McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Server McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE herunter. McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Product guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Software

Best Practices GuideMcAfee Endpoint Encryption 7.0 Patch 1SoftwareFor use with ePolicy Orchestrator 4.6 Software

Seite 2 - License Agreement

The overall experience and tasks of an administrator and users in installing and using EEPC are exactlythe same regardless of whether the target syste

Seite 3 - Contents

Task1Click Menu | Reporting | Queries. The Queries page opens.2Select Endpoint Encryption from Shared Groups in Groups pane. The standard EE query lis

Seite 4 - Index 61

How Endpoint Encryption worksA boot sequence is executed by the BIOS (Windows) or firmware (Mac) leading to the starting of thebootable operating syst

Seite 5 - About this guide

information about installing or using McAfee ePO, see the ePolicy Orchestrator product documentationfor version 4.6.Supported environments for McAfee

Seite 6 - Find product documentation

1Install the EEGO extension (EEGO.ZIP) in McAfee ePO. Repeat the same procedures used forinstalling the product extension.2Check in the EEGO software

Seite 7 - Introduction

3Software configuration and policiesWhen planning for a rollout and deployment of EEPC/EEMac, we recommend that you understand thefollowing important

Seite 8 - Abbreviations

Active Directory configurationEndpoint Encryption users are not created from the McAfee ePO server. They are assigned to the clientsystems from an Act

Seite 9

EE LDAP Server User/Group SynchronizationMake sure you use the correct user attribute format in the EE LDAP Server User/GroupSynchronization task. Mat

Seite 10 - Endpoint Encryption Policies

EE LDAP Server User/Group Synchronization task logThe administrator can also view a log of this particular server task by double clicking the particul

Seite 11 - Design overview

The McAfee ePO server allows the administrator to filter user accounts that can be imported intoEEPC/EEMac, based on a portion of LDAP. For example, i

Seite 12 - McAfee ePO requirements

COPYRIGHTCopyright © 2013 McAfee, Inc. Do not copy without permission.TRADEMARK ATTRIBUTIONSMcAfee, the McAfee logo, McAfee Active Protection, McAfee

Seite 13 - Software requirements

Recommended Product Settings PolicyThe Product Settings Policy controls the behavior of the Endpoint Encryption client. For example, itcontains the op

Seite 14 - Pre‑boot Smart Check

Table 3-1 Recommended Product Settings Policies PolicyOptionsRecommendationsGeneral Tab• Enable Policy — Leave this option checked (enabled). This po

Seite 15

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsspecifying the Windows or Mac drive letters/volume names. Part

Seite 16

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsLog On Tab• Enable automatic booting — Leave this option unche

Seite 17 - Display Name

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsand hence EEPC is activated, even if the administrator has not

Seite 18 - Adding users

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsuser for which it was captured. When you select the Enable SSO

Seite 19 - Figure 3-4 Adding EE users

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsBoot OptionsTab(Windowsonly)• Enable Boot Manager — Leave this

Seite 20

Table 3-1 Recommended Product Settings Policies (continued)PolicyOptionsRecommendationsEncryptionProviders Tab(Windowsonly)• Use compatible MBR — Lea

Seite 21

Recommended User-Based Policy SettingsThe User‑Based Policy controls the parameters for Endpoint Encryption user accounts. For example, itcontains the

Seite 22

Table 3-2 Recommended User Based Policy Settings PolicyOptionsRecommendationsAuthentication Tab• Token type: Select Password only. There are a number

Seite 23

ContentsPreface 5About this guide ... 5Audience ... 5Conventions ...

Seite 24

Table 3-2 Recommended User Based Policy Settings (continued)PolicyOptionsRecommendationsPassword ContentRules Tab• Password length — Use default.• En

Seite 25

• Deploy the EEAgent and EEPC packages to the client system.• Activate EEPC and restart client system.Best practices and recommendations for using Int

Seite 26

• Create a query in ePolicy Orchestrator to find all systems that need to stop autobooting and assignthe second policy to these systems.• Send an agen

Seite 27

4Deployment and activationThe purpose of this section is to provide guidance with troubleshooting on why the Windows or Macoperating system will not s

Seite 28

Basic preparations and recommendationsThe following recommendations will make sure that your data is protected during and after theencryption process.

Seite 29

• Create and test the customized EETech WinPE V1 or V3 or V4 (for UEFI systems) Disk with EEPCdrivers installed.• Create and test an EETech Standalone

Seite 30 - AMT and EEPC

High level process of the installationThis section lists the steps and considerations involved in Endpoint Encryption deployment andactivation.This pr

Seite 31 - Phased deployment strategies

Order of the EEAgent and Endpoint Encryption deploymentIt is not mandatory to have two different tasks for the product deployment. You can create one

Seite 32 - Auto booting

So, it is always better to execute the deployment using a single task wherein you need to deploy theEEAgent package first then the EEPC/EEMac package.

Seite 33 - Deployment and activation

End user experienceThe deployment task pushes both the Endpoint Encryption Agent and the EEPC/EEMac components tothe selected systems. The installatio

Seite 34

6 Migration and upgrade 51Best practices for migration and upgrade ... 51Export user assignments from 5.x.x database ...

Seite 35

When enabled, the EEAgent queries the client system for the currently/previously logged on domainusers to the client. The EEAgent will then send the c

Seite 36

Endpoint Encryption activation sequenceWhen the EEAgent and EEPC/EEMac packages are successfully deployed, the users will be prompted torestart their

Seite 37

Single Sign On (SSO)The EEPC client system then boots to Windows. This first boot establishes SSO (if it has beenenabled). On future restarts, the use

Seite 38

Skip Unused SectorsSkip Unused Sectors is one of the new features of offline activation that is introduced in EEPC 7.0Patch 1. For more information ab

Seite 39 - Add group users

4Deployment and activationSkip Unused Sectors44McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide

Seite 40 - At the server side

5Operations and maintenanceManaging your systems in different batches, branches or groups will make a great impact for EndpointEncryption deployment.

Seite 41 - Endpoint Encryption Status

What if a user is disabled from LDAP?If a user account that is initialized on the client system, and is later removed from LDAP, then it will beautoma

Seite 42 - Single Sign On (SSO)

What happens to the Machine Key when you delete an Endpoint Encryption activesystem from ePolicy Orchestrator?The Machine Key remains in the ePolicy O

Seite 43 - Skip Unused Sectors

How to destroy the recovery information for an Endpoint Encryption installedsystem?When you want to secure‑erase the drives in your Endpoint Encryptio

Seite 44

You can create different permission roles and assign them with different Endpoint Encryption Permission Setsto different users.Figure 5-1 Endpoint En

Seite 45 - Operations and maintenance

PrefaceThis guide provides the information on best practices on using McAfee Endpoint Encryption.Contents About this guide Find product document

Seite 46 - Manage Machine Keys

• Longer ASCI interval• Password only deployments should remove certificate query from EE LDAP User/Group Synchronizationtask.The User Certificate att

Seite 47

6Migration and upgradeEEPC 7.0 Patch 1 has an improved architecture and interface.Due to these improvements, some functionality from earlier versions

Seite 48 - Encryption

Importing the systems or users from 5.x.x database into the McAfee ePO server• Make sure that 5.x.x and 7.0 Patch 1 are connected to the same LDAP ser

Seite 49 - EEPC 7.0 Patch 1 scalability

General recommendations• Retain the 5.x.x database for some time, so that you can access it case any loss or theft of adevice after the migration.• Mi

Seite 50

• It is important to understand the export options; Machines and Users in the export wizard. You canselect any one of the options to export the requir

Seite 51 - Migration and upgrade

attributes. The results are color‑coordinated, so that it is easy for the administrator to analyze theresults.• Green indicates a single match• Orange

Seite 52

What happens to a partially encrypted 5.x.x system after the migration?A partially encrypted 5.x.x system gets fully encrypted or decrypted as per the

Seite 53 - Best practices

7Use ePolicy Orchestrator to report clientstatusMcAfee ePolicy Orchestrator provides comprehensive management and reporting tools for EndpointEncrypti

Seite 54

Track the progress of the deployment and encryption statusThe progress of the EEPC/EEMac deployment and the number of encrypted drives can be easilyde

Seite 55 - Upgrade to EEPC 7.0 Patch 1

Endpoint Encryption makes this task easy. An administrator can log on to McAfee ePO and, in just afew clicks, be able to produce a report showing that

Seite 56 - EETech recovery tool

Find product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and trou

Seite 57

7Use ePolicy Orchestrator to report client statusReport encryption status from McAfee ePO60McAfee Endpoint Encryption 7.0 Patch 1 Software Best Pract

Seite 58

IndexAabbreviations 8about this guide 5activation 33AD 16, 36add local domain users 20, 39, 42, 45, 46add users 16Agent wake-up call 41algorithm 55AMT

Seite 59

McAfee ServicePortal, accessing 6migration 51OOpal 9, 46operations 45OU 16, 39Ppassword 28, 39PBA 7, 11, 20, 33, 39, 41, 42, 45, 51permission sets 48,

Seite 61

1IntroductionMcAfee Endpoint Encryption provides superior encryption across a variety of endpoints such asdesktops and laptops. The Endpoint Encryptio

Seite 62

• AD/LDAP• The associated Endpoint Encryption communicationThis document encapsulates the professional opinions of Endpoint Encryption certified engin

Seite 63

2Design overviewThe McAfee ePO server is a central store of configuration information for all systems, servers, policies,and users.Each time the admin

Kommentare zu diesen Handbüchern

Keine Kommentare