Windows OS Refresh Process Guide for MBR Systems
|
|
- Marjory Strickland
- 6 years ago
- Views:
Transcription
1 McAfee Drive Encryption 7.x Windows OS Refresh Process Guide for MBR Systems Revision B Last updated: 13 April 2018 Contents Disclaimer Introduction Planning the refresh process Creating the Task Sequence Disclaimer The information contained in this document is subject to change without notice. MCAFEE, LLC MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. McAfee shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. McAfee reserves the right to add, subtract or modify features or functionality, or modify the product, at its sole discretion, without notice. McAfee makes no commitment, implied or otherwise, to support any functionality or technology discussed or referenced in this document 1
2 Introduction The McAfee Drive Encryption product provides full disk encryption for enterprises. Purpose and scope The purpose of this document is to provide a recommended process for refreshing systems running Windows operating systems in Master Boot Record (MBR) mode only, which are encrypted with McAfee Drive Encryption 7.x. The purpose of the process described in this document is to refresh the Windows operating system without the need of decrypting the hard drive and uninstalling McAfee Drive Encryption. In this guide, OS Refresh is referred to as the process whereby the disk hosting the operating system is cleared and a new operating system installed by laying an image using a tool that works at file level and not at sector level. The process and utilities provided address the common problems occurring, whilst maintaining the encrypted drive during OS refresh. Intended audience The intended audience for this document are IT administrators with a thorough knowledge and experience in reimaging via Microsoft System Center 2016 Configuration Manager (SCCM), Microsoft Deployment Toolkit (MDT) 6.3 and McAfee Drive Encryption 7.x. Here are the main products and features that you will need to have knowledge of: McAfee Drive Encryption administration Microsoft System Center 2016 Configuration Manager (SCCM) Microsoft Windows 10 Assessment and Deployment Kit (ADK) Microsoft Deployment Toolkit (MDT) 6.3 Understanding of MBR and PC boot process Understanding of Windows Registry Understanding of Windows command line usage Understanding of the use and purpose of Operating System drivers Requirements The minimum requirements for the server environment which hosts the Microsoft System Center Configuration Manager (SCCM) are as follows: Microsoft System Center 2016 Configuration Manager (SCCM) Microsoft Windows 10 Assessment and Deployment Kit (ADK) Microsoft Deployment Toolkit (MDT) 6.3 User State Migration Tool (USMT) McAfee Drive Encryption (DE) 7.1.x, DE 7.2.x Any images must be captured via SCCM or MDT by following Microsoft official guidelines. For more information please visit: us/library/dd744389(v=ws.10).aspx 2
3 Planning the refresh process The following section describes how to plan and prepare a refresh process for Windows operating systems. This includes describing the McAfee Drive Encryption boot process, preparation of images and requirements for the refresh process. Overview of the McAfee Drive Encryption Boot Process The following diagram shows how a system with McAfee Drive Encryption active, boots using the Master Boot Record (MBR) boot process. <diagram?> The McAfee Drive Encryption Master Boot Record replaces the standard Master Boot Record (Sector 0 of the boot disk) during activation. The McAfee Drive Encryption MBR is referred to as the EPEMBR. The control is passed to the EPEMBR following BIOS initialization and the code contained in the EPEMBR is executed. The EPEMBR contains a pointer to the first sector of a sector chain that hosts the BootCode (safeboot.rsv), which is executed straight after the EPEMBR. It also contains a pointer to the first sector of a sector chain of the Drive Encryption file system (Safeboot.fs), which hosts the Windows OS original MBR that is executed after successful authentication. It is important that the two files (Safeboot.rsv, Safeboot.fs) and the EPEMBR are maintained on the disk and are never moved at a sector level. The files are sector chains and copying the file from one place to another does not work as they are not real files. They appear in this way inside the operating system to prevent it from being moved or overwritten. Any Windows OS refresh process has to make sure that the EPEMBR and the two McAfee Drive Encryption files are maintained without being moved. In the case of the EPEMBR this is fairly straight forward as it is only contained within one sector hence taking a backup and then restoring the file by writing back to sector 0 is sufficient. However, for the two McAfee Drive Encryption files that span across multiple sectors the only way to preserve them is by using the Microsoft User Migration Tool (USMT) Hardlink feature. This new feature is used to preserve user files during upgrades without the requirement of taking copies to another media. So the same can be applied to the McAfee Drive Encryption files. When the USMT runs, it creates a second pointer to files inside a protected folder. During the refresh process, at the point where the disk is cleared, all files are deleted apart from the ones that have hard links created. Preparing the Operating System images In order to refresh an operating system, an image has to be prepared that will be laid over the encrypted disk. This can be done in a number of ways via SCCM or MDT. However, any image that is captured, which results in a WIM file, must have the McAfee Drive Encryption drivers and registry entries injected prior to the refresh process. This will allow the new system to access the disk when it tries to boot. To do this McAfee has provided an executable called EpeWinUpgradeTool.exe for 32 bit systems and the EpeWinUpgradeTool64.exe for 64 bit systems. This tool can be run from a command line with Administrator rights to inject the McAfee Drive Encryption drivers and registry amendments. Prior to running the tool extract the following files from the MfeEEPC32.msi (for 32bit systems) or the MfeEEPC64.msi (for 64bit systems): MfeEpePC.sys Mfeccde.sys MfeEpeOpal.sys Place these files within a folder located in a convenient location: 3
4 Example C:\Drivers From a command line run the following command for x64 architecture: Example EpeWinUpgradeTool64.exe inject C:\drivers C:\OSWIMFILE.wim This will inject the McAfee Drive Encryption drivers and make the necessary registry amendments in the target WIM file. Once complete, the WIM file can either be imported into the SCCM/MDT environment or have its contents re distributed to the distribution points within SCCM/MDT. Preparing the Windows PE images (Boot image) The Windows PE environment is used for installing or refreshing operating systems. The McAfee Drive Encryption driver has to be included within the Windows PE image so the encrypted drive can be accessed by the installer. If you are planning to refresh for both 32 bit and 64 bit systems, then you will require two independent PE images, one for 64 bit and one for 32 bit respectively. To do this the procedure is the same as injecting the McAfee Drive Encryption drivers and registry amendments into an Operating System WIM file. Prior to running the EpeWinUpgrade Tool extract the following files from the MfeEEPC32.msi (for 32bit systems) or the MfeEEPC64.msi (for 64bit systems). Note: The drivers are the same for both the Operating System injection and the Boot Image injection: MfeEpePC.sys Mfeccde.sys MfeEpeOpal.sys Place these files within a folder located in a convenient location. Example C:\Drivers From a command line run the following command for x64 architecture: Example EpeWinUpgradeTool64.exe inject C:\drivers C:\BOOTWIMFILE.wim This will inject the McAfee Drive Encryption drivers and make the necessary registry amendments in the target WIM file. Once complete the WIM file can either be imported into the SCCM/MDT environment or have its contents re distributed to the distribution points within SCCM/MDT. It is also required to place a copy of the EpeWinUpgradeTool into the boot image. If the image is 32 bit use the EpeWinUpgradeTool.exe if the image is 64 bit use the EpeWinUpgradeTool64.exe. Creating LockedFiles.reg To prevent the McAfee Drive Encryption files from being moved at a sector level once the Task Sequence is complete the following registry entry will need to be created and called lockedfiles.reg. Make sure the location of the SafeBoot.fs and SafeBoot.rsv in the registry file match the actual locations on disk. Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MfeEpePc\LockedFiles] "0"="C:\\SafeBoot.fs" "1"="C:\\SafeBoot.rsv 4
5 Preparing the User State Migration Tool (USMT) The user state migration tool has a number of components but the XML required to be modified is MigUser.xml. The following additions will need to be made to make sure that all required McAfee Drive Encryption Files are not moved at a sector level: <component type="documents" context="system"> <displayname>component to migrate all McAfee Drive Encryption files</displayname> <role role="data"> <rules> <include> <objectset> <pattern type="file"> C:\[SafeBoot.fs]</pattern> <pattern type="file"> C:\[Safeboot.rsv]</pattern> </objectset> </include> </rules> </role> </component> <component type="documents" context="system"> <displayname>component to migrate all McAfee Drive Encryption registry files </displayname> <role role="data"> <rules> <include> <objectset> <pattern type="file"> C:\[lockedfiles.reg] </pattern> </objectset> </include> </rules> </role> </component> Preparing the Target Machine for OS refresh The target machines will require both the EpeWinUpgrade tool and the file lockedfiles.reg to be stored locally on the PC in the root of C:\ prior to the Task Sequence being initiated. OS Refresh process overview for PC s with McAfee Drive Encryption active The main requirements for a refresh process on a system with McAfee Drive Encryption active, is to preserve the boot order of the system as well as the data files used by McAfee Drive Encryption. This can accomplished using the EpeWinUpgradeTool.exe and EpeWinUpgradeTool64.exe tools that provide several arguments to aid during the process. An overview of what is required can be broken up into the three basic phases. 1st Stage Booting on current Windows OS Shutdown McAfee Drive Encryption Agent service Capture and store the McAfee Drive Encryption MBR (EPEMBR) Make sure that the McAfee Drive Encryption files are part of the USMT XML definitions and insert a step so USMT hardlinks and preserves the required McAfee Drive Encryption files Unlock McAfee Drive Encryption files Unhide McAfee Drive Encryption files Restore EPEMBR just before the system restarts as final step 2nd Stage Booting on Windows PE Store McAfee Drive Encryption MBR (EPEMBR) as first step in the process Restore McAfee Drive Encryption MBR (EPEMBR) 5
6 3rd Stage Booting on new Windows OS Make sure that USMT runs the load state tool to restore McAfee Drive Encryption files Amend registry with LockedFiles.reg Hide McAfee Drive Encryption files EpeWinUpgradeTool Expanded A utility was developed to allow administrators to carry out the necessary steps during the OS refresh process. As previously mention in this guide the utility is called EpeWinUpgradeTool.exe (32 bit) and EpeWinUpgradeTool64.exe (64 bit). The utility can be run at the command line with administrative rights and offers the following options: -SaveMbr <filename> -SetMbr <filename> -SetFileLocks <Lock:Unlock> -Inject <Drivers Dir> <Image> -MountWim <Image> <Mount Path> -UnmountWim <Mount Path> [Save] -ForceMBR <Filename> Stores the EPEMBR to a file specified by filename Restores the EPEMBR from a file specified by filename Locks or unlocks the McAfee Drive Encryption files. Use "Lock" or "Unlock" for command Injects McAfee Drive Encryption drivers into a WIM Image Mount Image in a specified Directory Unmount the image. Update image if Save Restore MBR from file continuously 6
7 Creating the Task Sequence 1) On SCCM console goto Software Library > Operating System > Task Sequence 2) Right click and select Create Task sequence 3) Select Install an existing image package 7
8 4) Task sequence information > boot image = the boot image with MDE drivers injected 5) On Install Windows a) Image = the new OS image with MDE drivers injected b) Partition and format the target computer before installing the operating system = off c) Configure task sequence for use with BitLocker, as shown below 8
9 6) On Install configuration management client, use the default 7) On Configure state migration: a) Select a USMT package, the default one from Windows ADK 5 or above is ok b) Select Save user settings and files locally, also enable Capture locally by using link instead of by copying files 9
10 8) Complete the wizard 9) In the Software Library workspace, click Task Sequences, right-click on the task equence just created, and then click Edit 10) Add these steps within Capture State: a) click on add > new group i) name = Backup EEPC MBR Go to options > add condition: variable = _SMSTSBootUEFI condition = not equal value = true b) Click on Add > general > Run Command Line i) name = Shutdown MDE services Commandline = net Stop "McAfee Endpoint Encryption Agent" c) Go to Options > enable Contine on error i) Click on Add > general > Run Command Line name = Save EEPC MBR i command line = \EpeWinUpgradeTool64.exe -SaveMbr C:\EpeMBR.dat d) Click on Add > general > Run Command Line i) name = Unlock EPE Files command line = \EpeWinUpgradeTool64.exe -SetFileLocks Unlock e) Click on Add > general > Run Command Line i) name = Unhide EPE files command line = attrib +r +s +h c:\safeboot.* f) Click on Add > general > Run Command Line i) name = Restore EEPC MBR command line = \EpeWinUpgradeTool64.exe -ForceMbr C:\EpeMBR.dat g) Click on Capture User Files and Settings (the one under Capture Files and Settings > Capture User Files and Settings) i) Select Customize how user profile are captured Click on Files i add MigUser.xml 10
11 iv) Enable verbose logging = on v) Contunue if some files cannot be captured = off vi) Capture locally by using link instead of by copying files = on 11) Add these steps within Install Operation system a) Click on Restart in Windows PE > add > new group i) name = Backup EEPC MBR Go to options > add condition: variable = _SMSTSBootUEFI condition = not equal value = true b) Click on Add > general > Run Command Line i) name = Unlock EPE Files command line = \EpeWinUpgradeTool64.exe -SetFileLocks Unlock c) Click on Add > general > Run Command Line i) name = Save EEPC MBR command line = \EpeWinUpgradeTool64.exe -SaveMbr x:\epembr.dat d) Click on Add > general > Run Command Line i) name = Restore EEPC MBR command line = \EpeWinUpgradeTool64.exe -ForceMbr x:\epembr.dat e) Click on Apply Operating System > add > new group 11
12 i) name = Restrore MDE PBFS Go to options > add condition: variable = _SMSTSBootUEFI condition = not equal value = true f) Click on Add > user state > restore user state i) name = Restore User Files and Settings User state migration tool = use the same tool i Continue if some files cannot be restored = off iv) Enable verbose logging = ok 12
13
14 Copyright 2018 McAfee, LLC McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. 14
Windows OS Refresh Process Guide for UEFI Systems
McAfee Drive Encryption 7.x Windows OS Refresh Process Guide for UEFI Systems Revision B Last updated: 13 April 2018 Contents Disclaimer Introduction Planning the refresh process Creating the Task Sequence
More informationMcAfee Drive Encryption Administration Course
McAfee Drive Encryption Administration Course Education Services administration course The McAfee Drive Encryption Administration course from McAfee Education Services provides attendees with hands-on
More informationDeploying Windows Devices and Enterprise Apps
Course 20695A: Deploying Windows Devices and Enterprise Apps Course Details Course Outline Module 1: Assessing the Network Environment for Supporting Operating System and Application Deployment This module
More information"Charting the Course... MOC B Implementing a Desktop Infrastructure. Course Summary
Course Summary Description This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance
More informationImplementing a Desktop Infrastructure
Implementing a Desktop Infrastructure Duration: 5 Days Course Code: 20415 About this course This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement
More informationImplementing a Desktop Infrastructure
Course 20415: Implementing a Desktop Infrastructure Page 1 of 7 Implementing a Desktop Infrastructure Course 20415: 4 days; Instructor-Led Introduction This 4-day instructor-led course provides you with
More informationMartin Vittrup Senior Technology Specialist Windows Client Microsoft Danmark
Martin Vittrup Senior Technology Specialist Windows Client Microsoft Danmark mvittrup@microsoft.com SOLUTIONS IMAGING DELIVERY MIGRATION Microsoft Deployment Toolkit Application Compatibility Toolkit
More informationIMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IMPLEMENTING A DESKTOP INFRASTRUCTURE Course: 20415A Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This 5-day instructor-led course provides you with
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationImplementing a Desktop Infrastructure
20415 - Implementing a Desktop Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5-day instructor-led training course provides you
More informationTasktop Sync - Cheat Sheet
Tasktop Sync - Cheat Sheet 1 Table of Contents Tasktop Sync Server Application Maintenance... 4 Basic Installation... 4 Upgrading Sync... 4 Upgrading an Endpoint... 5 Moving a Workspace... 5 Same Machine...
More informationImaging the HP Z240 Workstation
Technical white paper Imaging the HP Z240 Workstation with Windows 10 Pro (64-bit) and Microsoft Deployment Toolkit (MDT) 2013 v1.2 A system image enables you to automate the deployment of computers in
More informationDeploying Windows Devices and Enterprise Apps
Deploying Windows Devices and Enterprise Apps Course 20695B - Five days - Instructor-led - Hands-on Introduction This 5-day instructor-led course describes how to assess operating system and application
More informationDeploying Windows 7 Lesson 3
Deploying Windows 7 Lesson 3 Objectives Understand enterprise deployments Capture an image file Modify an image file Deploy an image file Understanding Enterprise Deployments Careful planning is required
More informationDeploying Windows 7 Using MDT UDI
The Microsoft Deployment Toolkit (MDT) supports three types of deployments Zero Touch Installation (ZTI), Lite Touch Installation (LTI), and User Driven Installation (UDI). However each deployment type
More informationDeploying Windows 10
Deploying Windows 10 Deploying Windows 10 Michael Niehaus Course Agenda Introducing Windows as a Service Deploying Windows 10 Staying Current with Windows as a Service Managing Windows 10 with System Center
More informationIBM Endpoint Manager. OS Deployment V3.5 User's Guide
IBM Endpoint Manager OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide Note Before using this information and the product it supports, read the information in Notices
More informationVeritas System Recovery 18 Linux Edition: Quick Installation Guide
Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationMcAfee Endpoint Encryption for PC
McAfee Endpoint Encryption for PC Product Release Notes Version 5.2.8 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet: www.mcafee.com Document:
More informationVeeam Endpoint Backup
Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationSymantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide
Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationVeritas Desktop Agent for Mac Getting Started Guide
Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationUsing System Center 2012 R2 Configuration Manager SP1 to Manage Windows-based HP Thin Clients
Technical white paper Using System Center 2012 R2 Configuration Manager SP1 to Manage Windows-based HP Thin Clients Windows 10 IoT Enterprise Windows Embedded 8 Standard Windows Embedded Standard 7 Table
More informationExam /Course C or B Configuring Windows Devices
Exam 70-697/Course 20697-1C or 20697-2B Configuring Windows Devices Course 20697-2B Deploying and Managing Windows 10 Using Enterprise Services About this course This course provides administrators with
More informationQuest Enterprise Reporter 2.0 Report Manager USER GUIDE
Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationVeritas NetBackup for Lotus Notes Administrator's Guide
Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016
More informationTivoli SecureWay Policy Director WebSEAL. Installation Guide. Version 3.8
Tivoli SecureWay Policy Director WebSEAL Installation Guide Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide
More informationDeploying Windows Desktops and Enterprise Applications. Course Code: 20695D; Duration: 5 days; Instructor-led
Deploying Windows Desktops and Enterprise Applications Course Code: 20695D; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course is intended for IT professionals who deploy, manage,
More informationManaging Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator s Guide
Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager 2016 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps
More informationVeeam Endpoint Backup
Veeam Endpoint Backup Version 1.1 User Guide December, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationCOURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview
Course Name Course Duration Course Structure Course Overview Course Outcome Course Details 20697-2B Deploying and Managing Windows 10 Using Enterprise Services 5 Days Instructor-Led This course provides
More information"Charting the Course... MOC C: Deploying and Managing Windows 10 Using Enterprise Services. Course Summary
Course Summary Description This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment.
More informationMcAfee MVISION Endpoint 1811 Installation Guide
McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationVeritas Desktop and Laptop Option Mac Getting Started Guide
Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationDeploying Windows Desktops and Enterprise Applications (695)
Deploying Windows Desktops and Enterprise Applications (695) Implement the Operating System Deployment (OSD) infrastructure Assess the computing environment Configure and implement the Microsoft Assessment
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license
More informationCourse Outline. Deploying and Managing Windows 10 Using Enterprise Services Course B: 5 days Instructor Led
Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2B: 5 days Instructor Led Prerequisites: Students should have at least two years of experience in the IT field and should already
More informationIntroducing Express Deployment Tool for Windows 10. User Guide V3.0
Introducing Express Deployment Tool for Windows 10 User Guide V3.0 The information contained in this document represents the current view of Microsoft Corporation and its Affiliates ("Microsoft") on the
More informationCOURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
ABOUT THIS COURSE This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students
More informationIntel Manageability Commander User Guide
Intel Manageability Commander User Guide Document Release Date: October 27, 2016 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationHP Image Assistant. User Guide
HP Image Assistant User Guide Copyright 2018 HP Development Company, L.P. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other
More informationAbout this release This document contains important information about the current release. We strongly recommend that you read the entire document.
Release Notes Hotfix 1044054 McAfee Drive Encryption 7.1.1 For use with epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions Known issues Additional information
More informationMcAfee EMM Best Practices Document Upgrading your High Availability EMM installation
McAfee EMM Best Practices Document Upgrading your High Availability EMM installation For use with EMM 9.x and 10.x versions McAfee Support Enterprise Mobility Management (EMM) Document Rev. 2.2 Page 2
More informationZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017
ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationMcAfee Endpoint Upgrade Assistant 1.5.0
Release Notes McAfee 1.5.0 For use with epolicy Ochestrator Contents About this release What s new Resolved issues Installation information Known issues Additional information Getting product information
More informationInstalling Client Proxy software
Revision A McAfee Client Proxy 2.3.4 Installation Guide (McAfee epolicy Orchestrator) Installing Client Proxy software Client Proxy software Client Proxy consists of server and client software, whose deployment
More informationGetting Started with Tally.Developer 9 Series A Release 3.0
Getting Started with Tally.Developer 9 Series A Release 3.0 The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing
More informationWindows 8 Deployment
Windows 8 Deployment Agenda Hardware/Software Compatibility and Toolsets Image Engineering and Deployment Volume Activation Security Management Application Lifecycle User Settings System Center 2012 Configuration
More informationVeritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)
Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service
More informationDeploying and Managing Windows 10 Using Enterprise Services
Deploying and Managing Windows 10 Using Enterprise Services Course # Exam: Prerequisites Technology: Delivery Method: Length: 20697-2 70-697 20697-1 Windows Instructor-led (classroom) 5 Days Overview About
More informationUpgrading BankLink Books
Upgrading BankLink Books Contents Upgrading BankLink Books... 4 Upgrading BankLink Books using the automatic upgrade 4 Upgrading BankLink Books when asked to upgrade 5 Upgrading BankLink Books Page 2 of
More informationImplementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by
More informationDeploying and Managing Windows 10 Using Enterprise Services
Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2C 5 Days Instructor-led, Hands-on Course Description This 5-day course provides administrators with the knowledge and skills necessary
More informationVeritas Desktop and Laptop Option 9.2
1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.
More informationC: Deploying and Managing Windows 10 Using Enterprise Services. Duration: 5 days; Instructor-led
20697-2C: Deploying and Managing Windows 10 Using Enterprise Services Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This course provides administrators with the knowledge and skills necessary to
More informationGetting Started with Tally.Developer 9
Getting Started with Tally.Developer 9 The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing market conditions,
More information: A: Deploying and Managing Windows 10 Using Enterprise Services
Module Title Duration : 20697-2A: Deploying and Managing Windows 10 Using Enterprise Services : 5 days About this Course This 5-day course provides administrators with the knowledge and skills needed to
More informationCloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide
CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide November 2014 THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CLOUDLINK TECHNOLOGIES AND RECEIPT OR POSSESSION DOES NOT CONVEY
More informationDeploying and Managing Windows 10 Using Enterprise Services
Deploying and Managing Windows 10 Using Enterprise Services 20697-2; 5 Days; Instructor-led Course Description This 5-day course provides administrators with the knowledge and skills needed to deploy and
More information70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise
70-643: Windows Server 2008 Applications Infrastructure Course 01 - Deploying Windows in the Enterprise Slide 1 Deploying Windows in the Enterprise How to deploy Windows in the 2008 Server Environment
More informationCloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide
CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide October 2014 THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CLOUDLINK TECHNOLOGIES AND RECEIPT OR POSSESSION DOES NOT CONVEY
More information"Charting the Course... MOC 6294 A Planning and Managing Windows 7 Desktop Deployments and Environments Course Summary
Course Summary Description This course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and management. In this course, students will learn how to plan
More informationSolarWinds. Migrating SolarWinds NPM Technical Reference
SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,
More informationCopyright SolarWinds. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
APM Migration Introduction... 3 General Requirements... 3 Database Requirements... 3 Stopping APM Services... 4 Creating and Restoring Orion Database Backups... 4 Creating a Database Backup File with Database
More informationMcAfee MVISION Endpoint 1808 Installation Guide
McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationOEM Manufacturing and Deployment for Windows 10 (735)
OEM Manufacturing and Deployment for Windows 10 (735) Prepare the Imaging Environment Install deployment tools and scripts Prepare the Windows Assessment and Deployment Kit (Windows ADK), prepare the required
More informationB Deploying and Managing Windows 10 Using Enterprise Services. Course Content. Course ID#: W Hours: 35. Course Description:
Course Content Course Description: This 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment.
More informationLesson 2: Installing Windows 8.1. MOAC : Configuring Windows 8.1
Lesson 2: Installing Windows 8.1 MOAC 70-687: Configuring Windows 8.1 Overview Exam Objective 1.2: Install Windows 8.1 o Install as Windows To Go o Migrate from previous versions of Windows to Windows
More informationDell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager. User's Guide
Dell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make
More informationVeritas NetBackup for SQLite Administrator's Guide
Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the
More informationVeritas NetBackup OpsCenter Reporting Guide. Release 8.0
Veritas NetBackup OpsCenter Reporting Guide Release 8.0 Veritas NetBackup OpsCenter Reporting Guide Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationDeploying and Managing Windows 10 Using Enterprise Services ( )
Deploying and Managing Windows 10 Using Enterprise Services (20697-2) Course Details Duration: Course code: 5 Days M206972 Overview: This 5-day course provides administrators with the knowledge and skills
More informationImageAssist Dynamic. User s Guide for Multiple Platforms
ImageAssist Dynamic User s Guide for Multiple Platforms Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates
More informationMcAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationLENOVO THINKSTATION P520C, P520, P720, & P920 WINDOWS 7 INSTALLATION
LENOVO THINKSTATION P520C, P520, P720, & P920 WINDOWS 7 INSTALLATION Contents OVERVIEW SECTION 1 BIOS & PRE-INSTALLATION STEPS SECTION 2 WINDOWS 7 DRIVER SLIPSTREAM SETUP SECTION 3 WINDOWS 7 INSTALLATION
More informationMICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT.
The information contained in this document represents the current view of Microsoft Corporation and its Affiliates ("Microsoft") on the issues discussed as of the date of publication. Because Microsoft
More informationSymantec Workflow Solution 7.1 MP1 Installation and Configuration Guide
Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement
More informationIBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)
IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before
More informationAltiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes
Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationSymantec Drive Encryption Evaluation Guide
Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a
More informationMobile On the Go (OTG) Server
Mobile On the Go (OTG) Server Installation Guide Paramount Technologies, Inc. 1374 East West Maple Road Walled Lake, MI 48390-3765 Phone 248.960.0909 Fax 248.960.1919 www.paramountworkplace.com Copyright
More informationVeritas NetBackup for Enterprise Vault Agent Administrator's Guide
Veritas NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 8.0 Veritas NetBackup for Enterprise Vault Agent Administrator's Guide Document version: 8.0 Legal Notice Copyright
More informationC A S P E R TECH EDITION 10 USER GUIDE
TM C A S P E R TM TECH EDITION 10 USER GUIDE Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication, and
More informationLog & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017
UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation
More informationConfiguring RAID with HP Z Turbo Drives
Technical white paper Configuring RAID with HP Z Turbo Drives HP Workstations This document describes how to set up RAID on your HP Z Workstation, and the advantages of using a RAID configuration with
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationMicrosoft On Demand Courses
Microsoft On Demand Courses Deploying Windows Desktops and Enterprise Applications Who can join this course? This five-day course is for IT professionals who deploy, manage, and maintain PCs, devices,
More informationMicrosoft Deployment Toolkit
Microsoft Deployment Toolkit Agenda MDT Prerequisites Building a Deployment Share Configure New Deployment Share Deployment Share Properties Import Applications Import The OS Image Import The drivers Import
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationMicrosoft Visual Studio Add-In Users Guide
Microsoft Visual Studio Add-In Users Guide VS Add-In Microsoft Visual Studio Add-In Users Guide SOA_VS_Users_v62 Copyright Copyright 2014 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
More informationUpgrading to MailMarshal Version 6.0 SMTP Technical White Paper April 19, 2005
Contents Introduction... 3 Case 1: Standalone MailMarshal SMTP Server... 3 Case 2: Array of MailMarshal SMTP Servers... 14 Additional Resources....38 Upgrading to MailMarshal Version 6.0 SMTP Technical
More informationVeritas Backup Exec Migration Assistant
Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationCopyright 2017 HP Development Company, L.P.
User Guide Copyright 2017 HP Development Company, L.P. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Intel and Core are trademarks
More informationThis document contains important information about the current release. We strongly recommend that you read the entire document.
Release Notes Revision A McAfee Security Management Center 5.8.3 Contents About this release Resolved issues Installation instructions Upgrade instructions System requirements Build version Compatibility
More informationIntel Platform Administration Technology Quick Start Guide
Intel Platform Administration Technology Quick Start Guide 320014-003US This document explains how to get started with core features of Intel Platform Administration Technology (Intel PAT). After reading
More informationCourse Outline. Deploying Windows Devices and Enterprise Apps Course 20695C: 5 days Instructor Led
Deploying Windows Devices and Enterprise Apps Course 20695C: 5 days Instructor Led About this course This five-day course describes how to assess operating system and application deployment options, determine
More information