5
Introduction
Purpose
of
this
Guide
When
planning
a
large
rollout
of
Endpoint
Encryption
v5,
it
is
important
to
understand
the
process
of
scaling
the
back
end
Object
Directory
and
the
associated
Endpoint
Encryption
Communications
Server
processes
to
meet
requirements.
This
guide
outlines
the
considerations
around
Endpoint
Encryption
5
implementation
and
suggests
possible
solutions.
The
guide
also
discusses
considerations
on
optimization
and
maintenance
before
and
after
its
implementation.
It
also
assumes
the
reader
has
some
knowledge
of
enterprise
systems
(configuration
and
management)
and
some
knowledge
of
Endpoint
Encryption
components
(Endpoint
Encryption
Manager
v5.x,
Endpoint
Encryption
for
PC
v5.x
and
other
McAfee
Endpoint
Encryption
components)
that
will
benefit
from
good
practice
and
Object
Directory
optimization
(see
below).
This
guide
is
a
collation
of
the
professional
opinions
of
Endpoint
Encryption
certified
engineers,
and
not
the
exact
science.
Because
every
implementation
is
unique,
it
is
critical
to
understand
both
the
product
and
the
environment
in
which
it
is
being
used,
before
arriving
at
any
decision
on
implementation
strategy.
Calculations
and
figures
in
this
guide
are
based
on
field
evidence
and
not
theoretical
system
testing
and
are
our
“best
advice”
at
the
time
of
writing.
We
recommend
you
to
discuss
your
requirements
with
your
McAfee
representative.
McAfee
has
wide
experience
in
deploying
real
world
implementations.
Thanks
to
all
the
authors
who
have
contributed
towards
this
guide.
Relevant
Products
This
guide
discusses
configuration
and
maintenance
of
the
back
end
server
components,
Endpoint
Encryption
Manager
v5.x
and
its
Object
Directory
together,
which
manage
and
govern
the
following
version
5
client
components
of
Endpoint
Encryption:
•
Endpoint
Encryption
for
PC
(EEPC)
•
Endpoint
Encryption
for
Files
and
Folders
(EEFF)
•
Endpoint
Encryption
for
Mobile
(EEMO)
•
Endpoint
Encryption
for
Removable
Media
(EERM)
Other
components
that
may
benefit
indirectly:
•
Endpoint
Encryption
Scripting
Tool
•
Endpoint
Encryption
Reporting
Tool
•
Endpoint
Encryption
Object
Directory
Backup
However,
the
vast
majority
of
the
guide
is
concerned
with
Endpoint
Encryption
for
PC
as
optimizations
of
the
Manager
and
Object
Directory
will
make
the
most
impact
on
this
component.