Are you getting our latest endpoint protection?
If you’re running McAfee VirusScan Enterprise, McAfee Host IPS Firewall, or McAfee SiteAdvisor web filtering, you’re not using our latest and most effective endpoint protection. McAfee Endpoint Security is a free security upgrade that simplifies management and leverages machine learning and application containment to halt threats in their tracks.
Upgrade resources
Learn more
Upgrade Project Planning Guide — Download a comprehensive step-by-step migration guide
Solution brief — Read more about McAfee Endpoint Security
White paper — Get the top five reasons to migrate to McAfee Endpoint Security
Brochure — See a migration broken out into three steps
Infographic — Learn how McAfee Endpoint Security compares to McAfee VirusScan Enterprise
FAQ — Read frequently asked questions about upgrading
Case study — Learn what a city in Sweden experienced by migrating to McAfee Endpoint Security
Events
Webcast replay — Your Best 0-Day Threat Defense is Waiting
Videos
Intro video — Get McAfee Endpoint Security highlights
Recommendations — Hear feedback from customers who already upgraded
Additional resources
Product training — Jumpstart your upgrade with stand-up and integration training
Technical resources — Download tutorials, quick start guides, and KnowledgeBase articles
Professional Services — Contact the Professional Services team with your complex upgrade questions
Newsletter — Sign up to receive our monthly newsletter
McAfee Support Notification Service — Subscribe to receive product news, alerts, and best practices
Ready to migrate? Let's get started.
Step 1: Plan Your Migration |
---|
Start by conducting a thorough planning exercise, identifying a set of initial considerations to assist you with upgrade planning. |
Discuss your current network and systems architecture, and ensure participants and stakeholders possess a high-level understanding of the McAfee Endpoint Security platform. |
Perform an assessment of your current production environment configuration to provide guidance and recommendations for your upgrade. |
Choose your path: Do you want to retain any current settings and assignments for your legacy products?
Download the Endpoint Security 10.5 Installation Guide |
Step 2: Deploy Your New Endpoint Security |
---|
Install, configure, upgrade, and validate the McAfee solution in a non-production environment.
|
Perform validation testing to verify your McAfee products are functional, blocking and monitoring activity, and producing logs and events, which are viewable on client systems and from the McAfee ePO console.
|
Migrate existing policies. Before fully deploying the new McAfee Endpoint Security software to your organization, pilot it in a test environment. Once the pilot test is complete, deploy throughout your organization. McAfee recommends following your organization’s practices for submitting change requests, performing system backups, and developing a recovery plan. |
Step 3: Optimize Your New Endpoint Security |
---|
Ensure your McAfee Endpoint Security solution is aligned with business processes and remains tuned through periodic assessments. Now that you have upgraded to our latest McAfee Endpoint Security, you can take advantage of the integrated components it offers. McAfee Endpoint Security shares its observations in real time with multiple endpoint defense technologies connected to its framework, including: |
What will you gain by upgrading to McAfee Endpoint Security? Hear from customers.

City of Gothenburg
“We saved 40 hours per week by migrating to McAfee Endpoint Security.”
Read Case Study >Why McAfee Endpoint Security?
McAfee Endpoint Security 10 consolidates individual legacy products into Endpoint Security Threat Prevention, Web Control, and Firewall modules. The common architecture allows the protection modules to work together to provide improved security.
Capabilities | McAfee Endpoint Security | McAfee VirusScan Enterprise |
---|---|---|
Signature-less protection |
Yes |
No |
Machine learning pre-and post-execution analysis |
Yes |
No |
Automatic containment of suspicious executables |
Yes |
No |
Integration with McAfee Endpoint Threat Defense and Response Learn More > |
Yes |
No |
One-click corrections across entire environment |
Yes |
No |
Automated workflows for greater efficiency |
Yes |
No |
Want More Help?
Our Professional Services team can provide the guidance and expertise to ensure a successful migration within more complex upgrade scenarios. Contact Professional Services to learn how to optimize your policies, start a pilot upgrade, assess your complete McAfee ePolicy Orchestrator environment, and manage a full McAfee Endpoint Security deployment.