PGP Desktop and PGP Endpoint - Deployment Guide

Article:TECH149356  |  Created: 2009-03-26  |  Updated: 2013-06-11  |  Article URL http://www.symantec.com/docs/TECH149356
Article Type
Technical Solution

Issue



This article includes a document detailing the best practices when using PGP Desktop and PGP Endpoint. 
 

Note: This article pertains to a version of PGP Desktop and PGP Endpoint that have reached an End of Life(EOL) and End of Support Life(EOSL). For more information on the End of Support Life dates for PGP Software products see the following article.


Solution



This document provides step-by-step examples on performing a baseline system scan, installing and authorizing PGP Desktop, and deployment of the PGP Endpoint white list solution.

With the release of the Application Control module of PGP Endpoint, administrators can permit or block users/systems execution of individual programs/files. For systems where PGP Desktop is installed, explicit approval of its files is required for correct operation.

These best practices are detailed in a technical document that can be downloaded below:

 

 


Attachments

PGP Desktop and PGP Endpoint - Deployment Guide
pgpDesktop__Endpoint Deployment.pdf (260 kBytes)


Legacy ID



1301


Article URL http://www.symantec.com/docs/TECH149356


Terms of use for this information are found in Legal Notices