large-logo-mcafee

McAfee Endpoint Security

Integrated, centrally managed, advanced defenses

Solution Brief Free Trial
ens-video
McAfee Endpoint Security: Protection, performance, and usability in one platform

Advanced, consolidated endpoint defense

McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment.

workflow-white

Core threat prevention

Essential anti-virus, exploit prevention, firewall, and web control communicate with each other.

dashboard-1

Machine learning

State-of-the art techniques identify malicious code based on appearance and behavior.

shield-check-2

Application containment

Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment.

connected-3

Endpoint detection and response

Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click.

gartner-customer-choice-white

A 2018 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms*

Learn More

Product features

Centralized management

The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.

Advanced anti-malware protection

Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.

Machine learning analysis

Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.

Dynamic application containment

Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.

Proactive web security

Ensure safe browsing with web protection and filtering for endpoints.

Actionable threat forensics

Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.

Take a product tour

See how our customers are using McAfee Endpoint Security

    Take the next step

    We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more, or download a free product trial.

    *The Gartner Peer Insights Customers’ Choice logo is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice distinctions are determined by the subjective opinions of individual end-user customers based on their own experiences, the number of published reviews on Gartner Peer Insights and overall ratings for a given vendor in the market, as further described here, and are not intended in any way to represent the views of Gartner or its affiliates.

    Getting Started

    Access these resources to learn more about McAfee Endpoint Security installation, configuration, and management.

    protect-devices-0

    Are we compatible? Review this consolidated list of McAfee-supported operating systems and service packs for McAfee Endpoint Security.

    Learn More >
    compliance-1

    This guide for McAfee Endpoint Security 10.6 for Windows includes information on pre-installation tasks, installing and upgrading the software, post-installation tasks, troubleshooting tips, and more.

    Learn More >
    documents-2

    Begin to learn more about configuring and managing McAfee Endpoint Security.

    Learn More >
    desktop-monitor-3

    This Knowledge Base article answers common questions about McAfee Endpoint Security.

    Learn More >

    Is your endpoint security up to date?

    If you’re running McAfee VirusScan Enterprise, McAfee Host IPS Firewall, or McAfee SiteAdvisor web filtering, you’re not using our latest and most effective endpoint protection. McAfee Endpoint Security is a free security upgrade that simplifies management and leverages machine learning and application containment to halt threats in their tracks. McAfee Endpoint Security offers improved threat protection, better performance, a better user experience, easier management, and better positioning for the future.

    25% improvement in protection

    Independent testing from AV-Comparatives shows that McAfee Endpoint Security increases zero-day protection by 25% versus McAfee VirusScan Enterprise.

    Free update

    Existing McAfee customers, with a current license or entitlement to endpoint security suites, can update to McAfee Endpoint Security for free and retain their policies and client task assignments from legacy products.

    Migrate in less than 20 minutes

    With our Endpoint Upgrade Assistant and flexible migration options, we can help you get started in just 20 minutes.

    Why McAfee Endpoint Security?

    McAfee Endpoint Security consolidates individual legacy products into a single software agent solution. The common architecture allows capabilities that once worked separately to work together and provide improved security and visibility.

    Capabilities McAfee Endpoint Security McAfee VirusScan Enterprise
    Signature-less protection
    Machine learning pre- and post-execution analysis
    Automatic containment of suspicious executables
    Integration with endpoint detection and response
    One-click corrections across entire environment
    Automated workflows for greater efficiency

    Training Courses

    Sign Up for Training

    McAfee offers a variety of courses available in the classroom, online, or in custom sessions for your team.

    Register for Training

     

    Product How-to Videos

    Click on the menu icon at the top left corner of the video to access the full video playlist.

    McAfee Support



    Clean Install

    McAfee defines a clean installation as a deployment where there are no elements of McAfee software pre-existing on the endpoint. See “Upgrades” if there is pre-existing software.

    Review the Supported Environments documentation to ensure that the environment is compatible before deploying McAfee Endpoint Security:

    Review Reference Configurations, which are deployment scenarios that have undergone extensive testing to ensure proper sequencing and improve ease of execution. Each Reference Configuration document contains a product mix that has been validated to work together properly for a specific type of customer profile. Review the following article to learn more and find the applicable Reference Configuration:

    Review the guides below for information about how to install McAfee Endpoint Security and for additional details regarding system requirements.

    NOTE: All McAfee Endpoint Security module features are enabled by default.

    In the event an issue is encountered during installation, see the following documentation:

    All Installation Resources

     

    Upgrade

    McAfee defines an upgrade as a deployment where a version of McAfee Endpoint Security already exists on the endpoint. See “Migration” if legacy McAfee software (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) already exists on the endpoint.

    Review the Supported Environments documentation to ensure that the environment is compatible before deploying McAfee Endpoint Security:

    Use the McAfee Endpoint Upgrade Assistant (EUA) to automate the upgrade process. The EUA analyzes the endpoints in your McAfee ePO environment, detects the supported McAfee products that are installed, and determines the minimum security requirements for upgrading to the current product versions. These steps ensure a successful upgrade.

    In the event an issue is encountered during upgrades, see the following documentation:

    All Upgrade Resources

    Migrate

    McAfee defines migration as a deployment where one or more legacy McAfee products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) already exist on the endpoint where McAfee Endpoint Security will be deployed.

    Review the Supported Environments documentation to ensure that the environment is compatible before deploying McAfee Endpoint Security:

    You can also use the Endpoint Upgrade Assistant (EUA) to migrate from legacy McAfee products. The EUA analyzes the endpoints in your McAfee ePO environment, detects the supported McAfee products that are installed, and determines the minimum security requirements for upgrading to the current product versions. These steps ensure a successful migration.

    The Endpoint Security Trust Model is a new security model that differs from legacy McAfee products. As a result, migrated legacy policies might not align with McAfee Endpoint Security best practices (see “Configuration & Best Practices”). McAfee strongly recommends that migration is used as an opportunity to review current policies and configuration.

    NOTE: All McAfee Endpoint Security module features are enabled by default.

    See the following documentation for information about configuration and best practices for policies with McAfee Endpoint Security:

    In the event an issue is encountered during migration, see the following documentation:

    All Migration Resources

    Configuration & Best Practices

    The default settings for McAfee Endpoint Security typically require additional configuration and tuning for most environments.

    NOTE: All McAfee Endpoint Security module features are enabled by default.

    To get acquainted with the software, review the documentation below:

    Product guides:

    The McAfee Endpoint Security Trust Model is a new security model that differs from legacy McAfee products. As a result, migrated legacy policies might not align with McAfee Endpoint Security best practices. McAfee strongly recommends that adopting McAfee Endpoint Security is used as an opportunity to review current policies and configuration.

    See the following documentation about policy optimization:

    All Performance & Configuration Resources