McAfee ePO Deep Command provides secure and remote security management access to PCs that may be powered off or disabled. ePO Deep Command utilizes Intel® vPro™ Active Management Technology (AMT) to deliver beyond the operating system management, reducing security operations costs while enhancing your security posture. Using Intel vPro AMT, ePO Deep Command enables secure remote access regardless of the PC’s power or encrypted state so security administrators can remotely remediate compromised systems, enable energy-saving initiatives, wake systems, and apply proactive security.
By communicating with endpoints at a level beyond the operating system, ePO Deep Command allows security administrators to configure and remediate hard-to-manage endpoints from a central site, using an established and familiar management platform — McAfee ePolicy Orchestrator.
Deploy security ahead of an attack — Switch on the powered-off PCs to keep them up-to-date by installing the latest security updates, patches, service packs, and other important security tasks. You can even schedule a time to switch on your AMT systems using the AMT Alarm Clock feature.
Reduce end user impact — Conduct intensive security tasks during off hours by waking up PCs to run scans without affecting end users' performance.
Reduce power while maintaining control — Decrease power consumption by encouraging and enforcing power-off policies, knowing that those systems are available for remote security control.
Quickly remediate endpoints — Whether the PC is local or remote, the administrator can connect to the disabled PC via Intel AMT to conduct secure remote remediation.
Streamline and reduce effort to discover and provision Intel AMT to allow customers to quickly take advantage of McAfee ePO Deep Command on Intel vPro-based PCs.
Conduct security maintenance or time-intensive tasks during off hours without impacting productivity. Using the AMT Alarm Clock, security administrators can power on and wake up a PC to execute a defined series of security tasks.
Connect to the disabled PC via Intel® vPro™ Active Management Technology (AMT), whether the PC is local or remote, to conduct a remote boot from another boot image on the network.
Securely extend the reach of remote remediation with full support of KVM and be able to completely control the remote PC’s keyboard, video, and mouse to greatly simplify remediation capabilities.
Wake up encrypted PCs with McAfee encryption and conduct security tasks or other updates without the user being involved to authenticate the encryption software. Requires McAfee Endpoint Encryption 7.0.
Wake PCs, update policies, and return them to lower power states to save energy and pursue industry incentives to cut power consumption without compromising security.
Protect endpoints ahead of emerging threats. You can update systems before a potential breach and remotely activate countermeasures without impacting productivity.
Use the McAfee ePO Deep Command Discovery and Reporting module to discover Intel vPro AMT-capable PCs in your environment. Detailed reports ensure you know exactly what PCs you can deploy the ePO Deep Command agent.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
McAfee ePO Deep Command allows security administrators to configure and remediate hard-to-manage endpoints from a central site, using an established and familiar management platform — McAfee ePolicy Orchestrator.
An in-depth video examining how McAfee ePO Deep Command uses the Intel vPro technology to provide security management beyond the OS. This video will drill into the popular use case of McAfee ePO Deep Command, such as deploying security ahead of an attack, remote remediation and wake and patch.
McAfee ePO Deep Command Software Future-Proofs Client Security at Man.
The community resource page for McAfee ePO Deep Command offers many technical resources, including announcements on betas, video demonstrations, FAQs, and documentation on product implementation and management.
Topics : Endpoint Protection
For a technical summary on the McAfee product listed above, please view the product data sheet.