Installation and Configuration Process Outline

In order to use the ESET Endpoint Encryption Server (EEE Server), the following actions must be performed. Each of these actions are described later in this manual. Where applicable the heading links to the appropriate section.

1.Network Configurations. The EEE Server can be operated in several different configurations using a patented cloud based system.

2.Software Installation. Install the EEE Server.

3.Control Panel. The Control Panel is used to define the basic configuration of the EEE Server, admin users, communications protocols, security settings.

4.Policy Settings. Set the workstation and group policies.  Once these are configured they form the default policy setting for the EEE Server. All workstation teams use the Workstation Policy, and all user teams use the Group Policy. Both policy types can be tailored to suit the requirements of different teams at a later time. When the team is defined, it will take the current policy setting of the preceding level as its default. In the first instance, it will inherit the top level organisational policy. If required, you can edit the team policy to reflect the permissions at that level. See Group Policy section for details.

5.Licensing. Purchase licences to allow the licensing of users and activation of workstations.

6.Encryption Groups and Keys. Define the encryption keys and allocate groups.

7.Teams. Defines the teams within the organisational structure.

8.Team Users. Defines the team users. Team users are defined by email address which can be entered singly or in blocks (copy and paste) as well as incorporating the import from Active Directory function – see the Organisation Manager section.

9.User Specific Encryption Groups. If required you may allocate the users specific encryption groups, other than those inherited from the team definition.

10.Create Workstation Install. Use the merge tool to create an installable EEE package which is then sent to the workstations. The user then runs the install file on receipt (double click on the file), which will install EEE and import the policy setting to that machine as one operation. The user then reboots the machine. During the Install, the machine will automatically register and report its status to the EEE Server.

11.Activation Code. Administrator issues an activation code from the licence to the user which is sent via email or given to the user by some other means.

12.Authentication. When the enters their Windows account, they are prompted for their activation code (sent via email) and are then prompted to set their Key-File password. The user may then log into EEE and use the features as defined by their administrator (or they may have been automatically logged in if enabled and allowed by policy).

13.Workstation. The workstation will then appear in the EEE Server and may be full disk encrypted.

14.Updates. From this point on, if the user details are changed (key groups added, policy changed) the status of the user will alter and they will require a new Key-File to be supplied. The administrator then sends the Key-File (keys and policy) to the user. Once the user has logged on, EEE will automatically implement the policy settings for that user.  

15.Full Disk Encryption. If required (and the licence includes FDE), once the workstation has been authenticated the administrator can initiate Full Disk Encryption for that machine. During this operation the administrator defines the login password for that user.