Intended Audience Parent topic

This guide is for IT Administrators deploying Trend Micro Endpoint Encryption in medium to large enterprises and Help Desk personnel who manage users, groups, policies, and devices. The documentation assumes basic device, networking and security knowledge, including:
  • Endpoint hardware setup and configuration
  • Basic endpoint encryption concepts
  • Hard drive partitioning, formatting, and maintenance
  • Client-server architecture