Halt desk-side visits and endless helpdesk calls due to security incidents, outbreaks, or forgotten encryption passwords. Finally, security administrators can deploy, manage, and update security on powered off, disabled, or encrypted endpoints. McAfee ePolicy Orchestrator (McAfee ePO) Deep Command employs Intel vPro Active Management Technology (AMT) for automated, beyond-the-operating system management, reducing operational costs, enhancing security and compliance, and accelerating remote PC remediation.
Remote Management to the Rescue
Now, security administrators can communicate with and take control of their endpoints at the hardware level whether they are powered off, disabled, or encrypted. This connection to the hardware allows for remote management for enforcement of security or compliance policy and reduction of security operational costs. In addition to a better security posture, these controls allow adoption of power management programs to conserve energy but still maintain access to endpoints. Using Intel vPro AMT technology, McAfee ePO Deep Command will access endpoints without relying on the operating system. This hardware-level access enables administrators to power on systems, execute security tasks, and then return the endpoints to their previous power states. McAfee ePO Deep Command can even securely initiate the boot process of endpoints running McAfee Endpoint Encryption without the need for user authentication credentials to conduct remote security tasks. These operations can all happen automatically through the alarm clock or on demand.
Unlock the Power of Intel vPro
McAfee ePO Deep Command helps you get the value of Intel vPro technology by leveraging the Intel Active Management Technology (AMT) alarm clock, remote wake-up capabilities, and keyboard, video, and mouse (KVM), as well as IDE redirection. First, the McAfee ePO Deep Command Discovery and Reporting Module discovers any AMT-capable PCs in your environment. Detailed reports ensure you know exactly which PCs should receive the McAfee ePO Deep Command agent. McAfee ePO Deep Command also streamlines provisioning of Intel AMT with integration to Intel Setup and Configuration Software (SCS) to ease the activation of Intel AMT. Once McAfee ePO Deep Command is installed on provisioned AMT PCs, you are ready to begin remotely managing these PCs beyond the operating system, at the hardware level.
Wake and Execute
Administrators can now conduct security maintenance or time-intensive tasks during off hours, when users will not be disrupted. Using the AMT Alarm Clock, security administrators can power on and wake up a PC, even if encrypted to execute a defined series of security tasks.
Security Ahead of the Threats
With this broad control, security teams have some options for protecting endpoints ahead of emerging threats. Systems can be updated before a potential threat reaches them, and countermeasures can be activated remotely, preventing any impact on user productivity and keeping data safe.
Out-of-Band Recovery of Disabled Endpoints
When there are problems, such as when an OS has been disabled or a hard drive has failed, both administrators and users will appreciate the convenience of integrated management activated by McAfee ePO Deep Command. Whether the PC is local or remote, the administrator can connect to the disabled PC and KVM via AMT to conduct a remote remediation action, such as instructing the PC to boot from another .ISO image on the network.
Enterprise Scalability and ReportingProduct Highlights
McAfee ePO Deep Command enhances the McAfee ePO software management framework, which is proven to scale to hundreds of thousands of endpoints. Designed to support distributed architectures and security management teams, McAfee ePO software provides a unified security policy management and reporting environment for your entire McAfee security infrastructure. Now, it can take your policies and compliance initiatives beyond the operating system too. By extending the information you can include in McAfee ePO software dashboards and reports, you can increase your visibility into each endpoint's compliance as well as the organization's overall security posture. Correlated data makes audit time easy.
- Put protection in place ahead of threats, even if systems are powered off or using encryption
- Ensure that powered-off, remote, and mobile endpoints adhere to policies and configurations
- Eliminate frequent desk-side visits and lengthy service calls
- Improve security response time through immediate access to endpoints regardless of network access status
- Identify Intel vPro-equipped PCs, then enable Intel AMT for streamlined activation