Endpoint Encryption 6.0 Installation Guide
>
Upgrade and Migration
>
Migration Scenarios
>
Replacing a Previously Installed Encryption Product
> Option 1: Remove Previous Encryption Product
Online Help Center Home
Introduction
Deployment Planning
Deployment Considerations
Sample Deployments
Simple Deployment
Control Manager Deployment
OfficeScan Deployment
Large Enterprise Deployment
Deployment Including Legacy Agents
Administration Considerations
Network Infrastructure Checklist
Security Infrastructure Checklist
End User Communication
Network Maintenance
System Requirements
PolicyServer System Requirements
PolicyServer MMC System Requirements
Full Disk Encryption System Requirements
Recommended Disk Combinations
File Encryption System Requirements
Encryption Management for Microsoft BitLocker System Requirements
Encryption Management for Apple FileVault System Requirements
PolicyServer Installation
Installing PolicyServer
Installing PolicyServer MMC
Configuring PolicyServer
Logging on to PolicyServer MMC
Adding a Top Group
Adding a New User to a Group
Allowing a User to Install Agents in a Group
Traffic Forwarding Services for Legacy Agents
Control Manager Integration
Control Manager Integration Overview
Supported Control Manager Versions
Adding PolicyServer as a Managed Product to Control Manager
Removing a PolicyServer Managed Product from Control Manager
Endpoint Encryption Agent Deployment
Endpoint Encryption Agents
Agent Installation Prerequisites
Automated Deployments
Command Builder
Command Line Helper
Full Disk Encryption Deployment
Full Disk Encryption Manual Deployment
Full Disk Encryption Automatic Deployment
Encryption Management for Microsoft BitLocker Installation
Encryption Management for Microsoft BitLocker Manual Deployment
Encryption Management for Microsoft BitLocker Automatic Deployment
Encryption Management for Apple FileVault Installation
Encryption Management for Apple FileVault Manual Deployment
Encryption Management for Apple FileVault Automatic Deployment
File Encryption Deployment
File Encryption Manual Deployment
File Encryption Automatic Deployment
Upgrade and Migration
Upgrade Summary of Operations
Upgrade Paths
Upgrading PolicyServer
Upgrading PolicyServer
Upgrading Multiple PolicyServer Services Connected to the Same Database
Upgrading PolicyServer MMC
Upgrading Endpoint Encryption Agents
Supported Agent Versions
Upgrading Full Disk Encryption
Upgrading File Encryption
Upgrading Encryption Management for Apple FileVault
Upgrading Encryption Management for Microsoft BitLocker
Migration Scenarios
Replacing a Previously Installed Encryption Product
Option 1: Remove Previous Encryption Product
Option 2: Back Up and Re-image the Endpoint
Migrating Full Disk Encryption to a New Enterprise
Migrating Agents to a New PolicyServer
Changing the Full Disk Encryption PolicyServer
Changing the Encryption Management for Apple FileVault PolicyServer
Changing the Encryption Management for Microsoft BitLocker PolicyServer
Changing the File Encryption PolicyServer
Uninstallation
Uninstalling Endpoint Encryption Agents
Manually Uninstalling Endpoint Encryption Agents
Uninstalling Full Disk Encryption
Uninstalling Encryption Management for Apple FileVault
Uninstalling Encryption Management for Microsoft BitLocker
Uninstalling File Encryption
Using OfficeScan to Uninstall Endpoint Encryption Agents
Uninstalling PolicyServer
Uninstalling the PolicyServer MMC
Uninstalling PolicyServer
Uninstalling the Endpoint Encryption Proxy
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback
Option 1: Remove Previous Encryption Product
Decrypt the disk using the defined method as provided by the software vendor.
Uninstall the previously installed vendor’s software (or verify BitLocker is disabled).
Reboot the device.
Run
chkdsk
and defragment the drive.
Check each device for a Normal Master Boot Record (MBR) and confirm that a Normal Boot Sector is present on the boot partition.
Note:
The device cannot be a dual-boot machine.
Back up user files.
Install Full Disk Encryption. For more information, see
Full Disk Encryption Deployment
.
Parent topic:
Replacing a Previously Installed Encryption Product