Endpoint Encryption for Files and Folders 4.0 User Guide - McAfee
Endpoint Encryption for Files and Folders 4.0 User Guide - McAfee
Endpoint Encryption for Files and Folders 4.0 User Guide - McAfee
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Introducing <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>Files</strong> <strong>and</strong> <strong>Folders</strong><br />
EEFF Features<br />
The client software is installed on the client system. After the installation, the system synchronizes<br />
with the ePO server <strong>and</strong> acquires the user data. EEFF then assigns encryption policies <strong>and</strong> keys<br />
to the user as configured.<br />
EEFF client acts like a filter between the application creating or editing the files <strong>and</strong> the storage<br />
media. When a file is saved, EEFF filter executes the assigned encryption policies <strong>and</strong> encrypts<br />
the data, if applicable. If the user manages to kill the main EEFF process on the client system,<br />
EEFF encrypts folders <strong>and</strong> files according to policies assigned to the user. These policies are<br />
en<strong>for</strong>ced by the ePO server.<br />
The client software is installed on the client system. After the installation, the system synchronizes<br />
with the ePO server <strong>and</strong> acquires the user data. EEFF then assigns encryption policies <strong>and</strong> keys<br />
to the user as configured.<br />
The EEFF client acts like a filter between the application creating or editing the files <strong>and</strong> the<br />
storage media. When a file is saved, the EEFF filter executes the assigned encryption policies<br />
<strong>and</strong> encrypts the data, if applicable. If the user manages to kill the main EEFF process<br />
(MfeffCore.exe) on the client system, attempting to deviate from the assigned encryption policy,<br />
the process will be automatically regenerated. The automatic restart cannot be disabled.<br />
When a file that is encrypted with key A is moved to a folder where files are encrypted with<br />
key B, the file encrypted with key A will immediately be re-encrypted with key B. This behavior<br />
is known as follow-target-encryption <strong>and</strong> requires that the user or process transferring the file<br />
has access to both key A <strong>and</strong> key B. This operation takes place instantly when the file is placed<br />
in the folder encrypted with key B.<br />
EEFF Features<br />
• Centralized management — Provides support <strong>for</strong> deploying <strong>and</strong> managing <strong>McAfee</strong> <strong>Endpoint</strong><br />
<strong>Encryption</strong> <strong>for</strong> <strong>Files</strong> <strong>and</strong> <strong>Folders</strong> using ePO 4.5 <strong>and</strong> 4.6.<br />
• Windows authentication based policy en<strong>for</strong>cement — Assigns encryption policies <strong>and</strong><br />
keys to Windows user accounts.<br />
• Integration with the <strong>McAfee</strong> Tray icon - Consolidates the tray icons to one common<br />
<strong>McAfee</strong> icon.<br />
• <strong>User</strong> Personal Keys - Allow users to have individual keys, generated centrally <strong>and</strong> possible<br />
to assign in policies <strong>for</strong> encryption.<br />
• Protect data on Removable media — Provides support <strong>for</strong> removable media encryption.<br />
• Migration from EEFF v3.x to EEFF v4 - Provides support <strong>for</strong> migrating keys from EEFF<br />
v3.x to EEFF v4 by importing them into ePO.<br />
• File Extension exclusion - Excludes the listed file types from encryption. For example,<br />
MP3 <strong>and</strong> WAV files.<br />
System requirements<br />
System requirements<br />
Systems<br />
ePO Server Systems<br />
Requirements<br />
See <strong>McAfee</strong> ePolicy Orchestrator 4.5 <strong>and</strong> 4.6 - Installation <strong>Guide</strong><br />
<strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>Files</strong> <strong>and</strong> <strong>Folders</strong> software version <strong>4.0</strong>.0 <strong>User</strong> <strong>Guide</strong><br />
5