This guide is for IT Administrators deploying Trend Micro Endpoint Encryption
in medium to large enterprises and Help Desk personnel who manage users, groups,
policies, and devices. The documentation assumes basic device, networking and security
knowledge, including:
-
Endpoint hardware setup and configuration
-
Basic endpoint encryption concepts
-
Hard drive partitioning, formatting, and maintenance
-
Client-server architecture