This guide is for IT Administrators deploying Trend Micro
Endpoint Encryption in medium to large enterprises and Help
Desk personnel who manage users, groups, policies, and devices. The documentation
assumes basic device, networking and security knowledge, including:
-
Endpoint hardware setup and configuration
-
Basic endpoint encryption concepts
-
Hard drive partitioning, formatting, and maintenance
-
Client-server architecture