Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Deployment options in Endpoint Encryption 5.0

    • Updated:
    • 10 May 2016
    • Product/Version:
    • Endpoint Encryption 5.0
    • Platform:
    • Windows 2003 Standard 64-bit
    • Windows 2008 Server R2
    • Windows 8 32-bit
    • Windows 8 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP SP3 32-bit
Summary

This article discusses the network options when deploying Endpoint Encryption. 

Details
Public

The following are the deployment options available for Endpoint Encryption:

Simple Deployment

The following illustration explains how to deploy Endpoint Encryption for the first time and using only PolicyServer MMC to manage PolicyServer.

Simple deployment

Click image to enlarge.

Control Manager Deployment

The following illustration explains how to deploy Endpoint Encryption for the first time using Control Manager to manage PolicyServer. In a Control Manager deployment, administrators use Control Manager for all Endpoint Encryption policy, user, and device controls, and only use PolicyServer MMC for advanced Enterprise maintenance.

For more information, refer to following topic: About Control Manager Integration

Control Manager deployment

Click image to enlarge.

In environments that use Control Manager, changes to PolicyServer policies are always controlled by Control Manager. Any changes made using PolicyServer MMC are overwritten the next time that Control Manager synchronizes policies to the PolicyServer database.

OfficeScan Deployment

The following illustration explains how to deploy Endpoint Encryption for the first time on OfficeScan managed endpoints. In OfficeScan deployments, administrators can use either Control Manager or PolicyServer MMC to manage PolicyServer.

For more information, refer to the following topic: About OfficeScan Integration.

OfficeScan deployment

Click image to enlarge.

Complex Distributed Deployment

The following illustration explains the network environment of a complex distributed deployment using both Endpoint Encryption 5.0 and Endpoint Encryption legacy agents. You can configure Traffic Forwarding Service and Client Web Service on the same endpoint separate from PolicyServer.

Complex distributed deployment

Click image to enlarge.

Premium
Internal
Rating:
Category:
Deploy
Solution Id:
1101822
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.