Ready to migrate? Let's get started.

  1. If you have not started your migration, please use the "Plan" tab below.
  2. If you are migrating your environment, please use the "Deploy tab" below, which covers three common upgrade paths.
  3. If you need a comprehensive list of installation or migration guides, product documentation, and knowledgebase articles that discuss product usage, such as EUA (Endpoint Upgrade Assistant), EUAPC (Endpoint Upgrade Assistant Package Creator), and Endpoint Security, please review our support information.
  4. If you need technical assistance or have questions, please contact technical support using the service portal.
  5. If you need onsite assistance with the migration, please contact our consulting services team.
Step 1: Plan Your Migration

Start by conducting a thorough planning exercise, identifying a set of initial considerations to assist you with upgrade planning.
Download our Upgrade Project Planning Guide

Discuss your current network and systems architecture, and ensure participants and stakeholders possess a high-level understanding of the McAfee Endpoint Security platform.
View online and in-person training courses
Review McAfee Endpoint Security FAQ

Perform an assessment of your current production environment configuration to provide guidance and recommendations for your upgrade.
Download the Endpoint Upgrade Assistant (EUA)
Note: You’ll need your grant number to access this software.

Watch the product overview of McAfee Endpoint Upgrade Assistant: Version 2.4

Choose your path: Do you want to retain any current settings and assignments for your legacy products?

  • No: Install McAfee Endpoint Security without migrating any settings and tasks. Follow the instructions in the McAfee Endpoint Security Installation Guide. Additionally, you may follow the common upgrade path 1 section accessible above by selecting the "Deploy" tab.
  • Yes: Use the Migration Assistant to transfer your settings before deploying McAfee Endpoint Security to systems. If you want to migrate your settings, decide whether to migrate automatically or manually. Additionally, you may follow the common upgrade path 1 section accessible above by selecting the "Deploy" tab.

Download the Endpoint Security 10.7 Installation Guide
Download the Endpoint Security 10.7 Migration Guide

Step 2: Deploy Your New Endpoint Security

This section provides guidance that focuses on the three, most common migration paths.

Path 1 assumes that the currently installed legacy products on the endpoint already meet the requirements for migration, based on supported upgrade paths. Start migration using this path

Path 2 assumes that the version of the existing legacy products do not meet the necessary requirements, and as such the path of least effort, combined with the highest chance of success, is to uninstall the existing products and replace them with a clean installation of Endpoint. Start migration using this path

Path 3 is designed for those environments that wish to use 3rd-party deployment software, such as Microsoft System Center Configuration Manager (SCCM) or IBM BigFix. Start migration using this path

McAfee highly recommends performing this migration on test systems, prior to attempting within a production environment. During the migration, if there are any technical issues experienced, please do not move forward with any additional steps, and contact support using the service portal.

Common Migration Path 1: Using ePO and Endpoint Upgrade Assistant.

  1. ePolicy Orchestrator must be on version 5.9.x or higher, in order to migrate over to Endpoint Security 10.7. If your ePO server is older than the above version, please upgrade it first using the following installation guide.
  2. Check in the Endpoint Security software and extensions now. If you chose to use EMA to migrate existing settings, please use it now to migrate your policies before continuing. If you chose not to retain existing settings, please continue to step 5.
  3. Once ePO is successfully upgraded, please check in the Endpoint Upgrade Assistant extensions using the latest available version. Endpoint Upgrade Assistant allows you to perform a quick analysis of the systems already managed by ePO, to verify that they meet the requirements for migration to ENS. Once EUA is checked in, please access the following guide and start with the "Workflow for analyzing and resolving issues" section to complete analysis of the environment.

    NOTE: If a small portion of the existing systems do not meet the requirement for migration, please consider focusing on the larger portion of the environment and actioning the remaining systems at a later time. Also, for any systems that are currently using McAfee's VirusScan Enterprise for Storage software, which requires use of VirusScan Enterprise, please exclude these from the migration steps for now.

  4. If you would like to retain existing product settings that can be migrated over to Endpoint Security, please check in the Endpoint Migration Assistant extensions now. If you do not wish to retain existing policy configuration, please proceed to step 5. Familiarize yourself with how the Endpoint Migration Assistant can automatically migrate certain policy configurations over to ENS, by watching this video. Please note that this is a comprehensive video, with a duration of 1 hour. You can use the EMA guide instead.
  5. Prepare the software deployment using the Endpoint Upgrade Assistant guide. Once the software deployment is complete, please use the "Verify the Deployment" section of this guide to report on successfully migrated systems.

    NOTE: For any remaining systems for which migration was not successful, or that could not be migrated, please contact support using the service portal for further assistance.

Common Migration Path 2: Uninstall, Reboot, and Install Clean with Endpoint Security.

NOTE: Due to various complexities involving older legacy software versions such as VirusScan Enterprise releases prior to 8.8, there is no directly supported migration path to Endpoint Security. Particularities within each environment may require a customized migration path provided by McAfee. If you would like professional services to design a customized migration path for you, please contact your sales representative. As an additional option, this migration path discusses steps to remove legacy software using standard product uninstall tasks and prepares your ePO server to deploy Endpoint Security 10.7.

  1. Use ePO to create a product deployment task for the existing legacy software. If the systems currently have multiple installed McAfee products, such as VirusScan Enterprise, Host Intrusion Prevention, and SiteAdvisor Enterprise, McAfee recommends separating these uninstall tasks as opposed to a single, combined uninstall task for all products. Within this task, select the option to "uninstall", as opposed to "install."
  2. Within the uninstall task(s), select the desired schedule for the task. Please note that a task scheduled to "run immediately," is only expected to execute one time. If the uninstall task fails, it will not run again when selecting this scheduling option.
  3. Select the systems to perform the uninstall task and use ePO to send a McAfee Agent wake-up call. It is important here to allow enough time for successful execution and removal of the existing products. McAfee recommends that you restart systems at his point.
  4. Once removal is complete, you can send an additional McAfe Agent wake-up call so that the existing McAfee Agent reports back the current system properties, thus allowing ePO's System Tree view to confirm that products have been removed successfully.
  5. At this step, if the currently in-use ePO version does not meet the requirements to migrate to Endpoint Security (version 5.9.x or higher), please upgrade ePO now. If your ePO server version is already at 5.9.x or higher, please continue to step 6.
  6. Once ePO is successfully updated, you should consider taking an action here to also update the existing McAfee Agent to the latest available version. If the existing McAfee Agent version is already on a supported version, please continue to step 7.
  7. Download and check in the Endpoint Security extensions and software packages and start your ENS deployment.
  8. Once the software deployment is complete, to verify that Endpoint Security installed on your endpoints please check your results.

Common Migration Path 3: 3rd-party Deployment

Please follow our step by step instructions.

Step 3: Optimize Your New Endpoint Security

Ensure your McAfee Endpoint Security solution is aligned with business processes and remains tuned through periodic assessments.

 

For more detailed information, visit our Expert Center pages on McAfee Endpoint Security and Endpoint Security Migration
Review the latest recommendations for McAfee Endpoint Security
Continuously improve performance with Endpoint Security 10.x
Subscribe to McAfee Support Notification Service (SNS) to receive product updates
Sign up to receive our monthly McAfee Endpoint Security Migration newsletters
Review commonly asked questions

 

Now that you have upgraded to our latest McAfee Endpoint Security, you can take advantage of the integrated components it offers. McAfee Endpoint Security shares its observations in real time with multiple endpoint defense technologies connected to its framework, including:

 

Integrated endpoint data protection, offering data protection, device control, and file encryption to help avoid data loss.
Machine learning to analyze and halt potential threats by how they look and by how they behave.
Application containment for continuously monitoring and containing malicious application behavior before damage occurs.
Integrated detection and response (EDR) to identify active breaches and equip administrators with interactive investigations.

What will you gain by upgrading to McAfee Endpoint Security? Hear from customers.

New Standard Corporation

“The evolution of the endpoint has been great with McAfee.”

Watch Video

City of Gothenburg

“We saved 40 hours per week by migrating to McAfee Endpoint Security.”

Read Case Study

Peer Review

Check out these reviews of solutions in McAfee, verified by Gartner.

Learn More