Eeff 410 Product Guide en Us PDF
Eeff 410 Product Guide en Us PDF
Eeff 410 Product Guide en Us PDF
COPYRIGHT
Copyright 2012 McAfee, Inc. Do not copy without permission.
TRADEMARK ATTRIBUTIONS
McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others.
Product Guide
Contents
Preface
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Find product documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
5 5 5 6
Introduction
9
9 10 11 11 11 12
15
16 21 22 22 22 23 23 23 24 24 25 26 26 26 27 28
29
29 30 30 30 31 31 31
Product Guide
Contents
Import the encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 How user personal keys work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Working with user personal keys . . . . . . . . . . . . . . . . . . . . . . . . 33
35
35 36 37 37
39
Create permission sets for user accounts . . . . . . . . . . . . . . . . . . . . . . . . 39 Edit the EEFF policy permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Edit the EEFF key server permissions . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Additional Information
Uninstalling EEFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstall EEFF from managed systems using McAfee ePO . . . . . . . . . . . . . . . Remove the EEFF extension . . . . . . . . . . . . . . . . . . . . . . . . . . Remove the EEFF software package . . . . . . . . . . . . . . . . . . . . . . . Uninstalling EEFF from managed systems . . . . . . . . . . . . . . . . . . . . . Removable media registry controls . . . . . . . . . . . . . . . . . . . . . . . . . . . Broaden the removable media definition . . . . . . . . . . . . . . . . . . . . . Exempt local drives and network shares from encryption . . . . . . . . . . . . . . . Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Key caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tune encryption intensity for network . . . . . . . . . . . . . . . . . . . . . . Explicitly encrypt large shares in advance . . . . . . . . . . . . . . . . . . . . . Exclude EEFF client program directory . . . . . . . . . . . . . . . . . . . . . .
41
41 41 42 42 43 43 43 44 44 45 45 45 45
Index
47
Product Guide
Preface
This guide provides the information you need to configure, use, and maintain your McAfee product. Contents About this guide Find product documentation
Audience
McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who use the computer where the software is running and can access some or all of its features.
Conventions
This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product.
Product Guide
Product Guide
Introduction
McAfee Endpoint Encryption for Files and Folders (EEFF) 4.1 offers data protection in the form of powerful encryption technology, so only authorized users can access information. Contents Purpose of EEFF How EEFF works Features
Purpose of EEFF
EEFF enables you to define and protect your data so that only certain users can access it. This data is stored, managed, archived, and distributed, and can be viewed only by authorized users. This protection depends on Microsoft Windows user accounts and works in realtime to authenticate the user, to access the encryption keys, and to retrieve the correct policy in EEFF. A smart card implementation based on Windows logon provides for enhanced security.
Product Guide
Introduction Features
When a user attempts to deviate from the assigned encryption policy by stopping the main EEFF process (MfeffCore.exe) on the client system, the process is automatically regenerated. The automatic restart cannot be disabled. If the user manages to stop the main EEFF process on the client system, EEFF encrypts folders and files according to the policies assigned to the user. These policies are enforced by the McAfee ePO server. When a file that is encrypted with key A is moved to a folder where the files encrypted with key B are available, the file that is encrypted with key A is instantly reencrypted with key B. This process is known as followtargetencryption; it requires that the user or process transferring the file have access to both key A and key B.
Features
These are the key features of EEFF. Centralized management Provides support for deploying and managing EEFF using McAfee ePO software 4.6 (minimum Patch 2). Windows authenticationbased policy enforcement Assigns encryption policies and keys to Windows user accounts. Integration with the McAfee tray icon Consolidates the tray icons into one common McAfee icon. User Personal Key Allows users to have individual encryption keys that are generated from the McAfee ePO server, which the administrator can assign to policies to enable encryption. Protect data on removable media Removable media encryption, including the ability to access encrypted content in systems where EEFF is not installed. Network encryption Enables secure sharing and collaboration on Network Shares. User initiated encryption of files and email attachments Allows users to create and attach passwordencrypted executable files that can be decrypted on systems where EEFF is not installed. Migration from EEFF v3.x to EEFF 4.1.0 Migrating encryption keys from the previous version of the product to the current version, by importing them into the McAfee ePO server.
Product Guide
The McAfee ePO server provides a scalable platform for centralized policy management and enforcement of EEFF on the managed nodes. It also provides comprehensive reporting and product deployment capabilities, all through a single point of control. The EEFF software packages and extensions need to be checked into the McAfee ePO server before you can deploy the software and configure the policies.
This guide does not provide detailed information about installing or using McAfee ePO. For more details, refer to the ePolicy Orchestrator product documentation.
Contents System requirements Check in the EEFF software package Install the EEFF extension Install the Help extension Register Windows Active Directory Deploy EEFF to managed systems
System requirements
Make sure that your client and server systems meet these requirements. Table 2-1 System requirements Systems McAfee ePOserver systems Client systems Requirements See the McAfee ePO product documentation. CPU: 1 GHz or faster RAM: 1 gigabyte (GB) RAM (32bit) or 2 GB RAM (64bit) Hard disk: 50 MB minimum free disk space TCP/IP network connection
Product Guide
Table 2-2 Software requirements Software (or package name) McAfee management software Requirements McAfee ePolicy Orchestrator 4.6 (minimum Patch 2) McAfee Agent for Windows 4.6 (minimum Patch 2) Endpoint Encryption for Files and Folders EEFF extension EEFFextension4.1.0_xxx.ZIP help_eeff_410.ZIP MfeEEFF_Client_4.1.0.x.ZIP Microsoft Windows Installer 3.0 Redistributable package (for ePO) Microsoft .NET Framework 2.0 Redistributable package (for ePO) Microsoft MSXML 6 (for ePO) Table 2-3 Operating system requirements Systems McAfee ePO server systems Client systems Software See the McAfee ePO product documentation. Microsoft Windows Vista (Business, Ultimate, or Enterprise) SP 2 (32bit only) Microsoft Windows XP Professional, SP 3 (32bit only) Microsoft Windows 7 (Professional, Ultimate, or Enterprise), SP 1 (32bit and 64bit) See the McAfee ePO product documentation. See the McAfee ePO product documentation. See the McAfee ePO product documentation.
10
Product Guide
Product Guide
11
6 7
Enter the Password and confirm it. Click Test Connection to verify that the connection to the server works, then click Save.
Click Save. Click Menu | Systems | System Tree | Assigned Client Tasks, then select the required group in the System Tree. Select the Preset filter as Product Deployment (McAfee Agent). Each assigned client task per selected category appears in the details pane.
6 7
Click Actions | New Client Task Assignment. The Client Task Assignment Builder wizard appears. Set these options: a b On the Select Task page, select as McAfee Agent as Productand Product Deployment as Task Type, then select the task you created for deploying the product. Next to Tags, select the appropriate option, then click Next: c Send this task to all computers Send this task to only computers that have the following criteria Use one of the edit links to configure the criteria.
On the Schedule page, select whether the schedule is enabled, specify the schedule details, then click Next.
12
Product Guide
At the next agentserver communication, the task runs and EEFF is deployed on the managed systems.
Product Guide
13
14
Product Guide
A policy is a collection of settings that you create, configure, and enforce. Policies make sure that the managed security software products are configured and perform correctly. The McAfee ePO console enables you to configure policy settings for all products and systems from a central location. For each managed product or component, you can choose whether the agent enforces all or none of its policy selections. You can view policy assignments, where they are applied, and if they are enforced. You can also lock policy enforcement to prevent changes to enforcement. Refer to the McAfee ePolicy Orchestrator product documentation for details on policy creation and management. Contents EEFF policy settings Create a policy Edit the EEFF policy settings Assigning policies to a system or a system group Enforce EEFF policies on a system Enforce EEFF policies on a system group How policy assignment rules work How multi-slot policies work
Product Guide
15
Policy categories
Category General Description Explorer Integration Specifies the context menu options available to a user on the client system. Allow Explicit Encrypt Enables the Encrypt option for client system users. Default value is disabled. Allow Explicit Decrypt Enables the Decrypt option for client system users. Default value is disabled. Enable padlock icon visibility Displays a padlock icon on encrypted objects. Default value is enabled. Enable search encrypted Enables Search encrypted option for client system users. Default value is disabled. Allow creation of SelfExtractors Enables users to manually create encrypted SelfExtractors for files and folders. SelfExtractors are passwordprotected executable files that can be decrypted on any Windows system. Default value is enabled. This policy also enables sending SelfExtractors as CAB file attachments from the context menu. Email Integration Specifies the context menu options available to a user on the client system. Enable sending of encrypted email attachments Enables managed node users to send encrypted email attachments to internal recipients in the form of SBA files. Default value is disabled. Folder Encryption Click Add to specify folders to be encrypted. Path Specifies the path of the folder to be encrypted. Specify the path of the folder by selecting from the list or typing it in the text box. Key Specifies the encryption key to be assigned to the policy. Browse to select the key. File Encryption Click Add to specify the process and the file extensions to be encrypted. Process name Specifies the process name of the application that creates the files to be encrypted. Extensions Specifies the file extensions to be encrypted that are supported by the process. Multiple file extensions can be specified using a space, semicolon, or colon as separators. Key Specifies the encryption key to be assigned to the policy. Browse to select the key.
16
Product Guide
Description Encryption Method Specifies methods used to encrypt a removable media. Use no removable media encryption Does not encrypt files on removable media. Default value is disabled. When selected, context menu options are enabled on the client system. Use regular encryption Encrypts files and folders on removable media with the specified key. Browse to select the key. Default value is disabled. Ignore existing content Does not encrypt existing files on removable media. Use McAfee Endpoint Encryption for Removable Media (EERM) Specifies options to encrypt removable media. Protected area Specifies options to configure encrypted area on a removable media. Entire device Encrypts the entire removable media. This option can be restricted based on device size by selecting Except when device is greater than, setting the maximum device size (in GB; default value is 64 GB), then specifying the required action: Select Do not encrypt to exclude devices greater than the specified size from encryption. Select User Managed to allow the user to decide the percentage of the removable media to encrypt. User Managed Prompts the user to decide the percentage of the removable media to encrypt. Recovery Methods Specifies methods used to recover the EERM encrypted removable media. Use recovery key Specifies the Regular or User Personal key that can be used to recover the encrypted removable media. Allow recovery password Enables the user to specify a password during initialization that can be used to recover the encrypted removable media. Select Mandatory to require the user to specify a recovery password during initialization. Allow user certificate Enables the user to attach a Windows certificate during initialization that can be used to recover the encrypted removable media. Select Mandatory to require the user to attach a certificate during initialization. Options Specifies general encryption options for the removable media. Make unprotected files and folders readonly (on a client machine with EEFF installed) Does not allow the user to modify unprotected files and folders on the device when used on a system where the EEFF client is installed. Customize UI Text displayed on Inserting Media The message to be displayed to an end user upon inserting a removable media into an EEFF client with EERM enabled. This text is
Product Guide
17
Category
Description customizable, and limited to 300 characters. If left blank, the default message is shown. Floppy Disk Drives Specifies encryption options for floppy disks. Make floppy disk drives readonly Does not allow the user to modify files and folders on floppy disk drives. Exempt device IDs Does not update the specified devices with the changes in encryption policies. Add Adds the ID of the device that will not be updated with the changes in encryption policies. Remove Removes the device ID from the exemption list. Edit Edits the ID of the device that will not be updated with the changes in encryption policies.
CD/DVD Encryption
None Selected Does not encrypt while burning files and folders to a CD or DVD. Users can encrypt or decrypt files or folders using the context menu on the client system, if required. Enforce encryption on CD/DVD write operations Encrypts files and folders while burning them to a CD or DVD with the selected key. Encrypt and Decrypt options in the context menu are disabled on the client system. Disable CD/DVD Write Operations Does not allow the user to write any files or folders on CD or DVD.
18
Product Guide
Description Encryption Options Preserve file times Does not change the file modified and accessed time on encryption or decryption. Require authentication for listing of encrypted folders Blocks unauthorized users from browsing encrypted folders. In an EEFF installed system, if the key used to encrypt a folder is not assigned to the user, then the user cannot view the content of that folder. If the key is assigned to the user, then the user can view the content of folders that is encrypted with that key. Use wiping when encrypting and deleting files Uses a secure delete algorithm when encrypting files to ensure that no trace of the plaintext data remains on the client system.
File wiping might slow down encrypted file operations due to the additional disk operations required.
Enable limiting of the file size that will be encrypted Encrypts only if the file size is less than the specified limit. Default value is 20 MB.
This is applicable only if the folder is encrypted using Folder Encryption policy.
I/O Utilization Maximum I/O utilization Specifies the percentage of I/O usage that EEFF processes can utilize during encryption. Blocked Processes Blocks the specified processes from opening or editing encrypted files. EEFF blocks a process by withholding the keys required to decrypt the files. Add Adds the process to the block list to prevent the user running it to open or edit encrypted files. Remove Removes the process from the block list to allow the user accessing edit encrypted files. Edit Edits the process in the block list that is already an added process. Key Request Exclusion Enables the process (such as antivirus) to exclude encrypted files if it does not have access to the required encryption key.
All the keys assigned to the user through policy are unloaded every time the user logs off.
Add Adds the process that is to be excluded. Remove Removes the process from the exclusion list. Edit Edits the process that is to be excluded. File Extension Exclusion Excludes the specified file extension from encryption. Add Adds the file extension that is to be excluded. Remove Removes the file extension from the exclusion list. Edit Edits file extension that is to be excluded. Grant Keys (Multislot policy) Available Keys Lists all active keys, which includes regular and user personal keys. Selected Keys Specifies the keys that the policy grants when assigned to users.
Product Guide
19
Category Network
Description Enable network encryption Enables encryption of files on network locations. Enable network bandwidth limit Limits the network bandwidth used by EEFF when encrypting files on network locations. Default value is 50 KB/sec. Disable encryption on slow connections Does not encrypt files on network locations if the network latency is above the specified limit. Default value is 500 milliseconds.
This option is applicable only if the file is being encrypted through policy enforcement.
Maximum clients allowed to encrypt folders Specifies the maximum number of users who can simultaneously encrypt folders on a network.
This option is applicable only if the file is being encrypted through policy enforcement.
20
Product Guide
Description Allow user local keys Allows users to create local keys on a client system using EEFF client. These user local keys can be shared among users using the Export and Import options in EEFF client. Recovery Key Specifies a Regular or a User Personal Key which can be used to recover user local keys. Allow user local key generation Allows users to create local keys on a client system using EEFF client. Allow export of user local keys Allows users to export local keys from a client system using EEFF client. Allow import of user local keys Allows users to import local keys to a client system using EEFF client. Allow deletion of user local keys Allows users to delete local keys from a client system using EEFF client. Automatically create a user local key Creates a default user local key when a new user logs on to the client system.
Password Rules
Password Complexity Configuration for Removable Encryption, Selfextractors & User Local Keys Defines the password policy rules for SelfExtractors, User Local Keys, and EERM in the EEFF client. If the password does not conform to a policy, an error message is displayed in the EEFF client detailing the reason and prompting the user to try again. In addition to the password complexity checks, when a password is changed for EERM and User Local Keys, the new password is checked against the user's last password to prevent duplication. Minimum Password Length Specifies the minimum number of characters that must be included in a password (from 440). Default value is 7. Minimum Lowercase Characters Specifies the minimum number of lowercase letters that must be included in a password (from 015). Default value is 0. Minimum Uppercase Characters Specifies the minimum number of uppercase (capital) letters that must be included in a password (from 015). Default value is 0. Minimum Alphabetical Characters Specifies the minimum number of letters that must be included in a password (from 015). Default value is 5. Minimum Numeric Characters Specifies the minimum number of numeric characters (digits) that must be included in a password (from 015). Default value is 1. Minimum Special Characters Specifies the minimum number of special characters that must be included in a password (from 015). Default value is 1.
All password policies are systembased. In addition to the above complexity checks, internal checks are performed on all passwords to verify that they do not contain more than two consecutive characters of the user name, do not match the full account name, and do not contain any spaces.
Create a policy
You can create a new policy from the Policy Catalog. By default, policies that are created using the Policy Catalog are not assigned to any groups or systems. You can create policies before or after the EEFF software is deployed.
Product Guide
21
Task 1 Click Menu | Policy | Policy Catalog, select Endpoint Encryption for Files and Folders 4.1.0.x as Product, then select a policy Category from the dropdown list. All created policies for the selected category appear in the details pane. Click Actions | New Policy. Select the policy you want to duplicate from the Create a policy based on this existing policy dropdown list. Enter a name for the new policy and click OK. The Policy Settings wizard opens. Edit the policy settings on each tab as needed. Click Save.
2 3 4 5 6
22
Product Guide
5 6
If the policy is inherited, select Break inheritance and assign the policy and settings below next to Inherit from. From the Assigned policy dropdown list, select the policy. From this location, you can edit the selected policy or create a new policy.
Select whether to lock policy inheritance. Locking policy inheritance prevents any systems that inherit this policy from having another one assigned in its place.
Product Guide
23
Task 1 2 3 4 5 Click Menu | Systems | System Tree | Assigned Policies, then select the group in the System Tree. From the Product dropdown list, select Endpoint Encryption for Files and Folders, then click Enforcing next to Enforcement Status. To change the enforcement status, select Break inheritance and assign the policy and settings below. Select Enforcing or Not enforcing accordingly as Enforcement status. Select whether to lock policy inheritance. Locking inheritance for policy enforcement prevents breaking enforcement for groups and systems that inherit this policy. 6 Click Save.
Policy assignment rules reduce the overhead of managing numerous policies for individual users, while maintaining generic policies across your System Tree. For example, you can create a policy assignment rule that is enforced for all users in your engineering group. You can then create another policy assignment rule for members of your IT department so they can log on to any computer in the engineering network with the access rights they need to troubleshoot problems on a specific system in that network. This level of granularity in policy assignment limits the instances of broken inheritance in the System Tree.
Multislot policies are used when a policy setting needs to be shared among users or system groups. Rule priority is not considered for multislot policies. A Grant Key policy is a multislot policy.
24
Product Guide
If a single rule containing multislot policies of the same product category is applied to a user, all settings of the multislot policies are combined. Similarly, if multiple rules applied to a user contain multislot policy settings, all settings from each multislot policy are combined.
As a result, the user gets a policy that combines the settings of each individual rule. For example, consider the example where a user is included in two policy assignment rules with different assigned priorities. When these rules consist of multislot policy assignments, the settings for both policies are applied without regard to priority. You can prevent application of combined settings from multislot policies across multiple policy assignment rules by excluding a user (or other Active Directory objects such as a group or organizational unit) when creating the policy assignment rule.
Task 1 2 3 4 Click Menu | Policy | Policy Assignment Rules | Actions | New Assignment Rule. The Details page of the Policy Assignment Builder wizard appears. Enter the name and description in the designated fields, then click Next. In the Selection Criteria page, select the users by selecting the relevant criteria, then click Next. In the Assigned Policies page, click Add. The Choose a policy to assign dialog box appears.
You can add more than one Grant Key policy.
Set these options: a b c From the Product dropdown list, select Endpoint Encryption for Files for Folders. From the Category dropdown list, select Grant Keys. From the Policy dropdown list, select the policy.
6 7
Product Guide
25
Assign multiple instances of Grant Key policy through the System Tree
You can use the System Tree to assign multiple instances of a Grant Key policy to a system. Task 1 2 3 4 5 Click Menu | Systems | System Tree | Assigned Policies | Product | Endpoint Encryption for Files and Folders. Each assigned policy per category appears in the details pane. Locate the Grant Key policy category, then click Edit Assignment. The Policy Assignment page appears. Click New Policy Instance. The new policy instance is added in the Policy Assignment page. If the policy is inherited, select Break inheritance and assign the policy and settings below next to Inherited from. From the Assigned policy dropdown list, select the Grant Key policy.
From this location, you can also edit the selected policys settings, or create a new policy.
Select whether to lock policy inheritance. . Locking policy inheritance prevents any systems that inherit this policy from having another one assigned in its place.
Click Save.
Task 1 2 3 4 Click Menu | Policy | Policy Assignment Rules | Actions | New Assignment Rule. The Details page of the Policy Assignment Builder wizard appears. Enter the name and description in the designated fields. Select System Based as the Rule Type, then click Next. The Assigned Policies page appears. Click Add Policy to select the policies that you want to enforce using this policy assignment rule.
26
Product Guide
Set these options: a b c From the Product dropdown list, select Endpoint Encryption for Files for Folders. From the Category dropdown list, select Grant Keys. From the Policy dropdown list, select the policy, then click OK.
6 7 8
Click Next. In the Selection Criteria page, select the users by selecting the relevant criteria, then click Next. In the Summary page, click Save.
Task 1 2 3 4 5 Click Menu | Policy | Policy Assignment Rules | Actions | New Assignment Rule. The Details page of the Policy Assignment Builder wizard appears. Enter the name and description in the designated fields. Select the Rule Type as User Based, then click Next. The Assigned Policies page appears. Click Add Policy to select the policies that you want to be enforced by this policy assignment rule. Set these options: a b c 6 7 8 From the Product dropdown list, select Endpoint Encryption for Files for Folders. From the Category dropdown list, select Grant Keys. From the Policy dropdown list, select the policy, then click OK.
Click Next. In the Selection Criteria page, select the users by selecting the relevant criteria, then click Next. In the Summary page, click Save.
Product Guide
27
28
Product Guide
EEFF uses encryption keys to protect files and folders on networks, removable media, CDs or DVDs, and user hard disks. Encryption keys are generated and stored in an internal encryption key repository within the McAfee ePO environment. Contents Encryption keys Create an encryption key Activate or deactivate the encryption keys Assign the encryption keys to a policy Edit an encryption key Delete an encryption key Export the encryption keys Import the encryption keys How user personal keys work
Encryption keys
The EEFF client requests an encryption key when a user accesses an encrypted file or a folder. If a policy is assigned to the user with the requested encryption key, EEFF decrypts the data. An administrator can create and manage encryption keys from McAfee ePO under the EEFF keys tab. These keys are assigned to policies that are later assigned to users or systems. All keys assigned through the policy are loaded at every log on and unloaded every time the user logs off.
Key types
EEFF supports three types of encryption keys:
Product Guide
29
Regular keys Created by McAfee ePO administrators and can be used in any policy. User personal keys Generated in McAfee ePO when a key is granted to a user through the Grant Key policy. When assigned to a user, these policies enable the user to use the key across all the client systems in the same domain. User Local keys Created using EEFF client software on a client system. These keys can be used by the user to encrypt or decrypt data on the same network using the context menu. A Local key is limited to the user and client system on which it was created.
30
Product Guide
Task 1 2 3 4 Click Menu | Policy | Policy Catalog | Product | Endpoint Encryption for Files and Folders 4.1.0 | Category | Grant Keys (UBP). All the Grant Key policies appear in the details pane. Click Edit Settings next to the required Grant Key policy. The selected Grant Key policy page appears with the list of active keys in the Available Keys pane. Select and move the required keys to the Selected Keys pane. Click Save, then send an agent wakeup call.
Task 1 2 3 Click Menu | Data Protection | EEFF keys. The EEFF Key Management page appears. Select the keys to delete, then click Actions | Delete Key(s). The Delete Key(s) dialog box appears. Click OK.
The keys are deleted and any files encrypted with those keys are no longer accessible.
Product Guide
31
3 4 5
Enter and confirm the password to be used to protect the exported file, then click OK to open the Export Keys for EEFF page. Click the .bin or .xml file, and save it to the required location. Click Close.
The selected keys are saved in a passwordprotected .bin file in the specified location.
Best practice
By assigning a user personal key as a recovery key for EERM, the administrator can make sure that the removable media can be recovered only by the assigned user on any system in the same domain.
32
Product Guide
Edit the EEFF policy settings to include user personal keys: a b c Click Menu | Policy | Policy Catalog | Product | Endpoint Encryption for Files and Folders. Select Grant Keys (UBP) as policy Category, then click Edit Settings next to the required policy. Select and move the User Personal Key to Selected Keys table, then click Save.
3 4 5 6 7 8 9
Click Menu | Policy | Policy Assignment Rules | New Assignment Rule. The Policy Assignment Builder wizard appears. Enter the name and description in the designated fields, then click Next to open the Selection Criteria page. Select the user by selecting the relevant criteria, then click Next to open the Assigned Policies page. Click Add. The Choose a policy to assign dialog box appears. From the Product dropdown list, select Endpoint Encryption for Files for Folders. From the Category dropdown list, select Grant Keys. From the Policy dropdown list, select the required policy, then click OK.
10 In the Summary page, click Save. After assigning the Grant Key policy to the user, a user personal key is generated when the user logs on to the client system.
Product Guide
33
34
Product Guide
The McAfee ePO server ships with its own querying and reporting capabilities. These are highly customizable, flexible, and easy to use. EEFF reports are based on configurable EEFF queries, and can be displayed and exported in several formats. Contents EEFF queries and query results Create EEFF custom queries View standard EEFF queries EEFF client events
Exported results
Query results can be exported in four different formats. Exported results are historical data and are not refreshed like other monitors when used as dashboard monitors. Like query results and querybased monitors displayed in the console, you can drill down into the HTML exports for more detailed information. Unlike query results in the console, data in exported reports is not actionable.
Product Guide
35
Reports are available in these formats: CSV Use the data in a spreadsheet application (for example, Microsoft Excel). XML Transform the data for other purposes. HTML View the exported results as a web page. PDF Print the results.
Select properties to narrow the search results, then click Run. The Unsaved Query page displays the results of the query, which is actionable, so you can take any available actions on items in any tables or drilldown tables. Selected properties appear in the content pane with operators that can specify criteria used to narrow the data that is returned for that property. If the query does not appear to return the expected results, click Edit Query to go back to the Query Builder and edit the details of this query. If you do not need to save the query, click Close. If this is a query you want to use again, click Save and continue to the next step.
On the Save Query page, enter a name for the query, add any notes, and select one of these options: New Group Enter the new group name and select either: Private group (My Groups) Public group (Shared Groups)
Existing Group Select the group from the list of Shared Groups.
Click Save.
36
Product Guide
Description Displays the number of active and inactive keys. Displays the available keys, their policy category, and the policy in which they are used. Displays the protection status of removable media. Lists all events related to removable media.
Product Guide
37
Table 5-2
Event details
Information type Description Event ID System Event ID number User information (DomainName, UserName) Timestamp Agent GUID Initialization Initialization state (Failed, Cancelled, Successful) Backup state (None, Failed, Cancelled, Successful) Time taken for initialization (in msec) Time taken for backup (in msec) Backup size (in Bytes) Size of protected part (only when initialization has completed successfully, in bytes) Device Size (in bytes) File system of device (FAT, NTFS, EERM) Vendor name Product name Exempted (Yes, No, Unknown) Protected (Yes, No, Unknown) (only EERM drives are considered protected) Event specific fields User response Valid for events 20501 and 20502 only
Only relevant information is captured in each event. For example, a Device Insert Event does not contain Initialization State.
38
Product Guide
In the McAfee ePO server, administrator rights management determines what McAfee ePO users can perform while administrating EEFF. A permission set is a group of permissions that can be granted to users or Active Directory (AD) groups by assigning it to those users accounts. One or more permission sets can be assigned to users, who are not global administrators (global administrators have all permissions to all products and features). User accounts and their associated permission sets in the McAfee ePO server define the tasks that the users can perform. This allows you to restrict specific users or groups from misusing EEFF features. Contents Create permission sets for user accounts Edit the EEFF policy permissions Edit the EEFF key server permissions
Product Guide
39
Defining EEFF permission sets for McAfee ePO users Edit the EEFF policy permissions
The updated permissions are applied to users and Active Directory groups assigned to this permission set.
40
Product Guide
Additional Information
This additional information is provided for your reference. Contents Uninstalling EEFF Removable media registry controls Best practices
Uninstalling EEFF
You can uninstall EEFF from managed systems and from the McAfee ePO server. Contents Uninstall EEFF from managed systems using McAfee ePO Remove the EEFF extension Remove the EEFF software package Uninstalling EEFF from managed systems
Task 1 2 Click Menu | Policy | Client Task Catalog, select McAfee Agent | Product Deployment as Client Task Types, then click Actions | New Task. Set these options for the new task: a b c d e f g Make sure that Product Deployment is selected, then click OK In the Name field, enter the name for the task. From the Target Platforms dropdown list, select Windows. From the Products and components dropdown list, select McAfee Endpoint Encryption for Files and Folders. As the Action, select Remove. Select an appropriate Language. Next to Options, specify if you want to run this task for every policy enforcement process (Windows only).
Product Guide
41
3 4 5
Click Save. Click Menu | Systems | System Tree | Assigned Client Tasks, then select the required group in the System Tree. Select the Preset filter as Product Deployment (McAfee Agent). Each assigned client task per selected category appears in the details pane.
6 7
Click Actions | New Client Task Assignment. The Client Task Assignment Builder wizard appears. Set these options: a b On the Select Task page, select as McAfee Agent as Product and Product Deployment as Task Type, then select the task you created for deploying the product. Next to Tags, select the appropriate option, then click Next: c Send this task to all computers Send this task to only computers that have the following criteria Use one of the edit links to configure the criteria.
On the Schedule page, select whether the schedule is enabled, specify the schedule details, then click Next.
42
Product Guide
By default, McAfee EEFF msi is available in this location: [LOCAL APPDATA]\McAfee\Common Framework\Current\EEFF_4000\Install\0000 where [LOCAL APPDATA] depends on your operating system: 2 Windows XP and Windows 2003 C:\Document and Settings\All Users Windows Vista, Windows 2008, and Windows 7 C:\ProgramData
Run the following commands to uninstall EEFF: msiexec /q /norestart /I eeff[XX].msi msiexec /q /x eeff[XX].msi
[XX] 32 for 32bit operating systems and 64 for 64bit operating systems You are prompted to restart the system after uninstalling the software .
Product Guide
43
definition is broadened by adding a registry value on the client computer. In EEFF 4.1, the value is configured by default to 1. Task 1 On the client system, create a DWORD registry value in HKLM\System\CurrentControlSet \Services\MfeEEFF called RelaxedRemovableMediaDefinition. Set the registry value as required. 0 Default definition (same as not having this registry value) 1 Only disks reported as 'Removable' or located on the USB or IEEE 1394 (FireWire) port 2 Only disks reported as 'Removable'
It fails to encrypt the file on the local drive, but encrypts the same file on a removable drive. This registry value must be manually set on each client system. It can also be remotely distributed with a systems management tool. When enabled, it is not possible to read (decrypt) any existing encrypted files on local drives or network shares.
Best practices
These best practice recommendations are for largescale deployments of EEFF. Consult your Endpoint Encryption representative if you have special considerations for your environment. The definition of a largescale installation is any deployment with 1000 users and above. Contents Key caching Tune encryption intensity for network Explicitly encrypt large shares in advance Exclude EEFF client program directory
44
Product Guide
Key caching
Try to make use of the encryption key caching feature. This might not be possible due to security reasons. However, considering this option for any encryption key created will help reduce the communication payload on the McAfee Agent to McAfee ePO.
You can limit the size of the files to be encrypted (Set in the Encryption options policy).
Product Guide
45
46
Product Guide
Index
A
about this guide 5 assign policy grant key 30
B
best practices 44 exclusion of EEFF client program directory 45 explicit encryption of large shares 45 key caching 45 tune encryption intensity 45 break inheritance 26
C
client program directory 45 conventions and icons used in this guide 5 custom queries 36
EEFF policies assign to managed system 22 creating from Policy Catalog 21 editing, from Policy Catalog 22 enforcing on a system 23 enforcing on a system group 23 effective policy system 27 user 28 encryption keys activating and deactivating 30 creating 30 deleting 31 editing 31 exporting 31 importing 32 encryption keys, about 29 encryption, persistent 7 enforcement (See policy enforcement) 23 exclusion of EEFF client program directory 45 explicit encryption of large shares 45 extension, EEFF help 11 installing 11 removing from ePO 42
D
deployment installing products 12 DNS settings 11 documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5
G
Grant Key multi-slot policy 26, 27 view effective 27 Grant Key policy assign multiple instances 27 assign personal key to user 33 assigning keys 30 assigning multiple instances to systems 26 assigning to systems 26 personal keys 32 view effective policy 28 groups policy enforcement for a product 23
E
EEFF client 7 deploy on managed systems 12 encryption keys 29 features 8 help extension 11 how it works 7 installation 11 purpose 7 remove from managed systems 41 reports 35 uninstall from managed systems, using MSI 43 uninstall from managed systems, using Shell command 43
H
Help extension 11
Product Guide
47
Index
I
installation, EEFF product extension 11
K
key caching 45 key server permissions 40 keys activating 30 assigning to policy 30 creating 30 deactivating 30 deleting 31 editing 31 exporting 31 importing 32 regular 29 user local 29 user personal 29 user personal, assign 33
L
LDAP servers, registering 11 local keys 29
M
managed systems assign policy to 23 assigning EEFF policy 22 deploy EEFF on 12 policy management on 16 uninstall EEFF 41 uninstall EEFF, using MSI 43 uninstall EEFF, using Shell command 43 master repositories checking in packages 10 McAfee ServicePortal, accessing 6 MSI, using to uninstall EEFF 43 multi-slot policy 24 Grant Key 26 multiple instance policy assigning to system 26 assigning to systems 26 assigning to users 27
permission sets 39 (continued) EEFF policy 40 persistent encryption 7 personal keys 29 policies about 16 assigning to system groups 23 assigning to systems 22 create on Policy Catalog page 21 editing, from Policy Catalog 22 EEFF, configuring 15 enforcement 15 multi-slot 26 viewing 16 policy assignment rules about 24 create 25 multi-slot policy 24 priority 24 Policy Catalog creating EEFF policies 21 editing EEFF policies 22 page, viewing 16 policy categories CD/DVD encryption 16 file encryption 16 folder encryption 16 general 16 password rules 16 removable media 16 policy enforcement enabling and disabling 23 for a product 23 policy inheritance, lock 22 product installation configuring deployment tasks 12
Q
queries about 35 custom, creating 36 exported results 35 view result 37 Query Builder wizard creating custom queries 36
O
operating system requirements 9
R
recovery of user personal keys 33 registered servers LDAP servers, adding 11 regular keys 29 creating 30 removable media broaden the definition 43
P
password rules 16 permission sets 39 about 39 EEFF key management 40
48
Product Guide
Index
removable media (continued) exempt local drives from encryption 44 registry controls 43, 44 reports about 35 formats 35 viewing 37 requirements operating system 9 software 9 system 9 rules policy assignment, creating 25 priority 24
system groups policy enforcement 23 system requirements 9 systems assigning policies to 22, 23 policy enforcement for a product 23
T
Technical Support, finding product information 6 tune encryption intensity 45
U
user accounts permission sets 39 user personal keys about 32 best practices 32 create 33 enable 33 Grant Key 32 recover 33
S
servers ePO 11 LDAP servers, registering 11 ServicePortal, finding product documentation 6 Shell command, using to uninstall EEFF 43 software package remove 42 software packages check in 10 software requirements 9
W
Windows Active Directory 11
Product Guide
49
00