This article discusses the network options when deploying Endpoint Encryption.
The following are the deployment options available for Endpoint Encryption:
Simple Deployment
The following illustration explains how to deploy Endpoint Encryption for the first time and using only PolicyServer MMC to manage PolicyServer.
Click image to enlarge.
Control Manager Deployment
The following illustration explains how to deploy Endpoint Encryption for the first time using Control Manager to manage PolicyServer. In a Control Manager deployment, administrators use Control Manager for all Endpoint Encryption policy, user, and device controls, and only use PolicyServer MMC for advanced Enterprise maintenance.
For more information, refer to following topic: About Control Manager Integration.
Click image to enlarge.
In environments that use Control Manager, changes to PolicyServer policies are always controlled by Control Manager. Any changes made using PolicyServer MMC are overwritten the next time that Control Manager synchronizes policies to the PolicyServer database.
OfficeScan Deployment
The following illustration explains how to deploy Endpoint Encryption for the first time on OfficeScan managed endpoints. In OfficeScan deployments, administrators can use either Control Manager or PolicyServer MMC to manage PolicyServer.
For more information, refer to the following topic: About OfficeScan Integration.
Click image to enlarge.
Complex Distributed Deployment
The following illustration explains the network environment of a complex distributed deployment using both Endpoint Encryption 5.0 and Endpoint Encryption legacy agents. You can configure Traffic Forwarding Service and Client Web Service on the same endpoint separate from PolicyServer.
Click image to enlarge.