Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

System requirements for Endpoint Encryption 5.0

    • Updated:
    • 24 Feb 2015
    • Product/Version:
    • Endpoint Encryption 5.0
    • Platform:
    • Windows 2003 Standard 64-bit
    • Windows 2008 Server R2 Datacenter
    • Windows 8 32-bit
    • Windows 8 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP SP3 32-bit
Summary

Learn the minimum requirements to install Endpoint Encryption 5.0 and its components.

Details
Public
  • Processor: 2GHz Dual Quad Core Cor2 Intel(TM) Xeon(TM) or compatible processor
  • RAM: 4GB - 8GB depending on the configuration
  • Disk space: 40GB - 120GB depending on the configuration
  • Operating System:
    • Windows Server 2003 SP2 32/64-bit
    • Windows Server 2008 or 2008 R2 64-bit
  • Application and Settings:
    • Microsoft IIS, Allow ASP and ASP.NET
    • Microsoft .Net Framework 2.0 SP2 (or 3.5) and 4.0
    • Windows Installer 4.5 (SQL Express)
     
    PolicyServer 5.0 requires one IIS location for the Legacy Web Service.
  • Database:
    • Microsoft SQL 2005/2008/2008 R2
    • Microsoft SQL Express 2005(SP3)/2008
    • Mixed Mode Authentication (SA password) installed
    • Reporting services installed

PolicyServer MMC

  • Processor: Intel™ Core™ 2 or compatible processor
  • RAM: 512MB
  • Disk space: 100MB
  • Network connectivity: Connectivity with PolicyServer
  • Operating system: Any Microsoft Windows operating system supported by PolicyServer or the Endpoint Encryption agents
  • Application: Microsoft .NET Framework 4.0

Control Manager

  • Control Manager Server: Control Manager, Patch 3
  • RAM: 2GB (4GB recommended)
  • Disk Space: 10GB (20GB recommended)
  • Network connectivity: Connectivity with PolicyServer
 
For additional Control Manager system requirements, refer to the Control Manager documentation.

OfficeScan

For OfficeScan Server:

  • OfficeScan Server: OfficeScan 10.6 SP3 or 10.5 Patch 5
  • Plug-in Manager: 2.0
  • RAM: 1GB (2GB recommended) with at least 500MB dedicated to OfficeScan
  • Disk space for OfficeScan:
    • 3.1GB if the server has the following:
      • OfficeScan server
      • OfficeScan client
      • Policy Server for Cisco™ NAC
      • Integrated Smart Protection Server (local)
    • 3.5GB if the server has the following:
      • OfficeScan server
      • OfficeScan client
      • Integrated Smart Protection Server (remote)
  • Disk space for Endpoint Encryption Deployment Tool: 1GB
  • Network connectivity: Connectivity with PolicyServer and Connectivity with OfficeScan endpoints
 
For additional OfficeScan system requirements, refer to the OfficeScan documentation.

For OfficeScan agent:

 
Although OfficeScan agents can run on any Windows version, make sure to check the system requirements for each agent of Endpoint Encryption.
  • RAM: 512MB
  • Disk space: 1GB
  • Network connectivity: Connectivity with PolicyServer and Connectivity with OfficeScan endpoints
  • Application: Microsoft .NET Framework 2.0 SP1
  • Processor: Intel(TM) Core(TM) 2 or compatible processor
  • Memory: 1GB
  • Disk space: 30GB with required 20% free disk space and 265MB contiguous free space
  • Network connectivity: Communication with PolicyServer 5.0 required for managed installations
  • Operating Systems:
    • Windows 8(TM) (32/64-bit)
    • Windows 7(TM) (32/64-bit)
    • Windows Vista(TM) with SP1 (32/64-bit)
    • Windows XP(TM) with SP3 (32-bit)
  • Other Software:
    • For Windows 8:
      • Microsoft .NET Framework 3.5 enabled
      • For devices with UEFI, enable legacy bios-compatibility mode in BIOS.UEFI boot mode is not supported.
    • For Windows XP:
      • Microsoft .NET Framework 2.0 SP1 or later
      • Microsoft Windows Installer 3.1
  • Hard disk: Seagate DriveTrust drives or Seagate OPAL and OPAL 2 drives

    RAID and SCSI disks are not supported.

  • Other hardware: ATA, AHCI, or IRRT hard disk controller
  • Processor: Intel™ Core™ 2 or compatible processor
  • Memory:
    • For 64-bit systems: 2GB
    • For 32-bit systems: 1GB
  • Disk space: 30GB with required 20% free disk space and 100MB contiguous free space
  • Hard disk: Standard drives supported by Windows
  • Network connectivity: Connectivity with PolicyServer
  • Operating system:
    • Windows 8™ (32-bit/64-bit) Enterprise and Professional editions
    • Windows 7™ (32-bit/64-bit) Enterprise and Ultimate editions
  • Other software:
    • Trusted Platform Module (TPM) 1.2 or higher
    • Full Disk Encryption is not installed
    • Windows BitLocker is disabled
    • Microsoft .NET Framework 3.5
  • Processor: Intel™ Core™ 2 or compatible processor
  • Memory: 512MB (1GB recommended)
  • Disk space: 400MB
  • Network connectivity: Connectivity with PolicyServer
  • Operating system: Mac OS X Lion™ or Mac OS X Mountain Lion™
  • Other software:
    • Mono runtime environment (MRE) 2.1
    • Apple FileVault is disabled
  • Processor: Intel(TM) Core(TM)2 or compatible processor
  • Memory: 512MB (1GB recommended)
  • Disk space: 2GB with required 20% free disk space
  • Network connectivity: Communication with PolicyServer required for managed installations
  • Operating Systems:
    • Windows 8(TM) (32/64-bit)
    • Windows 7(TM) (32/64-bit)
    • Windows Vista(TM) with SP1 (32/64-bit)
    • Windows XP(TM) with SP3 (32-bit)
  • Other software:
    • For Windows 8: Microsoft .NET Framework 3.5 enabled
    • For Windows XP: Microsoft .NET Framework 2.0 SP1 or later and Microsoft Windows Installer 3.1

Endpoint Encryption 5.0 does not have KeyArmor device. However, upgraded Endpoint Encryption can support KeyArmor.

Premium
Internal
Rating:
Category:
SPEC
Solution Id:
1101850
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.