McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Podręcznik Użytkownika Strona 1

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Licencje / aktualizacje oprogramowania McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE. McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Product guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Software

Best Practices GuideMcAfee Endpoint Encryption for PC 6.2SoftwareFor use with ePolicy Orchestrator 4.5, 4.6 Software

Strona 2 - License Agreement

The overall experience and tasks of an administartor and users in installing and using EEPC are exactlythe same regardless of whether the target syste

Strona 3 - Contents

5Click Actions | Endpoint Encryption | Configure UBP enforcement. The Configure UBP enforcement pageappears with Enable and Disable options.6Select En

Strona 4 - Index 49

information about installing or using McAfee ePO, see the ePolicy Orchestrator product documentationfor versions 4.5 and 4.6.Supported environments fo

Strona 5 - About this guide

3Software configuration and policiesWhen planning for a rollout and deployment of EEPC, we recommend that you understand thefollowing important tasks

Strona 6 - Find product documentation

Active Directory configurationEEPC users are not created from the McAfee ePO server. They are assigned to the client systems froman Active Directory (

Strona 7 - Introduction

The McAfee ePO server allows the administrator to filter user accounts that can be imported into EEPC,based on a portion of LDAP. For example, if the

Strona 8 - Purpose of this guide

EE LDAP Server User/Group SynchronizationMake sure you use the correct user attribute format in the EE LDAP Server User/GroupSynchronization task. Mat

Strona 9 - Design philosophy

User CertificateThe User Certificate attribute is used by the McAfee ePO Server to determine which certificate shouldbe sent from ePolicy Orchestrator

Strona 10 - EEPC Policies

Recommended Product Settings PolicyThe Product Settings Policy controls the behavior of the EEPC client. For example, it contains theoptions for enabl

Strona 11 - McAfee ePO requirements

Table 3-1 Recommended Product Settings PoliciesPolicyOptionsRecommendationsGeneral Tab• Enable Policy — Leave this option checked (enabled). This pol

Strona 12 - Software requirements

COPYRIGHTCopyright © 2012 McAfee, Inc. Do not copy without permission.TRADEMARK ATTRIBUTIONSMcAfee, the McAfee logo, McAfee Active Protection, McAfee

Strona 13

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsLog On Tab• Enable Automatic Booting — Leave this option unch

Strona 14

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsYou need to enable the matching rules that are required for m

Strona 15 - Figure 3-2 Add EE users

Recommended User-Based Policy SettingsThe User-Based Policy controls the parameters for EEPC user accounts. For example, it contains theoptions for se

Strona 16 - Display Name

Table 3-2 Recommended User Based Policy SettingsPolicyOptionsRecommendationsAuthentication Tab• Token type: Select Password only. There are a number

Strona 17 - User Certificate

Phased deployment strategiesEEPC deployment (first time installation) can be done in various phases with different policy settingsfor different corpor

Strona 18

Auto bootingAuto Booting (Enable Automatic Booting) is used by administrators for re-imaging process, patchingcycles, and product deployments. Many so

Strona 19

3Software configuration and policiesPhased deployment strategies26McAfee Endpoint Encryption for PC 6.2 Software Best Practices Guide

Strona 20

4Deployment and activationThe purpose of this section is to provide guidance with troubleshooting on why the Windows operatingsystem will not start; e

Strona 21

Basic preparations and recommendationsThe following recommendations will make sure that your data is protected during and after theencryption process.

Strona 22

Administrators should also run performance testing during the pilot test.McAfee professionals did not come across any performance related issues with

Strona 23

ContentsPreface 5About this guide ...5Audience ...5Conventions ...

Strona 24 - Phased deployment strategies

6Add a user to the client system. Decide whether to add the users manually in ePolicy Orchestratoror to add users using the Add local domain user opti

Strona 25 - Auto booting

You can also create two separate tasks to deploy the packages, providing you wait for the firstdeployment (EEAgent) to complete before deploying the s

Strona 26

When enabled, the EEAgent queries the client system for the currently/previously logged on domainusers to the client. The EEAgent will then send the c

Strona 27 - Deployment and activation

EEPC activation sequenceWhen EEAgent and EEPC are successfully deployed, the users will be prompted to restart their system.The restart can be cancele

Strona 28

In short, the SSO option facilitates the user with the single authentication to the Operating Systemeven when PBA is enabled. Though it requires an ex

Strona 29 - Add user to the client system

5Operations and maintenanceManaging your systems in different batches, branches or groups will make a great impact for EEPCdeployment. It is a good pr

Strona 30

What if a user is disabled from LDAP?If a user account that is initialized on the client system, and is later removed from LDAP, then it will beautoma

Strona 31 - Add group users

node does not have any users assigned to the client system. The administrator must therefore assignusers to allow login, or enable the Add local domai

Strona 32 - At the server side

What happens to Machine Keys when moving systems from one branch to anotherin ePolicy Orchestrator?The LeafNode is not deleted from ePolicy Orchestrat

Strona 33 - EEPC activation sequence

Before you begin• Make sure that your LDAP server is configured and registered in ePolicy Orchestrator.• Make sure that you schedule and run the EE LD

Strona 34

Upgrade to EEPC 6.2 ...457 Use ePolicy Orchestrator to report client status 47Track the progress of the deployment and en

Strona 35 - Operations and maintenance

• Longer ASCI interval• Password only deployments should remove certificate query from EE LDAP User/Group Synchronization task.The User Certificate at

Strona 36 - Manage Machine Keys

6Migration and upgradeEEPC 6.2 has an improved architecture and interface.Due to these improvements, some functionality from earlier versions of the p

Strona 37

Importing the systems or users from 5.x.x database into the McAfee ePO server• Make sure that 5.x.x and 6.2 are connected to the same LDAP server duri

Strona 38

General recommendations• Retain the 5.x.x database for some time, so that you can access it case any loss or theft of adevice after the migration.• Mi

Strona 39 - EEPC 6.2 scalability

• It is important to understand the export options; Machines and Users in the export wizard. You canselect any one of the options to export the requir

Strona 40

attributes. The results are color-coordinated, so that it is easy for the administrator to analyze theresults.• Green indicates a single match• Orange

Strona 41 - Migration and upgrade

What happens to a partially encrypted 5.x.x system after the migration?A partially encrypted 5.x.x system gets fully encrypted or decrypted as per the

Strona 42 - Upgrading to EEPC 6.2

7Use ePolicy Orchestrator to report clientstatusMcAfee ePolicy Orchestrator provides comprehensive management and reporting tools for EEPC.Administrat

Strona 43 - Best practices

EEPC makes this task easy. An administrator can log on to McAfee ePO and, in just a few clicks, beable to produce a report showing that the missing co

Strona 44

IndexAabbreviations 7about this guide 5activation 27AD 14, 30add local domain users 18, 31, 34–36add users 14Agent wake-up call 33algorithm 45ASCI 9,

Strona 45 - Upgrade to EEPC 6.2

PrefaceThis guide provides the information on best practices on using EEPC.Contents About this guide Find product documentationAbout this guideT

Strona 46 - EETech recovery tool

OOpal 9, 36operations 35OU 14, 31Ppassword 22, 31PBA 7, 11, 18, 27, 31, 33–35, 41permission sets 38, 44phased deployment 13, 24pilot test 28policiesPr

Strona 48

Find product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and trou

Strona 49

1IntroductionMcAfee Endpoint Encryption for PC (EEPC) provides superior encryption across a variety of endpointssuch as desktops and laptops. The EEPC

Strona 50

Table 1-1 Abbreviations (continued)Titles DesignationsEEM Endpoint Encryption ManagerEEPC Endpoint Encryption for PCePO ePolicy OrchestratorLDAP Lig

Strona 51

2Design philosophyThe McAfee ePO server is a central store of configuration information for all systems, servers, policies,and users.Each time the adm

Komentarze do niniejszej Instrukcji

Brak uwag