ePO 4 Endpoint Encryption Deployment and Reporting User Guide
ePO 4 Endpoint Encryption Deployment and Reporting User Guide
DeploymentandUserGuide
1|
McAfee,Inc.
McAfee,Inc.3965FreedomCircle,SantaClara,CA95054,USA Tel:(+1)888.847.8766 FormoreinformationregardinglocalMcAfeerepresentativespleasecontactyourlocalMcAfeeoffice, orvisit: www.mcafee.com
COPYRIGHT
Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
Attributions
Refer to the product Release Notes.
Contents
Preface ........................................................................................... 4
About This Guide ..................................................................................... Audience ................................................................................................. Conventions ............................................................................................ Contact information.................................................................................. 4 4 4 4
Preface
Preface
About This Guide
This guide provides information on configuring Endpoint Encryption deployment and reporting through the ePolicy Orchestrator.
Audience
This information is intended primarily for network administrators who are responsible for their companys security program, and assumes the customer has used ePolicy Orchestrator.
Conventions
This guide uses the following conventions:
Bold Condensed
Courier Italic Blue All words from the interface, including options, menus, buttons, and dialog box names. The path of a folder or program; text that represents something the user types exactly (for example, a command at the system prompt). Emphasis or introduction of a new term; names of product manuals. A web address (URL); a live link. Supplemental information; for example, an alternate method of executing the same command. Important advice to protect your computer system, enterprise, software installation, or data.
Note Caution
Contact information
Download Site http://www.mcafee.com/us/downloads/ Product Upgrades (Valid grant number required) Security Updates (DATs, engine) HotFix and Patch Releases
For Security Vulnerabilities (Available to the public) For Products (ServicePortal account and valid grant number required)
Product Evaluation McAfee Beta Program Technical Support http://www.mcafee.com/us/support/ KnowledgeBase Search
http://knowledge.mcafee.com/
McAfee Technical Support ServicePortal (Logon credentials required) https://mysupport.mcafee.com/eservice_enu/start.swe Customer Service Web
http://www.mcafee.com/us/support/index.html http://www.mcafee.com/us/about/contact/index.html
4|
Preface
Phone US, Canada, and Latin America toll-free: +1-888-VIRUS NOor+1-888-847-8766 Monday Friday, 8 a.m. 8 p.m., Central Time
Professional Services
Enterprise http://www.mcafee.com/us/enterprise/services/index.html Small and Medium Business http://www.mcafee.com/us/smb/services/index.html
|5
Summary
This report checks all machines and their encryption status, e.g. is the machine fully encrypted (i.e. are all drives fully encrypted). It also displays the number of drives in an each encrypted state, e.g. full encryption, partially encrypted, in progress and not encrypted.
* NOTE: The In Progress status indicates a machine that is in the process of either decrypting, or, encrypting.
6|
Drive Check
This report lists all machines that have Endpoint Encryption for PC installed including the encryption status of each drive. It also reports on machines that do not have EEPC installed by placing Unknown in the Drive and Encryption columns.
|7
Figure1TheEndpointEncryptionCreateInstallationSetscreenshot
Summary
1. 2. 3. 4. 5. 6. Ensure the report configuration files have been installed. Prepare the Endpoint Encryption install set. Gather the files to prepare the pkgcatalog.z file. Edit the pkgcatalog.xml file. Create the pkgcatalog.z file using eposign.exe. Create the deployment zip file and check it in.
8|
|9
1. 2.
Open the pkgcatalog.xml in the c:\Deployment\0001 file using Notepad. Edit the Product ID and add the unique number to the name, for example, if the product ID is <ProductID>SBCE____3000</ProductID> then change this to include the unique number for the package, for example, <ProductID>SBCE____30000001</ProductID>. Follow these steps with a new four-character code each time you create a package. This ensures that all future packages are unique.
WARNING:YoumustnotchangetheProductIDotherthanaddthefourcharacteruniqueIDattheend, otherwise,reportingwillfail.Seetheexampleabove.
10 |
| 11
10. Ensure the Enable option is checked. NOTE:thistaskwillrunatthenextagentservercommunicationfortherelevantagents.Ifyouwishtorun thetasksooner,thenclicktheScheduletypeandselectRunimmediately. WARNING:Tocompletetheinstallation,allEndpointEncryptionproductsrequirearebootwhendeployed. IfCEandDEaredeployedsimultaneously,whenoneproductreboots,theCMAmayforgetwhatitwas doing;thiswillresultinthesecondproductnotbeingdeployeduntilthedeploymenttaskrunsagain. Therefore,alldeploymenttasksinvolvingEndpointEncryptionproductsshouldbesettorunonaregular basis. 11. Click the Next button to continue. 12. Click the Save button to save this deployment task or choose the Back button to change the Schedule, Configuration or Description.
12 |
Running Reports
Endpoint Encryption for Files and Folders Reports
Installed Version
This report will check each machine and report on whether or not Endpoint Encryption for Files and Folders is installed. It also displays which version is running. 1. 2. 3. Click the Reporting button from the main toolbar. Click EEFF Installed Version from the left hand Queries menu. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report.
Summary
This report checks all machines and their encryption status, e.g. is the machine fully encrypted (i.e. are all drives fully encrypted). It also displays the number of drives in an each encrypted state, e.g. full encryption, partially encrypted, in progress* and not encrypted. *NOTE:TheInProgressstatusindicatesamachinethatisintheprocessofeitherdecrypting,or, encrypting. 1. 2. 3. Click the Reporting button from the main toolbar. Click EEPC Install Summary from the left hand Queries menu. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report.
| 13
Drive Check
This report lists all machines that have Endpoint Encryption for PC installed including the encryption status of each drive. It also reports on machines that do not have DE installed by placing Unknown in the Drive and Encryption columns. 1. 2. 3. Click the Reporting button from the main toolbar. Click EEPC Drive Check from the left hand Queries menu. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report.
14 |
| 15