Download McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Product guide
Transcript
2 Design philosophy McAfee ePO requirements information about installing or using McAfee ePO, see the ePolicy Orchestrator product documentation for versions 4.5 and 4.6. Supported environments for McAfee ePO and EEPC As new operating systems and service packs are released, the original Product Guides for McAfee ePO and EEPC might not reflect the current McAfee support policy for those platforms. To view supported environments for McAfee ePO and EEPC, read the Knowledge Base article https://kc.mcafee.com/ corporate/index?page=content&id=KB51109, or refer to the McAfee Endpoint Encryption - 6.2 (EEPC) and 1.1 (EEMac) Product Guide. Hardware requirements for McAfee ePO For details on the hardware requirements for McAfee ePO, see the ePolicy Orchestrator product documentation for versions 4.5 and 4.6. Software requirements For details on the software requirements for McAfee ePO and McAfee Agent, see the McAfee Endpoint Encryption - 6.2 (EEPC) and 1.1 (EEMac) Product Guide. Clients communicating with McAfee ePO 4.0, 4.5, and 4.6 through VPN disappear from the McAfee tree. For more information, refer to the KnowledgeBase article https://kc.mcafee.com/corporate/index? page=content&id=KB52949. 12 McAfee Endpoint Encryption for PC 6.2 Software Best Practices Guide