PGP Desktop and PGP Endpoint - Deployment Guide

Article:TECH149356  |  Created: 2009-03-26  |  Updated: 2013-06-11  |  Article URL
Article Type
Technical Solution


This article includes a document detailing the best practices when using PGP Desktop and PGP Endpoint. 

Note: This article pertains to a version of PGP Desktop and PGP Endpoint that have reached an End of Life(EOL) and End of Support Life(EOSL). For more information on the End of Support Life dates for PGP Software products see the following article.


This document provides step-by-step examples on performing a baseline system scan, installing and authorizing PGP Desktop, and deployment of the PGP Endpoint white list solution.

With the release of the Application Control module of PGP Endpoint, administrators can permit or block users/systems execution of individual programs/files. For systems where PGP Desktop is installed, explicit approval of its files is required for correct operation.

These best practices are detailed in a technical document that can be downloaded below:




PGP Desktop and PGP Endpoint - Deployment Guide
pgpDesktop__Endpoint Deployment.pdf (260 kBytes)

Legacy ID


Article URL

Terms of use for this information are found in Legal Notices