Specifications

Preface
6 |
Preface
McAfee is dedicated to providing you with the best in security for protecting data on
personal computers. Applying the latest technology, deployment and management of
users is accomplished using simple and structured administration controls.
Endpoint Encryption for Files and Folders represents a technology where we are
pleased to address the security requirements for files and folders, data in transit on
removable devices, and stored on NAS, SAN and network servers. Endpoint Encryption
for Files and Folders is the next generation of the McAfee file and folder encryption
product.
Through the continued investment in technology and the inclusions of industry
standards we are confident that our goal of keeping Endpoint Encryption at the
forefront of data security will be achieved.
About This Guide
This Guide is designed to aid corporate security administrators in the correct
implementation, configuration and deployment of Endpoint Encryption for Files and
Folders. Although this guide is complete in terms of setting up and managing Endpoint
Encryption for Files and Folders, it does not attempt to teach the topic of "Enterprise
Security" as a whole. Readers unfamiliar with Endpoint Encryption should follow the
appropriate sections of the Endpoint Encryption for Files and Folders Quick Start Guide
which walks through setting up an Endpoint Encryption enterprise before tackling any
of the topics in this guide.
This guide should be read as a companion to the Endpoint Encryption Manager
Administration Guide, which details more general topics regarding managing Endpoint
Encryption products.
Audience
This guide was designed to be used by qualified system administrators and security
managers. Knowledge of basic encryption technology, networking and routing
concepts, and a general understanding of the aims of centrally managed security is
required.
For information about cryptography topics, readers are advised to consult the following
publications:
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Bruce
Schneier, Pub. John Wiley & Sons; ISBN: 0471128457
Computer Security, Deiter Gollman, Pub. John Wiley and Sons; ISBN: 0471978442