McAfeeEndpointEncryptionforPC-5.2.12AdministrationGuideCOPYRIGHTCopyright©2012McAfee,Inc.AllRightsReserved.Nopartofthispublicationmaybereproduced,transmitted,transcribed,storedinaretrievalsystem,ortranslatedintoanylanguageinanyformorbyanymeanswithoutthewrittenpermissionofMcAfee,Inc.,oritssuppliersoraffiliatecompanies.TRADEMARKATTRIBUTIONSAVERT,EPO,EPOLICYORCHESTRATOR,FOUNDSTONE,GROUPSHIELD,INTRUSHIELD,LINUXSHIELD,MAX(MCAFEESECURITYALLIANCEEXCHANGE),MCAFEE,NETSHIELD,PORTALSHIELD,PREVENTSYS,SECURITYALLIANCE,SITEADVISOR,TOTALPROTECTION,VIRUSSCAN,WEBSHIELDareregisteredtrademarksortrademarksofMcAfee,Inc.and/oritsaffiliatesintheUSand/orothercountries.McAfeeRedinconnectionwithsecurityisdistinctiveofMcAfeebrandproducts.Allotherregisteredandunregisteredtrademarkshereinarethesolepropertyoftheirrespectiveowners.LICENSEINFORMATIONLicenseAgreementNOTICETOALLUSERS:CAREFULLYREADTHEAPPROPRIATELEGALAGREEMENTCORRESPONDINGTOTHELICENSEYOUPURCHASED,WHICHSETSFORTHTHEGENERALTERMSANDCONDITIONSFORTHEUSEOFTHELICENSEDSOFTWARE.IFYOUDONOTKNOWWHICHTYPEOFLICENSEYOUHAVEACQUIRED,PLEASECONSULTTHESALESANDOTHERRELATEDLICENSEGRANTORPURCHASEORDERDOCUMENTSTHATACCOMPANYYOURSOFTWAREPACKAGINGORTHATYOUHAVERECEIVEDSEPARATELYASPARTOFTHEPURCHASE(ASABOOKLET,AFILEONTHEPRODUCTCD,ORAFILEAVAILABLEONTHEWEBSITEFROMWHICHYOUDOWNLOADEDTHESOFTWAREPACKAGE).IFYOUDONOTAGREETOALLOFTHETERMSSETFORTHINTHEAGREEMENT,DONOTINSTALLTHESOFTWARE.IFAPPLICABLE,YOUMAYRETURNTHEPRODUCTTOMCAFEEORTHEPLACEOFPURCHASEFORAFULLREFUND.McAfeeEndpointEncryptionforPC—5.2.122ContentsIntroducingMcAfeeEndpointEncryption...............................................7WhatisMcAfeeEndpointEncryptionforPC.....................................................7HowMcAfeeEndpointEncryptionforPCworks..................................................8EndpointEncryptionproductcomponents.......................................................8EndpointEncryptionforPCfeatures..........................................................10Aboutthisguide..........................................................................10Conventions..............................................................................10Findingproductdocumentation..............................................................11Requirements............................................................................11InstallingEndpointEncryptionManager...............................................13InstallEndpointEncryptionManager..........................................................13EEPCuserpolicies........................................................................14Useradministrationfunctions................................................................14Userconfigurationoptions..................................................................15UsingtokenswithEEPC..................................................................18SupportedSmartCardsandtokens...........................................................18Generaltokenoperation....................................................................18Storedvaluetokens.......................................................................19Certificate,orcryptonlytokens..............................................................19Othertypesoftoken.......................................................................20Tokencompatibility........................................................................21Specifictokennotes.......................................................................21SonyPuppyfingerprintreader...............................................................23SettinguptheSonyPuppyfingerprintreader............................................24EndpointEncryptionforPCsetup.....................................................24InstallingEndpointEncryptionwithPuppysupport.......................................24AladdineToken64KB......................................................................25SafeNetIKEY2032........................................................................25UsingEndpointEncryptionPhantomUSBbiometrickey..........................................25UsingUpekfingerprintreader...............................................................263McAfeeEndpointEncryptionforPC—5.2.12Creatingandconfiguringsystems......................................................27Machineadministrationfunctions(right-clickmenu).............................................27Machineconfigurationoptions...............................................................29Filegroupsandmanagement............................................................40EndpointEncryptionfilegroups..............................................................40Settingfilegroupfunctions.................................................................41Importingnewfiles........................................................................42Exportingfiles............................................................................42Deletingfiles...........................