folder. This option is unavailable to the users if the folder has been encrypted by policy. Perform this task from the endpoint System. Right Click a file that has been encrypted with EEFF, denoted by the padlock icon, looking at the properties and selecting the Encryption Tab will provide the details of which key was used for encrypting the file 1 Right Click a file 2 Select McAfee Endpoint Encryption 3 Select Decrypt The file is decrypted in this instance the padlock icon has been removed 79

80 10.4 Creation of Self Extractors Self-Extractors are password-encrypted executable files that can also be decrypted on non- EEFF client systems. The password used to create the Self-Extractor is required to read it. You can change the name of the Self-Extractor. By default, it is named as its source file/folder with the *.exe extension. 1 Right Click a file 2 Select McAfee Endpoint Encryption 3 Select Create Self-Extractor (filename.xxx.exe) 4 Enter a Password and Confirm If the following screen is displayed the password does not meet the complexity rules defined in the My Default Password Rules policy, please reenter a valid password 80

81 5 Click OK The file will be successfully created To use the file click on the file and you will be prompted for the password 81

82 11 Conclusion This POC guide has provided a step by step guide on how to install and configure McAfee Endpoint Encryption for Files and Folder, along with step by step instructions on how to configure the following User Cases: Endpoint Encryption for Removable Media (EERM) Local Folder Encryption using Folder Encryption Network Folder Encryption User Driven Actions 11.1 Further Information For further information please refer to the following documentation and reference material: Release Notes readme_en-us.html Product Guide eeff_410_product_guide_en-us.pdf User Guide eeff_410_user_guide_en-us.pdf Migration Guide eeff_410_migration_guide_en-us.pdf Other Useful Links Knowledge Based articles (Searchable) (by Product) McAfee Use Case for EERM McAfee Support Site McAfee Product Download Site McAfee Technical Video Channel 82

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0

McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0 McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

About this release. McAfee Application Control and Change Control 6.1.1. Addendum. Content change tracking. Configure content change tracking rule

About this release. McAfee Application Control and Change Control 6.1.1. Addendum. Content change tracking. Configure content change tracking rule Addendum McAfee Application Control and Change Control 6.1.1 About this release For use with epolicy Orchestrator 4.6 5.0 Software This document is an addendum to the McAfee Change Control and Application

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

Migrating helpdesk to a new server

Migrating helpdesk to a new server Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

McAfee Endpoint Encryption 7.0

McAfee Endpoint Encryption 7.0 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

LogMeIn Backup. User Guide

LogMeIn Backup. User Guide LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Installing the Microsoft Network Driver Interface

Installing the Microsoft Network Driver Interface Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Bare Metal Recovery Quick Start Guide

Bare Metal Recovery Quick Start Guide Bare Metal Recovery Quick Start Guide Revisions Document Control Version 5.4.3 Status Changes Date Final Created. August 2014 Copyright 2003-2014 Intronis, Inc. All rights reserved. 1 Table of Contents

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

Managing Software Updates with System Center 2012 R2 Configuration Manager

Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0

Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0 Technical Note Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0 This technical note describes the process for migrating an existing Windows PC to run as a virtual machine with VMware Fusion

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Providing Patch Management with N-central. Version 9.1

Providing Patch Management with N-central. Version 9.1 Providing Patch Management with N-central Version 9.1 Contents Patch Management 4 Introduction 4 Monitoring for Missing Patches 4 Setting up Patch Management in N-central 5 Adding a WSUS Server to N-central

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

Migrating TimeForce To A New Server

Migrating TimeForce To A New Server Rev. 4/28/14 Migrating TimeForce To A New Server Table of Contents 1. Installation Prerequisites... 2 Required... 2 Recommended... 3 2. Update to a Migration Compatible Version... 3 Determine the Database

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo MyDLP Software Version 2.0 Endpoint Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features...

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Dell SonicWALL Notice Concerning Multiple LDAP Vulnerabilities

Dell SonicWALL Notice Concerning Multiple LDAP Vulnerabilities Dell SonicWALL Notice Concerning Multiple LDAP Vulnerabilities Dell SonicWALL has identified multiple LDAP authentication protocol vulnerabilities exposed when SonicOS is configured to use Microsoft Active

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Colligo Email Manager 6.0. Offline Mode - User Guide

Colligo Email Manager 6.0. Offline Mode - User Guide 6.0 Offline Mode - User Guide Contents Colligo Email Manager 1 Key Features 1 Benefits 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License Key 3 Managing SharePoint

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

LogMeIn Backup User Guide

LogMeIn Backup User Guide LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

SCOoffice Mail Connector For Microsoft Outlook. Installation Guide Outlook 2002

SCOoffice Mail Connector For Microsoft Outlook. Installation Guide Outlook 2002 SCOoffice Mail Connector For Microsoft Outlook Installation Guide Outlook 2002 Rev 1.2 14 Jan 2003 SCOoffice Mail Connector for Microsoft Outlook Installation Guide - Outlook XP Introduction This document

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

CTERA Cloud Onramp for IBM Tivoli Storage Manager

CTERA Cloud Onramp for IBM Tivoli Storage Manager CTERA Cloud Onramp for IBM Tivoli Storage Manager December 2012 Version 3.2 2012, CTERA Networks. All rights reserved. 1 Introduction This document describes how to deploy CTERA Cloud Attached Storage

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0 UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information