Co-developed with Intel, McAfee Deep Defender is a first-of-its-kind rootkit protection for Windows 7 and 8 systems with Intel Core processors (i3, i5, or i7) or Intel Xeon processors (E3, E5, or E7 with extended page tables) with Intel® VT technology. Support also extends to Windows 2008 64-bit R2 SP1 Servers with Xeon processors. Once installed, it can detect and block rootkit attacks below the operating system. Deep Defender’s inline approach lets it monitor and evaluate events in real time; allowing it to detect, block, and remediate advanced, hidden attacks that traditional operating system-based security does not detect. To learn more about Deep Defender features, please download the data sheet.
During the installation of this McAfee endpoint suite, the Deep Defender client and associated management files were checked into your McAfee ePO server. Two deployment tasks were automatically created for you. In order to verify which systems are capable of running Deep Defender, the command line switch “–report” was added to one of these tasks. This will provide reporting back to McAfee ePO as to which systems in your environment are compatible with Deep Defender.
Deployment of Deep Defender software
In order to successfully deploy Deep Defender a compatibility check should be performed. This use case will provide the instructions to perform this check, read the results, and deploy the software.
Deploying Deep Defender in Report Mode
Viewing the Deep Defender Compatibility Report
Follow these steps to view the results regarding compatibility of your systems with Deep Defender.
Deploying Deep Defender
Note: Installation of VirusScan Enterprise 8.8 is required prior to deployment of Deep Defender.
After discovering which systems are compatible with Deep Defender, you can simply assign the task named POC - Deploy Deep Defender to your systems and groups. Note that after deployment of Deep Defender, a reboot is required to begin providing rootkit protection.
Video: McAfee Deep Defender*: Hidden Malware Protection
An in-depth look at how McAfee Deep Defender based on DeepSAFE work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Technology Blueprint: Fight Rootkits
Fight stealthy rootkit malware with McAfee’s integrated Security Connected Framework for centralized and efficient risk mitigation.