PGP Desktop and PGP Endpoint - Deployment Guide
|Article:TECH149356|||||Created: 2009-03-26|||||Updated: 2013-06-11|||||Article URL http://www.symantec.com/docs/TECH149356|
This article includes a document detailing the best practices when using PGP Desktop and PGP Endpoint.
Note: This article pertains to a version of PGP Desktop and PGP Endpoint that have reached an End of Life(EOL) and End of Support Life(EOSL). For more information on the End of Support Life dates for PGP Software products see the following article.
This document provides step-by-step examples on performing a baseline system scan, installing and authorizing PGP Desktop, and deployment of the PGP Endpoint white list solution.
With the release of the Application Control module of PGP Endpoint, administrators can permit or block users/systems execution of individual programs/files. For systems where PGP Desktop is installed, explicit approval of its files is required for correct operation.
These best practices are detailed in a technical document that can be downloaded below:
Article URL http://www.symantec.com/docs/TECH149356