ESET Online Help

Select the category
Select the topic

Installation and configuration process outline

To use the ESET Endpoint Encryption Server (EEE Server), you must perform the following actions. Every action is described later in this manual. Where applicable, the heading links to the appropriate section.

1.Network Configurations. The EEE Server can be operated in several different configurations using a patented cloud-based system.

2.Software Installation. Install the EEE Server.

3.Control Panel. Define the basic configuration of the EEE Server, admin users, communications protocols, security settings.

4.Policy Settings. Set the workstation and group policies. When these are configured, they form the default policy setting for the EEE Server. All workstation teams use the Workstation Policy, and all user teams use the Group Policy. Both policy types can be adjusted to fit the requirements of different teams at a later time. When the team is defined, it will take the current policy setting of the preceding level as its default. In the first instance, it will inherit the top-level organizational policy. If required, you can edit the team policy to reflect the permissions at that level. See Group Policy section for details.

5.Licensing. Purchase licenses to allow the licensing of users and activation of workstations.

6.Encryption Groups and Keys. Define the encryption keys and allocate groups.

7.Teams. Define the teams within the organizational structure.

8.Team Users. Define the team users. Team users are defined by email address which can be entered singly or in blocks (copy and paste) and incorporate the import from Active Directory function.

9.User Specific Encryption Groups. If required, you may allocate the users specific encryption groups, other than those inherited from the team definition.

10. Create Workstation Install. Use the merge tool to create an installable EEE package sent to the workstations. The user then runs the install file on receipt (double-click the file), which will install EEE and import the policy setting to that machine as one operation. The user then reboots the machine. During the Install, the machine will automatically register and report its status to the EEE Server.

11. Activation Code. An administrator issues an activation code from the license to the user, which is sent via email or given to the user by other means.

12. Authentication. When the user enters their Windows account, they are prompted for their activation code (sent via email) and are then prompted to set their Key-File password. The user may then log into EEE and use the features defined by their administrator (or they may have been automatically logged in if enabled and allowed by policy).

13. Workstation. The workstation will appear in the EEE Server and may be full disk encrypted.

14. Updates. From this point on, if the user details are changed (key groups added, policy changed), the user´s status will alter, and they will require a new Key-File to be supplied. The administrator then sends the Key-File (keys and policy) to the user. When the user has logged on, EEE will automatically implement the policy settings for that user.

15. Full Disk Encryption. If required (and the license includes FDE), when the workstation is authenticated, the administrator can initiate Full Disk Encryption for that machine. During this operation, the administrator defines the login password for that user.