McAfee Endpoint Security 10 is an integrated solution that replaces several individual legacy endpoint products, including McAfee VirusScan Enterprise, McAfee Host IPS Firewall, and McAfee SiteAdvisor web filtering. If you're an existing customer with one of our Endpoint Security suites, McAfee Endpoint Security 10 is a free security upgrade. Simply log in to McAfee ePolicy Orchestrator (McAfee ePO) and access McAfee Endpoint Security 10 in the Software Manager, or use your grant number to download the software package via McAfee ePO.
Using the McAfee Endpoint Upgrade Assistant is the easiest way to get your systems running Endpoint Security today. McAfee® Endpoint Upgrade Assistant is a McAfee® ePolicy Orchestrator® (McAfee® ePO™) extension which simplifies and automates the tasks required to upgrade the McAfee products on your managed endpoint. EUA analyzes the endpoints in your McAfee ePO environment, detects the supported McAfee products that are installed, and determines the minimum requirements for upgrading to current versions of the products. For more information, please refer to Knowledge Base article KB88141 - Introduction to Endpoint Upgrade Assistant.
Top Reasons to Migrate to McAfee Endpoint Security 10
Customers with legacy Endpoint Security products are entitled to upgrade to the latest version at no extra cost. Improvements compared to McAfee Endpoint legacy products include:
- 48% faster initial on-demand scans
- 57% faster application launch
- 30% faster file copy
- 18% reduction in idle CPU utilization
Better threat remediation, intelligence, and forensics
McAfee Endpoint Security 10 takes control of the threat defense lifecycle with technologies that communicate utilizing McAfee Data Exchange Layer and McAfee Threat Intelligence Exchange to combat advanced threats and deliver actionable threat forensics—all in language you can easily understand. Integrated McAfee Global Threat Intelligence helps prevent malicious threats from occurring. The McAfee Endpoint Security platform also simplifies the delivery of future advanced threat protection and defense technologies allowing them to plug in and collaborate without requiring point product updates.
Legacy products consolidated into a next-generation platform
McAfee Endpoint Security 10 consolidates individual legacy products into Endpoint Security Threat Prevention, Web Control, and Firewall modules. The common architecture allows the protection modules to work together to provide improved security.
- Turn on only the modules you want and enable the rest whenever you’re ready.
- The 12 configuration policies in McAfee VirusScan Enterprise have been condensed down to five threat prevention policies.
- McAfee Host IPS protections are now included within the Threat Prevention module, as Exploit Prevention security.
Two Easy Migration Paths
Use the Endpoint Migration Assistant to select the right migration path based on your network, managed systems, and migration goals.
Do you want to retain any current settings and assignments for your legacy products?
No: Install McAfee Endpoint Security 10 without migrating. Follow the instructions in the McAfee Endpoint Security Installation Guide.
Yes: Use the Migration Assistant to transfer your settings before deploying McAfee Endpoint Security 10 to systems. If you want to migrate your settings, decide whether to migrate automatically or manually.
Automatic migration is a hands-off process and the Migration Assistant makes all decisions behind the scenes. Customers create new policies and client tasks automatically, based on current product settings, and assign them to groups and managed systems based on current assignments.
- Networks with fewer than 250 managed systems.
- Customers who use default policy settings or a minimum number of custom policies.
- Customers migrating the Host IPS Catalog.
- Requires minimal user input.
- Migrates all settings, including policies and client tasks, for each supported product at the same time.
- Retains policy and client task assignments.
- Migrates the Host IPS Catalog.
Manual migration is a hands-on process that does not retain assignments. You make most of the migration decisions by selecting the objects to migrate and editing their settings, if needed.
- Networks with more than 250 managed systems.
- Customers who use multiple custom policies.
- Customers who want to fine-tune existing policy settings.
- Customers who want to fine-tune assignments.
- Customers who want personally supervise and approve each step of the migration process.
- Allows you to select each policy and client task to migrate.
- Allows you to edit the settings for each policy or client task to migrate.
|Prepare for Your Migration|
To streamline the migration process and minimize potential conflicts, Intel Security recommends that you review and revise existing policies and assignments that you plan to migrate. During your review, identify any policies or tasks that you can consolidate to simplify the migration process. Additionally, you should also remove any duplicate objects.
Be sure to notify other McAfee ePO administrators to not make any modifications to the Policy Catalog, Client Task Catalog, or Firewall Catalog during migration. If objects change while the migration is in progress, the new objects will not reflect those changes.
|Endpoint Security Migration Assistant||Migrate to McAfee Endpoint Security||Migrate from McAfee VirusScan Enterprise ||Migrating from McAfee Host Intrusion|
This table describes what happens when McAfee Endpoint Security is installed.
|Legacy Product||McAfee Endpoint Security Module||Action|
|McAfee VirusScan Enterprise||Threat Prevention||VirusScan Enterprise will always be removed. If the Threat Prevention module is selected as part of the deployment task, it will be installed.|
|McAfee Host Intrusion Prevention Firewall Module||Firewall||If the Host IPS Firewall module is enabled, Endpoint Security Firewall will be inactive even if it is installed. Once the Host IPS Firewall module is disabled (e.g., via policy change), Endpoint Security Firewall will become active.|
|McAfee Host Intrusion Prevention IPS Module||Threat Prevention||If the Host Intrusion Prevention IPS module is enabled, the Threat Prevention Exploit Prevention functionality will be inactive, even if it is installed. Once the Host Intrusion Prevention IPS module is disabled (e.g., via policy change), the Threat Prevention Exploit Prevention functionality will become active.|
|McAfee SiteAdvisor||Web Control||SiteAdvisor will always be removed. The Web Control module will be installed if it is selected as part of the deployment task.|
Our Professional Services team can provide the guidance and expertise to ensure a successful migration within more complex upgrade scenarios. Contact Professional Services to learn how to optimize your policies, start a pilot upgrade, assess your complete McAfee ePO environment and/or manage a full McAfee Endpoint Security 10 deployment.
|Stay connected with Intel Security for the latest content and updates. Sign up to receive communications >|