McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE User's Guide Page 58

  • Download
  • Add to my manuals
  • Print
  • Page
    / 63
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 57
Track the progress of the deployment and encryption status
The progress of the EEPC/EEMac deployment and the number of encrypted drives can be easily
determined by running the Endpoint Encryption query under Menu | Reporting | Queries | Endpoint Encryption
| EE: Disk Status. This will report the crypt state for all disks on systems that have the EEAgent installed.
Figure 7-1 Endpoint Encryption disk status
You can also find the systems that don't have the EEAgent installed by running the query Menu |
Reporting | Queries | Endpoint Encryption | EE: Encryption Provider.
Figure 7-2 EE: Encryption provider
Report encryption status from McAfee ePO
To comply with data protection regulations, IT staff must be able to produce evidence that a suitable
technical measure was in place to protect sensitive information on, for example, a missing computer.
The organization must encrypt the device and be able to prove that the device is encrypted after it is
reported lost or stolen.
High level process
7
Use ePolicy Orchestrator to report client status
Track the progress of the deployment and encryption status
58
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
Page view 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63

Comments to this Manuals

No comments