Windows OS Refresh Process Guide for MBR Systems

Size: px
Start display at page:

Download "Windows OS Refresh Process Guide for MBR Systems"

Transcription

1 McAfee Drive Encryption 7.x Windows OS Refresh Process Guide for MBR Systems Revision B Last updated: 13 April 2018 Contents Disclaimer Introduction Planning the refresh process Creating the Task Sequence Disclaimer The information contained in this document is subject to change without notice. MCAFEE, LLC MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. McAfee shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. McAfee reserves the right to add, subtract or modify features or functionality, or modify the product, at its sole discretion, without notice. McAfee makes no commitment, implied or otherwise, to support any functionality or technology discussed or referenced in this document 1

2 Introduction The McAfee Drive Encryption product provides full disk encryption for enterprises. Purpose and scope The purpose of this document is to provide a recommended process for refreshing systems running Windows operating systems in Master Boot Record (MBR) mode only, which are encrypted with McAfee Drive Encryption 7.x. The purpose of the process described in this document is to refresh the Windows operating system without the need of decrypting the hard drive and uninstalling McAfee Drive Encryption. In this guide, OS Refresh is referred to as the process whereby the disk hosting the operating system is cleared and a new operating system installed by laying an image using a tool that works at file level and not at sector level. The process and utilities provided address the common problems occurring, whilst maintaining the encrypted drive during OS refresh. Intended audience The intended audience for this document are IT administrators with a thorough knowledge and experience in reimaging via Microsoft System Center 2016 Configuration Manager (SCCM), Microsoft Deployment Toolkit (MDT) 6.3 and McAfee Drive Encryption 7.x. Here are the main products and features that you will need to have knowledge of: McAfee Drive Encryption administration Microsoft System Center 2016 Configuration Manager (SCCM) Microsoft Windows 10 Assessment and Deployment Kit (ADK) Microsoft Deployment Toolkit (MDT) 6.3 Understanding of MBR and PC boot process Understanding of Windows Registry Understanding of Windows command line usage Understanding of the use and purpose of Operating System drivers Requirements The minimum requirements for the server environment which hosts the Microsoft System Center Configuration Manager (SCCM) are as follows: Microsoft System Center 2016 Configuration Manager (SCCM) Microsoft Windows 10 Assessment and Deployment Kit (ADK) Microsoft Deployment Toolkit (MDT) 6.3 User State Migration Tool (USMT) McAfee Drive Encryption (DE) 7.1.x, DE 7.2.x Any images must be captured via SCCM or MDT by following Microsoft official guidelines. For more information please visit: us/library/dd744389(v=ws.10).aspx 2

3 Planning the refresh process The following section describes how to plan and prepare a refresh process for Windows operating systems. This includes describing the McAfee Drive Encryption boot process, preparation of images and requirements for the refresh process. Overview of the McAfee Drive Encryption Boot Process The following diagram shows how a system with McAfee Drive Encryption active, boots using the Master Boot Record (MBR) boot process. <diagram?> The McAfee Drive Encryption Master Boot Record replaces the standard Master Boot Record (Sector 0 of the boot disk) during activation. The McAfee Drive Encryption MBR is referred to as the EPEMBR. The control is passed to the EPEMBR following BIOS initialization and the code contained in the EPEMBR is executed. The EPEMBR contains a pointer to the first sector of a sector chain that hosts the BootCode (safeboot.rsv), which is executed straight after the EPEMBR. It also contains a pointer to the first sector of a sector chain of the Drive Encryption file system (Safeboot.fs), which hosts the Windows OS original MBR that is executed after successful authentication. It is important that the two files (Safeboot.rsv, Safeboot.fs) and the EPEMBR are maintained on the disk and are never moved at a sector level. The files are sector chains and copying the file from one place to another does not work as they are not real files. They appear in this way inside the operating system to prevent it from being moved or overwritten. Any Windows OS refresh process has to make sure that the EPEMBR and the two McAfee Drive Encryption files are maintained without being moved. In the case of the EPEMBR this is fairly straight forward as it is only contained within one sector hence taking a backup and then restoring the file by writing back to sector 0 is sufficient. However, for the two McAfee Drive Encryption files that span across multiple sectors the only way to preserve them is by using the Microsoft User Migration Tool (USMT) Hardlink feature. This new feature is used to preserve user files during upgrades without the requirement of taking copies to another media. So the same can be applied to the McAfee Drive Encryption files. When the USMT runs, it creates a second pointer to files inside a protected folder. During the refresh process, at the point where the disk is cleared, all files are deleted apart from the ones that have hard links created. Preparing the Operating System images In order to refresh an operating system, an image has to be prepared that will be laid over the encrypted disk. This can be done in a number of ways via SCCM or MDT. However, any image that is captured, which results in a WIM file, must have the McAfee Drive Encryption drivers and registry entries injected prior to the refresh process. This will allow the new system to access the disk when it tries to boot. To do this McAfee has provided an executable called EpeWinUpgradeTool.exe for 32 bit systems and the EpeWinUpgradeTool64.exe for 64 bit systems. This tool can be run from a command line with Administrator rights to inject the McAfee Drive Encryption drivers and registry amendments. Prior to running the tool extract the following files from the MfeEEPC32.msi (for 32bit systems) or the MfeEEPC64.msi (for 64bit systems): MfeEpePC.sys Mfeccde.sys MfeEpeOpal.sys Place these files within a folder located in a convenient location: 3

4 Example C:\Drivers From a command line run the following command for x64 architecture: Example EpeWinUpgradeTool64.exe inject C:\drivers C:\OSWIMFILE.wim This will inject the McAfee Drive Encryption drivers and make the necessary registry amendments in the target WIM file. Once complete, the WIM file can either be imported into the SCCM/MDT environment or have its contents re distributed to the distribution points within SCCM/MDT. Preparing the Windows PE images (Boot image) The Windows PE environment is used for installing or refreshing operating systems. The McAfee Drive Encryption driver has to be included within the Windows PE image so the encrypted drive can be accessed by the installer. If you are planning to refresh for both 32 bit and 64 bit systems, then you will require two independent PE images, one for 64 bit and one for 32 bit respectively. To do this the procedure is the same as injecting the McAfee Drive Encryption drivers and registry amendments into an Operating System WIM file. Prior to running the EpeWinUpgrade Tool extract the following files from the MfeEEPC32.msi (for 32bit systems) or the MfeEEPC64.msi (for 64bit systems). Note: The drivers are the same for both the Operating System injection and the Boot Image injection: MfeEpePC.sys Mfeccde.sys MfeEpeOpal.sys Place these files within a folder located in a convenient location. Example C:\Drivers From a command line run the following command for x64 architecture: Example EpeWinUpgradeTool64.exe inject C:\drivers C:\BOOTWIMFILE.wim This will inject the McAfee Drive Encryption drivers and make the necessary registry amendments in the target WIM file. Once complete the WIM file can either be imported into the SCCM/MDT environment or have its contents re distributed to the distribution points within SCCM/MDT. It is also required to place a copy of the EpeWinUpgradeTool into the boot image. If the image is 32 bit use the EpeWinUpgradeTool.exe if the image is 64 bit use the EpeWinUpgradeTool64.exe. Creating LockedFiles.reg To prevent the McAfee Drive Encryption files from being moved at a sector level once the Task Sequence is complete the following registry entry will need to be created and called lockedfiles.reg. Make sure the location of the SafeBoot.fs and SafeBoot.rsv in the registry file match the actual locations on disk. Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MfeEpePc\LockedFiles] "0"="C:\\SafeBoot.fs" "1"="C:\\SafeBoot.rsv 4

5 Preparing the User State Migration Tool (USMT) The user state migration tool has a number of components but the XML required to be modified is MigUser.xml. The following additions will need to be made to make sure that all required McAfee Drive Encryption Files are not moved at a sector level: <component type="documents" context="system"> <displayname>component to migrate all McAfee Drive Encryption files</displayname> <role role="data"> <rules> <include> <objectset> <pattern type="file"> C:\[SafeBoot.fs]</pattern> <pattern type="file"> C:\[Safeboot.rsv]</pattern> </objectset> </include> </rules> </role> </component> <component type="documents" context="system"> <displayname>component to migrate all McAfee Drive Encryption registry files </displayname> <role role="data"> <rules> <include> <objectset> <pattern type="file"> C:\[lockedfiles.reg] </pattern> </objectset> </include> </rules> </role> </component> Preparing the Target Machine for OS refresh The target machines will require both the EpeWinUpgrade tool and the file lockedfiles.reg to be stored locally on the PC in the root of C:\ prior to the Task Sequence being initiated. OS Refresh process overview for PC s with McAfee Drive Encryption active The main requirements for a refresh process on a system with McAfee Drive Encryption active, is to preserve the boot order of the system as well as the data files used by McAfee Drive Encryption. This can accomplished using the EpeWinUpgradeTool.exe and EpeWinUpgradeTool64.exe tools that provide several arguments to aid during the process. An overview of what is required can be broken up into the three basic phases. 1st Stage Booting on current Windows OS Shutdown McAfee Drive Encryption Agent service Capture and store the McAfee Drive Encryption MBR (EPEMBR) Make sure that the McAfee Drive Encryption files are part of the USMT XML definitions and insert a step so USMT hardlinks and preserves the required McAfee Drive Encryption files Unlock McAfee Drive Encryption files Unhide McAfee Drive Encryption files Restore EPEMBR just before the system restarts as final step 2nd Stage Booting on Windows PE Store McAfee Drive Encryption MBR (EPEMBR) as first step in the process Restore McAfee Drive Encryption MBR (EPEMBR) 5

6 3rd Stage Booting on new Windows OS Make sure that USMT runs the load state tool to restore McAfee Drive Encryption files Amend registry with LockedFiles.reg Hide McAfee Drive Encryption files EpeWinUpgradeTool Expanded A utility was developed to allow administrators to carry out the necessary steps during the OS refresh process. As previously mention in this guide the utility is called EpeWinUpgradeTool.exe (32 bit) and EpeWinUpgradeTool64.exe (64 bit). The utility can be run at the command line with administrative rights and offers the following options: -SaveMbr <filename> -SetMbr <filename> -SetFileLocks <Lock:Unlock> -Inject <Drivers Dir> <Image> -MountWim <Image> <Mount Path> -UnmountWim <Mount Path> [Save] -ForceMBR <Filename> Stores the EPEMBR to a file specified by filename Restores the EPEMBR from a file specified by filename Locks or unlocks the McAfee Drive Encryption files. Use "Lock" or "Unlock" for command Injects McAfee Drive Encryption drivers into a WIM Image Mount Image in a specified Directory Unmount the image. Update image if Save Restore MBR from file continuously 6

7 Creating the Task Sequence 1) On SCCM console goto Software Library > Operating System > Task Sequence 2) Right click and select Create Task sequence 3) Select Install an existing image package 7

8 4) Task sequence information > boot image = the boot image with MDE drivers injected 5) On Install Windows a) Image = the new OS image with MDE drivers injected b) Partition and format the target computer before installing the operating system = off c) Configure task sequence for use with BitLocker, as shown below 8

9 6) On Install configuration management client, use the default 7) On Configure state migration: a) Select a USMT package, the default one from Windows ADK 5 or above is ok b) Select Save user settings and files locally, also enable Capture locally by using link instead of by copying files 9

10 8) Complete the wizard 9) In the Software Library workspace, click Task Sequences, right-click on the task equence just created, and then click Edit 10) Add these steps within Capture State: a) click on add > new group i) name = Backup EEPC MBR Go to options > add condition: variable = _SMSTSBootUEFI condition = not equal value = true b) Click on Add > general > Run Command Line i) name = Shutdown MDE services Commandline = net Stop "McAfee Endpoint Encryption Agent" c) Go to Options > enable Contine on error i) Click on Add > general > Run Command Line name = Save EEPC MBR i command line = \EpeWinUpgradeTool64.exe -SaveMbr C:\EpeMBR.dat d) Click on Add > general > Run Command Line i) name = Unlock EPE Files command line = \EpeWinUpgradeTool64.exe -SetFileLocks Unlock e) Click on Add > general > Run Command Line i) name = Unhide EPE files command line = attrib +r +s +h c:\safeboot.* f) Click on Add > general > Run Command Line i) name = Restore EEPC MBR command line = \EpeWinUpgradeTool64.exe -ForceMbr C:\EpeMBR.dat g) Click on Capture User Files and Settings (the one under Capture Files and Settings > Capture User Files and Settings) i) Select Customize how user profile are captured Click on Files i add MigUser.xml 10

11 iv) Enable verbose logging = on v) Contunue if some files cannot be captured = off vi) Capture locally by using link instead of by copying files = on 11) Add these steps within Install Operation system a) Click on Restart in Windows PE > add > new group i) name = Backup EEPC MBR Go to options > add condition: variable = _SMSTSBootUEFI condition = not equal value = true b) Click on Add > general > Run Command Line i) name = Unlock EPE Files command line = \EpeWinUpgradeTool64.exe -SetFileLocks Unlock c) Click on Add > general > Run Command Line i) name = Save EEPC MBR command line = \EpeWinUpgradeTool64.exe -SaveMbr x:\epembr.dat d) Click on Add > general > Run Command Line i) name = Restore EEPC MBR command line = \EpeWinUpgradeTool64.exe -ForceMbr x:\epembr.dat e) Click on Apply Operating System > add > new group 11

12 i) name = Restrore MDE PBFS Go to options > add condition: variable = _SMSTSBootUEFI condition = not equal value = true f) Click on Add > user state > restore user state i) name = Restore User Files and Settings User state migration tool = use the same tool i Continue if some files cannot be restored = off iv) Enable verbose logging = ok 12

13

14 Copyright 2018 McAfee, LLC McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. 14

Windows OS Refresh Process Guide for UEFI Systems

Windows OS Refresh Process Guide for UEFI Systems McAfee Drive Encryption 7.x Windows OS Refresh Process Guide for UEFI Systems Revision B Last updated: 13 April 2018 Contents Disclaimer Introduction Planning the refresh process Creating the Task Sequence

More information

McAfee Drive Encryption Administration Course

McAfee Drive Encryption Administration Course McAfee Drive Encryption Administration Course Education Services administration course The McAfee Drive Encryption Administration course from McAfee Education Services provides attendees with hands-on

More information

Deploying Windows Devices and Enterprise Apps

Deploying Windows Devices and Enterprise Apps Course 20695A: Deploying Windows Devices and Enterprise Apps Course Details Course Outline Module 1: Assessing the Network Environment for Supporting Operating System and Application Deployment This module

More information

"Charting the Course... MOC B Implementing a Desktop Infrastructure. Course Summary

Charting the Course... MOC B Implementing a Desktop Infrastructure. Course Summary Course Summary Description This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance

More information

Implementing a Desktop Infrastructure

Implementing a Desktop Infrastructure Implementing a Desktop Infrastructure Duration: 5 Days Course Code: 20415 About this course This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement

More information

Implementing a Desktop Infrastructure

Implementing a Desktop Infrastructure Course 20415: Implementing a Desktop Infrastructure Page 1 of 7 Implementing a Desktop Infrastructure Course 20415: 4 days; Instructor-Led Introduction This 4-day instructor-led course provides you with

More information

Martin Vittrup Senior Technology Specialist Windows Client Microsoft Danmark

Martin Vittrup Senior Technology Specialist Windows Client Microsoft Danmark Martin Vittrup Senior Technology Specialist Windows Client Microsoft Danmark mvittrup@microsoft.com SOLUTIONS IMAGING DELIVERY MIGRATION Microsoft Deployment Toolkit Application Compatibility Toolkit

More information

IMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led

IMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IMPLEMENTING A DESKTOP INFRASTRUCTURE Course: 20415A Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This 5-day instructor-led course provides you with

More information

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017

More information

Implementing a Desktop Infrastructure

Implementing a Desktop Infrastructure 20415 - Implementing a Desktop Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5-day instructor-led training course provides you

More information

Tasktop Sync - Cheat Sheet

Tasktop Sync - Cheat Sheet Tasktop Sync - Cheat Sheet 1 Table of Contents Tasktop Sync Server Application Maintenance... 4 Basic Installation... 4 Upgrading Sync... 4 Upgrading an Endpoint... 5 Moving a Workspace... 5 Same Machine...

More information

Imaging the HP Z240 Workstation

Imaging the HP Z240 Workstation Technical white paper Imaging the HP Z240 Workstation with Windows 10 Pro (64-bit) and Microsoft Deployment Toolkit (MDT) 2013 v1.2 A system image enables you to automate the deployment of computers in

More information

Deploying Windows Devices and Enterprise Apps

Deploying Windows Devices and Enterprise Apps Deploying Windows Devices and Enterprise Apps Course 20695B - Five days - Instructor-led - Hands-on Introduction This 5-day instructor-led course describes how to assess operating system and application

More information

Deploying Windows 7 Lesson 3

Deploying Windows 7 Lesson 3 Deploying Windows 7 Lesson 3 Objectives Understand enterprise deployments Capture an image file Modify an image file Deploy an image file Understanding Enterprise Deployments Careful planning is required

More information

Deploying Windows 7 Using MDT UDI

Deploying Windows 7 Using MDT UDI The Microsoft Deployment Toolkit (MDT) supports three types of deployments Zero Touch Installation (ZTI), Lite Touch Installation (LTI), and User Driven Installation (UDI). However each deployment type

More information

Deploying Windows 10

Deploying Windows 10 Deploying Windows 10 Deploying Windows 10 Michael Niehaus Course Agenda Introducing Windows as a Service Deploying Windows 10 Staying Current with Windows as a Service Managing Windows 10 with System Center

More information

IBM Endpoint Manager. OS Deployment V3.5 User's Guide

IBM Endpoint Manager. OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

McAfee Endpoint Encryption for PC

McAfee Endpoint Encryption for PC McAfee Endpoint Encryption for PC Product Release Notes Version 5.2.8 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet: www.mcafee.com Document:

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Veritas Desktop Agent for Mac Getting Started Guide

Veritas Desktop Agent for Mac Getting Started Guide Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Using System Center 2012 R2 Configuration Manager SP1 to Manage Windows-based HP Thin Clients

Using System Center 2012 R2 Configuration Manager SP1 to Manage Windows-based HP Thin Clients Technical white paper Using System Center 2012 R2 Configuration Manager SP1 to Manage Windows-based HP Thin Clients Windows 10 IoT Enterprise Windows Embedded 8 Standard Windows Embedded Standard 7 Table

More information

Exam /Course C or B Configuring Windows Devices

Exam /Course C or B Configuring Windows Devices Exam 70-697/Course 20697-1C or 20697-2B Configuring Windows Devices Course 20697-2B Deploying and Managing Windows 10 Using Enterprise Services About this course This course provides administrators with

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas NetBackup for Lotus Notes Administrator's Guide Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016

More information

Tivoli SecureWay Policy Director WebSEAL. Installation Guide. Version 3.8

Tivoli SecureWay Policy Director WebSEAL. Installation Guide. Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide

More information

Deploying Windows Desktops and Enterprise Applications. Course Code: 20695D; Duration: 5 days; Instructor-led

Deploying Windows Desktops and Enterprise Applications. Course Code: 20695D; Duration: 5 days; Instructor-led Deploying Windows Desktops and Enterprise Applications Course Code: 20695D; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course is intended for IT professionals who deploy, manage,

More information

Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator s Guide

Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator s Guide Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager 2016 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.1 User Guide December, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

COURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview

COURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview Course Name Course Duration Course Structure Course Overview Course Outcome Course Details 20697-2B Deploying and Managing Windows 10 Using Enterprise Services 5 Days Instructor-Led This course provides

More information

"Charting the Course... MOC C: Deploying and Managing Windows 10 Using Enterprise Services. Course Summary

Charting the Course... MOC C: Deploying and Managing Windows 10 Using Enterprise Services. Course Summary Course Summary Description This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment.

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Veritas Desktop and Laptop Option Mac Getting Started Guide

Veritas Desktop and Laptop Option Mac Getting Started Guide Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Deploying Windows Desktops and Enterprise Applications (695)

Deploying Windows Desktops and Enterprise Applications (695) Deploying Windows Desktops and Enterprise Applications (695) Implement the Operating System Deployment (OSD) infrastructure Assess the computing environment Configure and implement the Microsoft Assessment

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license

More information

Course Outline. Deploying and Managing Windows 10 Using Enterprise Services Course B: 5 days Instructor Led

Course Outline. Deploying and Managing Windows 10 Using Enterprise Services Course B: 5 days Instructor Led Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2B: 5 days Instructor Led Prerequisites: Students should have at least two years of experience in the IT field and should already

More information

Introducing Express Deployment Tool for Windows 10. User Guide V3.0

Introducing Express Deployment Tool for Windows 10. User Guide V3.0 Introducing Express Deployment Tool for Windows 10 User Guide V3.0 The information contained in this document represents the current view of Microsoft Corporation and its Affiliates ("Microsoft") on the

More information

COURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES

COURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES ABOUT THIS COURSE This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students

More information

Intel Manageability Commander User Guide

Intel Manageability Commander User Guide Intel Manageability Commander User Guide Document Release Date: October 27, 2016 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

HP Image Assistant. User Guide

HP Image Assistant. User Guide HP Image Assistant User Guide Copyright 2018 HP Development Company, L.P. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other

More information

About this release This document contains important information about the current release. We strongly recommend that you read the entire document.

About this release This document contains important information about the current release. We strongly recommend that you read the entire document. Release Notes Hotfix 1044054 McAfee Drive Encryption 7.1.1 For use with epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions Known issues Additional information

More information

McAfee EMM Best Practices Document Upgrading your High Availability EMM installation

McAfee EMM Best Practices Document Upgrading your High Availability EMM installation McAfee EMM Best Practices Document Upgrading your High Availability EMM installation For use with EMM 9.x and 10.x versions McAfee Support Enterprise Mobility Management (EMM) Document Rev. 2.2 Page 2

More information

ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017

ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017 ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

McAfee Endpoint Upgrade Assistant 1.5.0

McAfee Endpoint Upgrade Assistant 1.5.0 Release Notes McAfee 1.5.0 For use with epolicy Ochestrator Contents About this release What s new Resolved issues Installation information Known issues Additional information Getting product information

More information

Installing Client Proxy software

Installing Client Proxy software Revision A McAfee Client Proxy 2.3.4 Installation Guide (McAfee epolicy Orchestrator) Installing Client Proxy software Client Proxy software Client Proxy consists of server and client software, whose deployment

More information

Getting Started with Tally.Developer 9 Series A Release 3.0

Getting Started with Tally.Developer 9 Series A Release 3.0 Getting Started with Tally.Developer 9 Series A Release 3.0 The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing

More information

Windows 8 Deployment

Windows 8 Deployment Windows 8 Deployment Agenda Hardware/Software Compatibility and Toolsets Image Engineering and Deployment Volume Activation Security Management Application Lifecycle User Settings System Center 2012 Configuration

More information

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service

More information

Deploying and Managing Windows 10 Using Enterprise Services

Deploying and Managing Windows 10 Using Enterprise Services Deploying and Managing Windows 10 Using Enterprise Services Course # Exam: Prerequisites Technology: Delivery Method: Length: 20697-2 70-697 20697-1 Windows Instructor-led (classroom) 5 Days Overview About

More information

Upgrading BankLink Books

Upgrading BankLink Books Upgrading BankLink Books Contents Upgrading BankLink Books... 4 Upgrading BankLink Books using the automatic upgrade 4 Upgrading BankLink Books when asked to upgrade 5 Upgrading BankLink Books Page 2 of

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Module 1: Windows Intune Overview Module Overview Challenges in Managing Business PCs Introducing Windows Intune Managing and Securing PCs in Any Location by

More information

Deploying and Managing Windows 10 Using Enterprise Services

Deploying and Managing Windows 10 Using Enterprise Services Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2C 5 Days Instructor-led, Hands-on Course Description This 5-day course provides administrators with the knowledge and skills necessary

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

C: Deploying and Managing Windows 10 Using Enterprise Services. Duration: 5 days; Instructor-led

C: Deploying and Managing Windows 10 Using Enterprise Services. Duration: 5 days; Instructor-led 20697-2C: Deploying and Managing Windows 10 Using Enterprise Services Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This course provides administrators with the knowledge and skills necessary to

More information

Getting Started with Tally.Developer 9

Getting Started with Tally.Developer 9 Getting Started with Tally.Developer 9 The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing market conditions,

More information

: A: Deploying and Managing Windows 10 Using Enterprise Services

: A: Deploying and Managing Windows 10 Using Enterprise Services Module Title Duration : 20697-2A: Deploying and Managing Windows 10 Using Enterprise Services : 5 days About this Course This 5-day course provides administrators with the knowledge and skills needed to

More information

CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide

CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide November 2014 THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CLOUDLINK TECHNOLOGIES AND RECEIPT OR POSSESSION DOES NOT CONVEY

More information

Deploying and Managing Windows 10 Using Enterprise Services

Deploying and Managing Windows 10 Using Enterprise Services Deploying and Managing Windows 10 Using Enterprise Services 20697-2; 5 Days; Instructor-led Course Description This 5-day course provides administrators with the knowledge and skills needed to deploy and

More information

70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise

70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise 70-643: Windows Server 2008 Applications Infrastructure Course 01 - Deploying Windows in the Enterprise Slide 1 Deploying Windows in the Enterprise How to deploy Windows in the 2008 Server Environment

More information

CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide

CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide October 2014 THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CLOUDLINK TECHNOLOGIES AND RECEIPT OR POSSESSION DOES NOT CONVEY

More information

"Charting the Course... MOC 6294 A Planning and Managing Windows 7 Desktop Deployments and Environments Course Summary

Charting the Course... MOC 6294 A Planning and Managing Windows 7 Desktop Deployments and Environments Course Summary Course Summary Description This course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and management. In this course, students will learn how to plan

More information

SolarWinds. Migrating SolarWinds NPM Technical Reference

SolarWinds. Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

Copyright SolarWinds. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,

Copyright SolarWinds. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, APM Migration Introduction... 3 General Requirements... 3 Database Requirements... 3 Stopping APM Services... 4 Creating and Restoring Orion Database Backups... 4 Creating a Database Backup File with Database

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

OEM Manufacturing and Deployment for Windows 10 (735)

OEM Manufacturing and Deployment for Windows 10 (735) OEM Manufacturing and Deployment for Windows 10 (735) Prepare the Imaging Environment Install deployment tools and scripts Prepare the Windows Assessment and Deployment Kit (Windows ADK), prepare the required

More information

B Deploying and Managing Windows 10 Using Enterprise Services. Course Content. Course ID#: W Hours: 35. Course Description:

B Deploying and Managing Windows 10 Using Enterprise Services. Course Content. Course ID#: W Hours: 35. Course Description: Course Content Course Description: This 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment.

More information

Lesson 2: Installing Windows 8.1. MOAC : Configuring Windows 8.1

Lesson 2: Installing Windows 8.1. MOAC : Configuring Windows 8.1 Lesson 2: Installing Windows 8.1 MOAC 70-687: Configuring Windows 8.1 Overview Exam Objective 1.2: Install Windows 8.1 o Install as Windows To Go o Migrate from previous versions of Windows to Windows

More information

Dell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager. User's Guide

Dell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager. User's Guide Dell EMC Server Deployment Pack Version 4.0 for Microsoft System Center Configuration Manager User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

Veritas NetBackup OpsCenter Reporting Guide. Release 8.0

Veritas NetBackup OpsCenter Reporting Guide. Release 8.0 Veritas NetBackup OpsCenter Reporting Guide Release 8.0 Veritas NetBackup OpsCenter Reporting Guide Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Deploying and Managing Windows 10 Using Enterprise Services ( )

Deploying and Managing Windows 10 Using Enterprise Services ( ) Deploying and Managing Windows 10 Using Enterprise Services (20697-2) Course Details Duration: Course code: 5 Days M206972 Overview: This 5-day course provides administrators with the knowledge and skills

More information

ImageAssist Dynamic. User s Guide for Multiple Platforms

ImageAssist Dynamic. User s Guide for Multiple Platforms ImageAssist Dynamic User s Guide for Multiple Platforms Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

LENOVO THINKSTATION P520C, P520, P720, & P920 WINDOWS 7 INSTALLATION

LENOVO THINKSTATION P520C, P520, P720, & P920 WINDOWS 7 INSTALLATION LENOVO THINKSTATION P520C, P520, P720, & P920 WINDOWS 7 INSTALLATION Contents OVERVIEW SECTION 1 BIOS & PRE-INSTALLATION STEPS SECTION 2 WINDOWS 7 DRIVER SLIPSTREAM SETUP SECTION 3 WINDOWS 7 INSTALLATION

More information

MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT.

MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. The information contained in this document represents the current view of Microsoft Corporation and its Affiliates ("Microsoft") on the issues discussed as of the date of publication. Because Microsoft

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before

More information

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Symantec Drive Encryption Evaluation Guide

Symantec Drive Encryption Evaluation Guide Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a

More information

Mobile On the Go (OTG) Server

Mobile On the Go (OTG) Server Mobile On the Go (OTG) Server Installation Guide Paramount Technologies, Inc. 1374 East West Maple Road Walled Lake, MI 48390-3765 Phone 248.960.0909 Fax 248.960.1919 www.paramountworkplace.com Copyright

More information

Veritas NetBackup for Enterprise Vault Agent Administrator's Guide

Veritas NetBackup for Enterprise Vault Agent Administrator's Guide Veritas NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 8.0 Veritas NetBackup for Enterprise Vault Agent Administrator's Guide Document version: 8.0 Legal Notice Copyright

More information

C A S P E R TECH EDITION 10 USER GUIDE

C A S P E R TECH EDITION 10 USER GUIDE TM C A S P E R TM TECH EDITION 10 USER GUIDE Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication, and

More information

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017 UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation

More information

Configuring RAID with HP Z Turbo Drives

Configuring RAID with HP Z Turbo Drives Technical white paper Configuring RAID with HP Z Turbo Drives HP Workstations This document describes how to set up RAID on your HP Z Workstation, and the advantages of using a RAID configuration with

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Microsoft On Demand Courses

Microsoft On Demand Courses Microsoft On Demand Courses Deploying Windows Desktops and Enterprise Applications Who can join this course? This five-day course is for IT professionals who deploy, manage, and maintain PCs, devices,

More information

Microsoft Deployment Toolkit

Microsoft Deployment Toolkit Microsoft Deployment Toolkit Agenda MDT Prerequisites Building a Deployment Share Configure New Deployment Share Deployment Share Properties Import Applications Import The OS Image Import The drivers Import

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Microsoft Visual Studio Add-In Users Guide

Microsoft Visual Studio Add-In Users Guide Microsoft Visual Studio Add-In Users Guide VS Add-In Microsoft Visual Studio Add-In Users Guide SOA_VS_Users_v62 Copyright Copyright 2014 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

Upgrading to MailMarshal Version 6.0 SMTP Technical White Paper April 19, 2005

Upgrading to MailMarshal Version 6.0 SMTP Technical White Paper April 19, 2005 Contents Introduction... 3 Case 1: Standalone MailMarshal SMTP Server... 3 Case 2: Array of MailMarshal SMTP Servers... 14 Additional Resources....38 Upgrading to MailMarshal Version 6.0 SMTP Technical

More information

Veritas Backup Exec Migration Assistant

Veritas Backup Exec Migration Assistant Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Copyright 2017 HP Development Company, L.P.

Copyright 2017 HP Development Company, L.P. User Guide Copyright 2017 HP Development Company, L.P. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Intel and Core are trademarks

More information

This document contains important information about the current release. We strongly recommend that you read the entire document.

This document contains important information about the current release. We strongly recommend that you read the entire document. Release Notes Revision A McAfee Security Management Center 5.8.3 Contents About this release Resolved issues Installation instructions Upgrade instructions System requirements Build version Compatibility

More information

Intel Platform Administration Technology Quick Start Guide

Intel Platform Administration Technology Quick Start Guide Intel Platform Administration Technology Quick Start Guide 320014-003US This document explains how to get started with core features of Intel Platform Administration Technology (Intel PAT). After reading

More information

Course Outline. Deploying Windows Devices and Enterprise Apps Course 20695C: 5 days Instructor Led

Course Outline. Deploying Windows Devices and Enterprise Apps Course 20695C: 5 days Instructor Led Deploying Windows Devices and Enterprise Apps Course 20695C: 5 days Instructor Led About this course This five-day course describes how to assess operating system and application deployment options, determine

More information