Endpoint Encryption allows users to deploy agents in the following ways:
Deployment Method |
Description |
---|---|
Manual |
Run the agent installation program and configure PolicyServer settings manually on each endpoint. This option is prefered for test installations and endpoints that have individual hardware specifications. |
Automated |
Use an installation script to install and configure the agent automatically on one endpoint or on many endpoints at once (mass deployment). This option is prefered for environments that include many similar endpoints such as large enterprises. Warning:
|
OfficeScan |
Deploy Full Disk Encryption agents to endpoints that already have OfficeScan agents through the Endpoint Encryption Deployment Tool plug-in. For information about using the plug-in, see the OfficeScan Plug-in Online Help. |
To assist with creating scripts for automated deployments, Endpoint Encryption includes the following tools:
Tool |
Description |
---|---|
Command Builder |
The Command Builder generates complete installation command scripts for Full Disk Encryption, File Encryption, and Encryption Managemement for Microsoft BitLocker based on PolicyServer, Enterprise, and authentication values. Tip:
The Command Builder is a larger tool that encompasses the functionality of the Command Line Helper. If you intend to use the Command Builder, you do not need to use the Command Line Helper. |
Command Line Helper |
The Command Line Helper is a command line utility that generates individual encrypted strings to use for installation, upgrade, or patch scripts. |