<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://ess-wiki.advantech.com.tw/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rogerlin</id>
		<title>ESS-WIKI - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://ess-wiki.advantech.com.tw/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rogerlin"/>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/view/Special:Contributions/Rogerlin"/>
		<updated>2026-05-02T05:23:24Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.28.3</generator>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1801</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1801"/>
				<updated>2016-06-06T06:23:40Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Version &amp;amp; Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Endpoint protection for targeted attacks&lt;br /&gt;
*Intelligent, adaptive scanning&lt;br /&gt;
*Advanced anti-malware protection&lt;br /&gt;
*Proactive web security&lt;br /&gt;
*Blocks hostile network attacks&lt;br /&gt;
*Actionable threat forensics&lt;br /&gt;
*Centralized management (McAfee ePO platform) with multiple deployment choices&lt;br /&gt;
*Open, extensible endpoint security framework&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [http://www.mcafee.com/us/resources/solution-briefs/sb-endpoint-security-technology.pdf Overcome the Attacker Advantage with McAfee Endpoint Security 10]&lt;br /&gt;
&lt;br /&gt;
=Version &amp;amp; Supported Operating Systems=&lt;br /&gt;
'''NOTE''': Where applicable, both 32-bit and 64-bit versions are implied. Exceptions are noted explicitly.&amp;lt;br&amp;gt;&lt;br /&gt;
*Client OS&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!Threat Prevention !! Web Control !! Firewall&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10|| minimum 10.1|| minimum 10.1 ||minimum 10.1&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1 update 1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 SP1 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Vista|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows XP SP3 Professional x86|| 10.0.0, 10.0.1 only|| 10.0.0, 10.0.1 only || 10.0.0, 10.0.1 only&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded 8: Pro, Standard, and Industry|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded Standard 7|| Yes|| Yes || Yes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Server OS&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!Threat Prevention !! Web Control !! Firewall&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2012 R2/R2 update 1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008/2008R2 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Storage Server 2008 and 2008 R2|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Small Business Server 2011|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Small Business Server 2008|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2003/2003R2|| 10.0.0, 10.0.1 only|| 10.0.0, 10.0.1 only || 10.0.0, 10.0.1 only&lt;br /&gt;
|}&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB82761 Intel Security Endpoint Security Platform Support]&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Intel_Security_(McAfee)&amp;diff=1759</id>
		<title>Intel Security (McAfee)</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Intel_Security_(McAfee)&amp;diff=1759"/>
				<updated>2016-06-02T07:11:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Advantech provides security solution powered by Intel Security.&amp;lt;br /&amp;gt;&lt;br /&gt;
The history of Intel Security can be seen at [http://www.intelsecurity.com '''''here''''']&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Product Series=&lt;br /&gt;
Here are the product list of Intel Security&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
*'''Whitelist Product'''&lt;br /&gt;
**[[MAC w/o ePO|'''McAfee Application Control without ePO (MAC w/o ePO)''']]&lt;br /&gt;
**[[MAC w/ ePO|'''McAfee Application Control with ePO (MAC w/ ePO)''']]&lt;br /&gt;
**[[MEC|'''McAfee Embedded Control(MEC)''']]&lt;br /&gt;
**[[MIC|'''McAfee Integrity Control (MIC)''']]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
*'''Blacklist Product'''&lt;br /&gt;
**[[Endpoint Security 10|'''Endpoint Security 10''']]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
* '''Drive Protection Product'''&lt;br /&gt;
**[[Drive Encryption|'''Intel Security Drive Encryption''']]&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=AcronisBackupforPC&amp;diff=1723</id>
		<title>AcronisBackupforPC</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=AcronisBackupforPC&amp;diff=1723"/>
				<updated>2016-06-01T05:25:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
*Protect entire PC or laptop with patented reliable disk imaging technology&lt;br /&gt;
*Restore corrupted files, crashed applications, or a full system with a few simple clicks&lt;br /&gt;
*Back up your PCs to several safe locations (including our secure, off-site cloud backup)&lt;br /&gt;
*Restore an entire PC to a new, dissimilar hardware reliably without worrying about incompatibilities&lt;br /&gt;
*Save time and storage with incremental backups and compression&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Universal Restore&lt;br /&gt;
*Granular Recovery&lt;br /&gt;
*Acronis Secure Zone&lt;br /&gt;
*External Hard Drive Restores&lt;br /&gt;
*Automated Backups&lt;br /&gt;
*Acronis Backup to Cloud&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows 2000 Professional SP4 (backup to Acronis Cloud is not supported)&lt;br /&gt;
*Windows XP Professional SP2+ (x86, x64)&lt;br /&gt;
*Windows Vista – all editions (x86, x64)&lt;br /&gt;
*Windows 7 – all editions (x86, x64)&lt;br /&gt;
*Windows 8/8.1 – all editions except for the Windows RT editions (x86, x64)&lt;br /&gt;
*Windows 10 – Home, Pro, Education, and Enterprise editions&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=AcronisBackupforPC&amp;diff=1722</id>
		<title>AcronisBackupforPC</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=AcronisBackupforPC&amp;diff=1722"/>
				<updated>2016-06-01T05:24:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
*Protect entire PC or laptop with patented reliable disk imaging technology&lt;br /&gt;
*Restore corrupted files, crashed applications, or a full system with a few simple clicks&lt;br /&gt;
*Back up your PCs to several safe locations (including our secure, off-site cloud backup)&lt;br /&gt;
*Restore an entire PC to a new, dissimilar hardware reliably without worrying about incompatibilities&lt;br /&gt;
*Save time and storage with incremental backups and compression&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Universal Restore&lt;br /&gt;
*Granular Recovery&lt;br /&gt;
*Acronis Secure Zone&lt;br /&gt;
*External Hard Drive Restores&lt;br /&gt;
*Automated Backups&lt;br /&gt;
*Acronis Backup to Cloud&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=AcronisBackupforPC&amp;diff=1721</id>
		<title>AcronisBackupforPC</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=AcronisBackupforPC&amp;diff=1721"/>
				<updated>2016-06-01T05:21:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
*Protect entire PC or laptop with patented reliable disk imaging technology&lt;br /&gt;
*Restore corrupted files, crashed applications, or a full system with a few simple clicks&lt;br /&gt;
*Back up your PCs to several safe locations (including our secure, off-site cloud backup)&lt;br /&gt;
*Restore an entire PC to a new, dissimilar hardware reliably without worrying about incompatibilities&lt;br /&gt;
*Save time and storage with incremental backups and compression&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2015_with_UR&amp;diff=1720</id>
		<title>Acronis Server Backup OEM 2015 with UR</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2015_with_UR&amp;diff=1720"/>
				<updated>2016-06-01T05:07:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis Server Backup 2015 OEM is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings, or even the entire disk drive or selected partitions. Acronis Nonstop Backup continuously saves changes in your system and files, as often as every five minutes, so you can rollback easily to any point in time if needed.&amp;lt;br&amp;gt; &lt;br /&gt;
Acronis Server Backup 2015 OEM provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&amp;lt;br&amp;gt; &lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis Server Backup 2015 OEM you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&amp;lt;br&amp;gt;&lt;br /&gt;
When performing scheduled backups, Acronis Server Backup 2015 OEM automatically selects a backup mode (full or incremental), in accordance with the backup scheme set by the user.&amp;lt;br&amp;gt; &lt;br /&gt;
You can store backups on almost any PC storage device.&amp;lt;br&amp;gt;&lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis Server Backup 2015 OEM take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Basic Concepts =&lt;br /&gt;
*Backup and recovery &lt;br /&gt;
*Backup versions &lt;br /&gt;
*Backup file format &lt;br /&gt;
*Backup validation &lt;br /&gt;
*Consolidation&lt;br /&gt;
*Disaster recovery &lt;br /&gt;
*Scheduling&lt;br /&gt;
*Factory image&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows 2000 SP4 (All editions except for the Datacenter edition)&lt;br /&gt;
*Windows Server 2003/2003 R2 (The Standard and Enterprise editions)&lt;br /&gt;
*Windows Small Business Server 2003/2003 R2&lt;br /&gt;
*Windows Server 2008 (The Standard, Enterprise, Datacenter, and Web editions)&lt;br /&gt;
*Windows Small Business Server 2008&lt;br /&gt;
*Windows Server 2008 R2 (The Standard, Enterprise, Datacenter, Foundation, and Web editions)&lt;br /&gt;
*Windows MultiPoint Server 2010/2011/2012&lt;br /&gt;
*Windows Small Business Server 2011 (All editions)&lt;br /&gt;
*Windows Server 2012/2012 R2 (All editions)&lt;br /&gt;
*Windows Storage Server 2003/2008/2008 R2/2012/2012 R2&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2015_with_UR&amp;diff=1719</id>
		<title>Acronis Server Backup OEM 2015 with UR</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2015_with_UR&amp;diff=1719"/>
				<updated>2016-06-01T05:06:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis Server Backup 2015 OEM is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings, or even the entire disk drive or selected partitions. Acronis Nonstop Backup continuously saves changes in your system and files, as often as every five minutes, so you can rollback easily to any point in time if needed.&amp;lt;br&amp;gt; &lt;br /&gt;
Acronis Server Backup 2015 OEM provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&amp;lt;br&amp;gt; &lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis Server Backup 2015 OEM you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&amp;lt;br&amp;gt;&lt;br /&gt;
When performing scheduled backups, Acronis Server Backup 2015 OEM automatically selects a backup mode (full or incremental), in accordance with the backup scheme set by the user.&amp;lt;br&amp;gt; &lt;br /&gt;
You can store backups on almost any PC storage device.&amp;lt;br&amp;gt;&lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis Server Backup 2015 OEM take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows 2000 SP4 (All editions except for the Datacenter edition)&lt;br /&gt;
*Windows Server 2003/2003 R2 (The Standard and Enterprise editions)&lt;br /&gt;
*Windows Small Business Server 2003/2003 R2&lt;br /&gt;
*Windows Server 2008 (The Standard, Enterprise, Datacenter, and Web editions)&lt;br /&gt;
*Windows Small Business Server 2008&lt;br /&gt;
*Windows Server 2008 R2 (The Standard, Enterprise, Datacenter, Foundation, and Web editions)&lt;br /&gt;
*Windows MultiPoint Server 2010/2011/2012&lt;br /&gt;
*Windows Small Business Server 2011 (All editions)&lt;br /&gt;
*Windows Server 2012/2012 R2 (All editions)&lt;br /&gt;
*Windows Storage Server 2003/2008/2008 R2/2012/2012 R2&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2015_with_UR&amp;diff=1718</id>
		<title>Acronis Server Backup OEM 2015 with UR</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2015_with_UR&amp;diff=1718"/>
				<updated>2016-06-01T05:02:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows 2000 SP4 (All editions except for the Datacenter edition)&lt;br /&gt;
*Windows Server 2003/2003 R2 (The Standard and Enterprise editions)&lt;br /&gt;
*Windows Small Business Server 2003/2003 R2&lt;br /&gt;
*Windows Server 2008 (The Standard, Enterprise, Datacenter, and Web editions)&lt;br /&gt;
*Windows Small Business Server 2008&lt;br /&gt;
*Windows Server 2008 R2 (The Standard, Enterprise, Datacenter, Foundation, and Web editions)&lt;br /&gt;
*Windows MultiPoint Server 2010/2011/2012&lt;br /&gt;
*Windows Small Business Server 2011 (All editions)&lt;br /&gt;
*Windows Server 2012/2012 R2 (All editions)&lt;br /&gt;
*Windows Storage Server 2003/2008/2008 R2/2012/2012 R2&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2013_with_UR&amp;diff=1717</id>
		<title>Acronis Server Backup OEM 2013 with UR</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2013_with_UR&amp;diff=1717"/>
				<updated>2016-06-01T04:55:25Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis Server Backup OEM 2013 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data by using disk image creation technology.&lt;br /&gt;
&lt;br /&gt;
=Basic Concepts =&lt;br /&gt;
*Backup and recovery &lt;br /&gt;
*Backup versions &lt;br /&gt;
*Backup file format &lt;br /&gt;
*Backup validation &lt;br /&gt;
*Consolidation&lt;br /&gt;
*Disaster recovery &lt;br /&gt;
*Scheduling&lt;br /&gt;
*Factory image&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows Server 2008 R2&lt;br /&gt;
*Windows Server 2012&lt;br /&gt;
*Windows Server 2008&lt;br /&gt;
*Windows Small Business Server 2011&lt;br /&gt;
*Windows Server 2003 R2&lt;br /&gt;
*Windows Server 2003&lt;br /&gt;
*Windows Small Business Server 2008&lt;br /&gt;
*Windows Small Business Server 2003 R2&lt;br /&gt;
*Windows Small Business Server 2003&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2013_with_UR&amp;diff=1716</id>
		<title>Acronis Server Backup OEM 2013 with UR</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2013_with_UR&amp;diff=1716"/>
				<updated>2016-06-01T04:52:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis Server Backup OEM 2013 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data by using disk image creation technology.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows Server 2008 R2&lt;br /&gt;
*Windows Server 2012&lt;br /&gt;
*Windows Server 2008&lt;br /&gt;
*Windows Small Business Server 2011&lt;br /&gt;
*Windows Server 2003 R2&lt;br /&gt;
*Windows Server 2003&lt;br /&gt;
*Windows Small Business Server 2008&lt;br /&gt;
*Windows Small Business Server 2003 R2&lt;br /&gt;
*Windows Small Business Server 2003&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2013_with_UR&amp;diff=1715</id>
		<title>Acronis Server Backup OEM 2013 with UR</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_Server_Backup_OEM_2013_with_UR&amp;diff=1715"/>
				<updated>2016-06-01T04:51:01Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows Server 2008 R2&lt;br /&gt;
*Windows Server 2012&lt;br /&gt;
*Windows Server 2008&lt;br /&gt;
*Windows Small Business Server 2011&lt;br /&gt;
*Windows Server 2003 R2&lt;br /&gt;
*Windows Server 2003&lt;br /&gt;
*Windows Small Business Server 2008&lt;br /&gt;
*Windows Small Business Server 2003 R2&lt;br /&gt;
*Windows Small Business Server 2003&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_OEM_2016&amp;diff=1714</id>
		<title>Acronis True Image OEM 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_OEM_2016&amp;diff=1714"/>
				<updated>2016-06-01T04:46:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image Personal is an integrated software suite that ensures the security of all of the information on your PC. Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Entire PC Backup&lt;br /&gt;
*Disks and partitions Backup&lt;br /&gt;
*Files and folders Backup&lt;br /&gt;
*Rescue Media Builder&lt;br /&gt;
*Acronis Startup Recover Manager (F11)&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows 10 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 7 SP1 (all editions)&lt;br /&gt;
*Windows XP SP3 (32-bit) with limitations*&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_OEM_2016&amp;diff=1713</id>
		<title>Acronis True Image OEM 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_OEM_2016&amp;diff=1713"/>
				<updated>2016-06-01T04:46:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image Personal is an integrated software suite that ensures the security of all of the information on your PC. Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Entire PC Backup&lt;br /&gt;
*Disks and partitions Backup&lt;br /&gt;
*Files and folders Backup&lt;br /&gt;
*Rescue Media Builder&lt;br /&gt;
*Acronis Startup Recover Manager (F11)&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1712</id>
		<title>Acronis True Image 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1712"/>
				<updated>2016-06-01T03:46:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2016 is an integrated software suite that ensures the security of all of the information on your PC. It can back up your documents, photos, email, and selected partitions, and even the entire disk drive, including operating system, applications, settings, and all of your data.&amp;lt;br&amp;gt;&lt;br /&gt;
Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash. &amp;lt;br&amp;gt;&lt;br /&gt;
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a new device, if needed.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Disk backup to a local storage and to Acronis Cloud&lt;br /&gt;
*File backup to a local storage and to Acronis Cloud&lt;br /&gt;
*Rescue bootable media&lt;br /&gt;
*Hard disk cloning&lt;br /&gt;
*Data archivhing&lt;br /&gt;
*Family data protection&lt;br /&gt;
*File synchronization&lt;br /&gt;
*Security and privacy tools&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows XP SP3&lt;br /&gt;
*Windows 7 SP1 (all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows 10 Insider Preview&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1711</id>
		<title>Acronis True Image 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1711"/>
				<updated>2016-06-01T03:45:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2016 is an integrated software suite that ensures the security of all of the information on your PC. It can back up your documents, photos, email, and selected partitions, and even the entire disk drive, including operating system, applications, settings, and all of your data.&amp;lt;br&amp;gt;&lt;br /&gt;
Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash. &amp;lt;br&amp;gt;&lt;br /&gt;
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a new device, if needed.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Disk backup to a local storage and to Acronis Cloud&lt;br /&gt;
*File backup to a local storage and to Acronis Cloud&lt;br /&gt;
*Rescue bootable media&lt;br /&gt;
*Hard disk cloning&lt;br /&gt;
*Data archivhing&lt;br /&gt;
*Family data protection&lt;br /&gt;
*File synchronization&lt;br /&gt;
*Security and privacy tools&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1710</id>
		<title>Acronis True Image 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1710"/>
				<updated>2016-06-01T03:43:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2016 is an integrated software suite that ensures the security of all of the information on your PC. It can back up your documents, photos, email, and selected partitions, and even the entire disk drive, including operating system, applications, settings, and all of your data.&amp;lt;br&amp;gt;&lt;br /&gt;
Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash. &amp;lt;br&amp;gt;&lt;br /&gt;
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a new device, if needed.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1709</id>
		<title>Acronis True Image 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1709"/>
				<updated>2016-06-01T03:42:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2016 is an integrated software suite that ensures the security of all of the information on your PC. It can back up your documents, photos, email, and selected partitions, and even the entire disk drive, including operating system, applications, settings, and all of your data.&lt;br /&gt;
Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash. &lt;br /&gt;
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a new device, if needed.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1708</id>
		<title>Acronis True Image 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2016&amp;diff=1708"/>
				<updated>2016-06-01T03:41:55Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2016 is an integrated software suite that ensures the security of all of the information on your PC. It can back up your documents, photos, email, and selected partitions, and even the entire disk drive, including operating system, applications, settings, and all of your data. &lt;br /&gt;
Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash. &lt;br /&gt;
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a new device, if needed.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_OEM_2016&amp;diff=1707</id>
		<title>Acronis True Image OEM 2016</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_OEM_2016&amp;diff=1707"/>
				<updated>2016-06-01T03:41:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image Personal is an integrated software suite that ensures the security of all of the information on your PC. Backups allow you to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1706</id>
		<title>Acronis True Image 2014 Premium</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1706"/>
				<updated>2016-06-01T03:31:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2014 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings and messages of Microsoft e-mail clients — or even the entire disk drive or selected partitions. Online Backup will allow you to store your files and disks on a remote storage. Your data will be protected even if your computer is lost, stolen or destroyed. Acronis Nonstop Backup continuously saves changes in your system and files, as often as every five minutes, so you can rollback easily to any point in time if needed.&lt;br /&gt;
&lt;br /&gt;
Acronis True Image 2014 provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&lt;br /&gt;
&lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis True Image 2014 you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&lt;br /&gt;
&lt;br /&gt;
Acronis True Image 2014 helps you protect your identity as well. Simply deleting old data will not remove it permanently from your computer. Acronis True Image 2014 includes Acronis DriveCleanser that permanently destroys files and wipes personal information from partitions and/or entire disks, as well as the System Clean-up tool that cleans up your Windows system of all traces of user activity.&lt;br /&gt;
&lt;br /&gt;
When performing scheduled backups, Acronis True Image 2014 automatically selects a backup mode (full, incremental, differential), in accordance with the backup scheme set by the user.&lt;br /&gt;
&lt;br /&gt;
You can store backups on almost any PC storage device.&lt;br /&gt;
&lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis True Image 2014 take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Acronis Startup Recovery Manager (F11)&lt;br /&gt;
*Backup &amp;amp; Recover Disk/partition&lt;br /&gt;
*Backup  &amp;amp; Recover File/Folder&lt;br /&gt;
*Create Bootable USB media with backup file&lt;br /&gt;
*Cloning Disk&lt;br /&gt;
*Cloud Backup (FTP,NAS)&lt;br /&gt;
*WinPE media&lt;br /&gt;
*Universal Restore&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows XP SP3&lt;br /&gt;
*Windows XP Professional x64 Edition SP2&lt;br /&gt;
*Windows Vista SP2 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 7 SP1 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
(!) Windows 8.1 is supported in Build 6614 or later.&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1705</id>
		<title>Acronis True Image 2014 Premium</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1705"/>
				<updated>2016-06-01T03:25:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2014 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings and messages of Microsoft e-mail clients — or even the entire disk drive or selected partitions. Online Backup will allow you to store your files and disks on a remote storage. Your data will be protected even if your computer is lost, stolen or destroyed. Acronis Nonstop Backup continuously saves changes in your system and files, as often as every five minutes, so you can rollback easily to any point in time if needed.&lt;br /&gt;
&lt;br /&gt;
Acronis True Image 2014 provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&lt;br /&gt;
&lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis True Image 2014 you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&lt;br /&gt;
&lt;br /&gt;
Acronis True Image 2014 helps you protect your identity as well. Simply deleting old data will not remove it permanently from your computer. Acronis True Image 2014 includes Acronis DriveCleanser that permanently destroys files and wipes personal information from partitions and/or entire disks, as well as the System Clean-up tool that cleans up your Windows system of all traces of user activity.&lt;br /&gt;
&lt;br /&gt;
When performing scheduled backups, Acronis True Image 2014 automatically selects a backup mode (full, incremental, differential), in accordance with the backup scheme set by the user.&lt;br /&gt;
&lt;br /&gt;
You can store backups on almost any PC storage device.&lt;br /&gt;
&lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis True Image 2014 take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows XP SP3&lt;br /&gt;
*Windows XP Professional x64 Edition SP2&lt;br /&gt;
*Windows Vista SP2 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 7 SP1 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
(!) Windows 8.1 is supported in Build 6614 or later.&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1704</id>
		<title>Acronis True Image 2014 Premium</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1704"/>
				<updated>2016-06-01T03:24:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image 2014 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings and messages of Microsoft e-mail clients — or even the entire disk drive or selected partitions. Online Backup will allow you to store your files and disks on a remote storage. Your data will be protected even if your computer is lost, stolen or destroyed. Acronis Nonstop Backup continuously saves changes in your system and files, as often as every five minutes, so you can rollback easily to any point in time if needed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Acronis True Image 2014 provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&lt;br /&gt;
&lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis True Image 2014 you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&lt;br /&gt;
&lt;br /&gt;
Acronis True Image 2014 helps you protect your identity as well. Simply deleting old data will not remove it permanently from your computer. Acronis True Image 2014 includes Acronis DriveCleanser that permanently destroys files and wipes personal information from partitions and/or entire disks, as well as the System Clean-up tool that cleans up your Windows system of all traces of user activity.&lt;br /&gt;
&lt;br /&gt;
When performing scheduled backups, Acronis True Image 2014 automatically selects a backup mode (full, incremental, differential), in accordance with the backup scheme set by the user.&lt;br /&gt;
&lt;br /&gt;
You can store backups on almost any PC storage device.&lt;br /&gt;
&lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis True Image 2014 take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows XP SP3&lt;br /&gt;
*Windows XP Professional x64 Edition SP2&lt;br /&gt;
*Windows Vista SP2 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 7 SP1 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
(!) Windows 8.1 is supported in Build 6614 or later.&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1703</id>
		<title>Acronis True Image 2014 Premium</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Premium&amp;diff=1703"/>
				<updated>2016-06-01T03:20:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows XP SP3&lt;br /&gt;
*Windows XP Professional x64 Edition SP2&lt;br /&gt;
*Windows Vista SP2 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 7 SP1 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
(!) Windows 8.1 is supported in Build 6614 or later.&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Personal&amp;diff=1702</id>
		<title>Acronis True Image 2014 Personal</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Personal&amp;diff=1702"/>
				<updated>2016-06-01T03:15:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image Personal 2014 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings, or even the entire disk drive or selected partitions.&amp;lt;br&amp;gt; &lt;br /&gt;
Acronis True Image Personal 2014 provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&amp;lt;br&amp;gt; &lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis True Image Personal 2014 you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&amp;lt;br&amp;gt; &lt;br /&gt;
You can store backups on almost any PC storage device.&amp;lt;br&amp;gt; &lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis True Image Personal 2014 take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Acronis Startup Recovery Manager (F11)&lt;br /&gt;
*Backup &amp;amp; Recover Disk/partition&lt;br /&gt;
*Backup  &amp;amp; Recover File/Folder&lt;br /&gt;
*Create Bootable USB media with backup file&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
*Windows XP SP3&lt;br /&gt;
*Windows XP Professional x64 Edition SP2&lt;br /&gt;
*Windows Vista SP2 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 7 SP1 (both x32 and x64 versions, all editions)&lt;br /&gt;
*Windows 8 (all editions)&lt;br /&gt;
*Windows 8.1 (all editions)&lt;br /&gt;
*Windows Home Server 2011&lt;br /&gt;
(!) Windows 8.1 is supported in Build 6614 or later.&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Personal&amp;diff=1701</id>
		<title>Acronis True Image 2014 Personal</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Personal&amp;diff=1701"/>
				<updated>2016-06-01T02:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image Personal 2014 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings, or even the entire disk drive or selected partitions.&amp;lt;br&amp;gt; &lt;br /&gt;
Acronis True Image Personal 2014 provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&amp;lt;br&amp;gt; &lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis True Image Personal 2014 you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&amp;lt;br&amp;gt; &lt;br /&gt;
You can store backups on almost any PC storage device.&amp;lt;br&amp;gt; &lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis True Image Personal 2014 take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Acronis Startup Recovery Manager (F11)&lt;br /&gt;
*Backup &amp;amp; Recover Disk/partition&lt;br /&gt;
*Backup  &amp;amp; Recover File/Folder&lt;br /&gt;
*Create Bootable USB media with backup file&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Personal&amp;diff=1699</id>
		<title>Acronis True Image 2014 Personal</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Acronis_True_Image_2014_Personal&amp;diff=1699"/>
				<updated>2016-06-01T02:40:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Acronis True Image Personal 2014 is an integrated software suite that ensures the security of all of the information on your PC. It can back up the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need. With this software, you can back up selected files and folders, settings, or even the entire disk drive or selected partitions.&amp;lt;br&amp;gt; &lt;br /&gt;
Acronis True Image Personal 2014 provides you with all the essential tools to recover your computer system should a disaster occur, such as losing data, accidentally deleting critical files or folders, or suffering a complete hard disk crash.&amp;lt;br&amp;gt; &lt;br /&gt;
With the unique technology developed by Acronis and implemented in Acronis True Image Personal 2014 you can perform exact, sector-by-sector disk backups. Such backups include all operating systems, applications and configuration files, personal settings, and data.&amp;lt;br&amp;gt; &lt;br /&gt;
You can store backups on almost any PC storage device.&amp;lt;br&amp;gt; &lt;br /&gt;
Windows-style interface and wizards will make your work easier. Just perform a few simple steps and let Acronis True Image Personal 2014 take care of everything else! When a system problem occurs, the software will get you up and running in no time.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Intel_Security_(McAfee)&amp;diff=1692</id>
		<title>Intel Security (McAfee)</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Intel_Security_(McAfee)&amp;diff=1692"/>
				<updated>2016-05-31T10:01:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Product Series */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Advantech provides security solution powered by Intel Security.&amp;lt;br /&amp;gt;&lt;br /&gt;
The history of Intel Security can be seen at [http://www.intelsecurity.com '''''here''''']&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Product Series=&lt;br /&gt;
Here are the product list of Intel Security&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
*'''Whitelist Product'''&lt;br /&gt;
**[[MAC w/o ePO|'''McAfee Application Control without ePO (MAC w/o ePO)''']]&lt;br /&gt;
**[[MAC w/ ePO|'''McAfee Application Control with ePO (MAC w/ ePO)''']]&lt;br /&gt;
**[[MEC|'''McAfee Embedded Control(MEC)''']]&lt;br /&gt;
**[[MIC|'''McAfee Integrity Control (MIC)''']]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
*'''Blacklist Product'''&lt;br /&gt;
**[[Endpoint Security 10 - ThreatProtection|'''Endpoint Security 10 - ThreatProtection''']]&lt;br /&gt;
**[[Endpoint Security 10|'''Endpoint Security 10''']]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
* '''Drive Protection Product'''&lt;br /&gt;
**[[Drive Encryption|'''Intel Security Drive Encryption''']]&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1691</id>
		<title>Drive Encryption</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1691"/>
				<updated>2016-05-31T10:00:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Documents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Drive encryption, also referred to as full disk encryption, is encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Drive encryption is compatible with traditional hard drives (spinning media AKA HDD), solid-state drives (SSD), and self-encrypting drives (SED and OPAL). Drive encryption is managed through the McAfee ePolicy Orchestrator (McAfee ePO) management console.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Key Benefits=&lt;br /&gt;
*Enforces strong access control with pre-boot authentication.&lt;br /&gt;
*Uses military-strength, certified encryption algorithms (FIPS, Common Criteria), and is certified for FIPS 140-2, Common Criteria EAL2+, and Intel Advanced Encryption Standard–New Instructions (AES–NI).&lt;br /&gt;
*Enables automatic, transparent encryption without hindering performance.&lt;br /&gt;
*Supports mixed device environments, including solid-state drives.&lt;br /&gt;
*Supports Trusted Computing Group (TCG) OPAL self-encrypting drives.&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!7.1.3 !! 7.1.1-7.1.2 !! 7.1.0&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2012 R2 || Yes|| Yes || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2012|| Yes|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008 R2 Server Core|| No|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008 R2|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10|| Yes|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows RT || No|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Vista || Yes|| Yes || Yes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB79422&amp;amp;locale=zh_TW Supported operating systems for Drive Encryption 7.1.x]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;br /&gt;
'''Quick Start Guides'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Item || Document || Download&lt;br /&gt;
|-&lt;br /&gt;
|  1 || &amp;lt;big&amp;gt;DriveEncryption Start Guide&amp;lt;/big&amp;gt; || [[Media:EPO_DriveEncryption_Quick_Start_Guide.pdf|'''Download''']]&lt;br /&gt;
|-&lt;br /&gt;
|  2 || &amp;lt;big&amp;gt;McAfee ePO install introduction 1&amp;lt;/big&amp;gt; || [[Media:McAfee®_ePolicy_Orchestrator®_5.1.1_installation_introduction_1.pdf|'''Download''']]&lt;br /&gt;
|-&lt;br /&gt;
|  3 ||  &amp;lt;big&amp;gt;McAfee ePO install introduction 2&amp;lt;/big&amp;gt; || [[Media:McAfee®_ePolicy_Orchestrator®_5.1.1_Check-In_Package_&amp;amp;_Licensing_2.pdf |'''Download''']]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=File:EPO_DriveEncryption_Quick_Start_Guide.pdf&amp;diff=1690</id>
		<title>File:EPO DriveEncryption Quick Start Guide.pdf</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=File:EPO_DriveEncryption_Quick_Start_Guide.pdf&amp;diff=1690"/>
				<updated>2016-05-31T09:58:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=SW-AE&amp;diff=1689</id>
		<title>SW-AE</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=SW-AE&amp;diff=1689"/>
				<updated>2016-05-31T09:55:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* RMM FAQ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Product &amp;amp; Service=&lt;br /&gt;
==RMM FAQ==&lt;br /&gt;
*[[RMM FAQ|RMM FAQ]]&lt;br /&gt;
&lt;br /&gt;
==Intel Security==&lt;br /&gt;
*[[Intel Security (McAfee)|Intel Security (McAfee)]]&lt;br /&gt;
==Acronis==&lt;br /&gt;
*[[Acronis|Acronis]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Technique=&lt;br /&gt;
==[[SW AE/Advantech Product|Advantech Product]]==&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1688</id>
		<title>Drive Encryption</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1688"/>
				<updated>2016-05-31T09:52:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Drive encryption, also referred to as full disk encryption, is encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Drive encryption is compatible with traditional hard drives (spinning media AKA HDD), solid-state drives (SSD), and self-encrypting drives (SED and OPAL). Drive encryption is managed through the McAfee ePolicy Orchestrator (McAfee ePO) management console.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Key Benefits=&lt;br /&gt;
*Enforces strong access control with pre-boot authentication.&lt;br /&gt;
*Uses military-strength, certified encryption algorithms (FIPS, Common Criteria), and is certified for FIPS 140-2, Common Criteria EAL2+, and Intel Advanced Encryption Standard–New Instructions (AES–NI).&lt;br /&gt;
*Enables automatic, transparent encryption without hindering performance.&lt;br /&gt;
*Supports mixed device environments, including solid-state drives.&lt;br /&gt;
*Supports Trusted Computing Group (TCG) OPAL self-encrypting drives.&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!7.1.3 !! 7.1.1-7.1.2 !! 7.1.0&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2012 R2 || Yes|| Yes || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2012|| Yes|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008 R2 Server Core|| No|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows Server 2008 R2|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10|| Yes|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows RT || No|| No || No&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Vista || Yes|| Yes || Yes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB79422&amp;amp;locale=zh_TW Supported operating systems for Drive Encryption 7.1.x]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=MAC_w/o_ePO&amp;diff=1685</id>
		<title>MAC w/o ePO</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=MAC_w/o_ePO&amp;diff=1685"/>
				<updated>2016-05-31T09:36:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Version &amp;amp; Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
'''MAC w/o ePO''' ('''McAfee Application Control without ePO''') is a powerful defense layer that protects your system from unknown security threats by controlling the software execution on the system. &amp;lt;br /&amp;gt;&lt;br /&gt;
Application Control uses the '''whitelisting''' technology (a list of trusted software to execute on the system) to protect your system.&amp;lt;br /&amp;gt;&lt;br /&gt;
It used '''command line''' to setup protection environment.&amp;lt;br /&amp;gt; &lt;br /&gt;
By allowing only the trusted software to run on the system, Application Control&amp;lt;br /&amp;gt;&lt;br /&gt;
*Protects the existing authorized software from any unauthorized modification and deletion attempt. &lt;br /&gt;
*Prevents any attempt to install unauthorized software. &lt;br /&gt;
*Permits software updates only through the trusted channels.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
Application Control protects your system from any unauthorized attempt to update existing software. Application Control includes these features: &lt;br /&gt;
* '''Malware protection''' — Protects systems from malware attacks before they occur, by proactively controlling the application execution on the system.&lt;br /&gt;
*'''Secured ‑ lock system''' — Enables the secured ‑ lock system against threats and unwanted changes. &lt;br /&gt;
*'''Execution protection''' — Prevents execution of unauthorized update that might change the existing applications running on the system. &lt;br /&gt;
*'''Dynamic whitelisting''' — Eliminates the manual maintenance effort when compared with other whitelisting technology. &lt;br /&gt;
*'''Trusted applications''' — Enables administrators to adopt a flexible approach with a centralized repository of trusted applications to run on the system.&lt;br /&gt;
&lt;br /&gt;
=Version &amp;amp; Supported Operating Systems=&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!  Operating System - Windows 32-bit !! MAC 6.2.0 !! MAC 7.0.0&lt;br /&gt;
|-&lt;br /&gt;
| Windows XP|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| Windows 2003/R2|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| Windows 2008 SP1 or later|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows XPE SP1 or later|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| WEPOS SP2 or later|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| POS Ready 2009 SP1 or later|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| WES 2009 SP1 or later|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| Vista SP1|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7/Embedded|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 Pro/Ent|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1 Pro/Ent|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| WES 8 Industry(Pro and Ent)|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| WES 8.1 Industry(Pro and Ent)|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10 (Desktop and IOT Enterprise)|| N|| Y&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!  Operating System - Windows 64-bit !! MAC 6.2.0 !! MAC 7.0.0&lt;br /&gt;
|-&lt;br /&gt;
| Windows XP|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| Windows 2003/R2|| Y|| N&lt;br /&gt;
|-&lt;br /&gt;
| Vista SP1|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 2008/R2 SP1 or later|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7/Embedded|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 Pro/Ent|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1 Pro/Ent|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| WES 8 Industry(Pro and Ent)|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| WES 8.1 Industry(Pro and Ent)|| Y|| Y&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10 (Desktop and IOT Enterprise)|| N|| Y&lt;br /&gt;
|-&lt;br /&gt;
| WS2012 /R2|| Y|| Y&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB73341 Intel Security Platform Support link]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;br /&gt;
'''Quick Start Guides'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Item || Document || Download&lt;br /&gt;
|-&lt;br /&gt;
|  1 || &amp;lt;big&amp;gt;MAC w/o ePO install introduction&amp;lt;/big&amp;gt; || [[Media:McAfee®_Application_&amp;amp;_Change_Control_installation_introduction.pdf|'''Download''']]&lt;br /&gt;
|-&lt;br /&gt;
|  2 ||  &amp;lt;big&amp;gt;MAC w/o ePO Basic Operation introduction&amp;lt;/big&amp;gt; || [[Media:McAfee®_Application_Control_basic_operation_introduction.pdf|'''Download''']]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1683</id>
		<title>Drive Encryption</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1683"/>
				<updated>2016-05-31T09:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Drive encryption, also referred to as full disk encryption, is encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Drive encryption is compatible with traditional hard drives (spinning media AKA HDD), solid-state drives (SSD), and self-encrypting drives (SED and OPAL). Drive encryption is managed through the McAfee ePolicy Orchestrator (McAfee ePO) management console.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Key Benefits=&lt;br /&gt;
*Enforces strong access control with pre-boot authentication.&lt;br /&gt;
*Uses military-strength, certified encryption algorithms (FIPS, Common Criteria), and is certified for FIPS 140-2, Common Criteria EAL2+, and Intel Advanced Encryption Standard–New Instructions (AES–NI).&lt;br /&gt;
*Enables automatic, transparent encryption without hindering performance.&lt;br /&gt;
*Supports mixed device environments, including solid-state drives.&lt;br /&gt;
*Supports Trusted Computing Group (TCG) OPAL self-encrypting drives.&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1682</id>
		<title>Drive Encryption</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1682"/>
				<updated>2016-05-31T09:22:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Drive encryption, also referred to as full disk encryption, is encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Drive encryption is compatible with traditional hard drives (spinning media AKA HDD), solid-state drives (SSD), and self-encrypting drives (SED and OPAL). Drive encryption is managed through the McAfee ePolicy Orchestrator (McAfee ePO) management console.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1681</id>
		<title>Drive Encryption</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Drive_Encryption&amp;diff=1681"/>
				<updated>2016-05-31T09:21:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Drive encryption, also referred to as full disk encryption, is encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Drive encryption is compatible with traditional hard drives (spinning media AKA HDD), solid-state drives (SSD), and self-encrypting drives (SED and OPAL). Drive encryption is a software component available in three McAfee data and endpoint protection suites, and is managed through the McAfee ePolicy Orchestrator (McAfee ePO) management console.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1680</id>
		<title>Endpoint Security 10 - ThreatProtection</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1680"/>
				<updated>2016-05-31T09:17:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Please refer to [[Endpoint Security 10#Overview|Endpoint Security 10 ThreatProtection]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
Please refer to [[Endpoint Security 10#Features|Endpoint Security 10 ThreatProtection]]&amp;lt;br&amp;gt;&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
Please refer to [[Endpoint Security 10#Version &amp;amp; Supported Operating Systems|Endpoint Security 10 ThreatProtection]]&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1679</id>
		<title>Endpoint Security 10 - ThreatProtection</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1679"/>
				<updated>2016-05-31T09:16:11Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Documents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Please refer to [[Endpoint Security 10#Overview|Endpoint Security 10 ThreatProtection]]&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1678</id>
		<title>Endpoint Security 10 - ThreatProtection</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1678"/>
				<updated>2016-05-31T09:15:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Please refer to [[Endpoint Security 10#Overview|Endpoint Security 10 ThreatProtection]]&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1677</id>
		<title>Endpoint Security 10 - ThreatProtection</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1677"/>
				<updated>2016-05-31T09:15:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Please refer to [[Endpoint Security 10#Overview Endpoint Security 10 ThreatProtection]]&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1676</id>
		<title>Endpoint Security 10 - ThreatProtection</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10_-_ThreatProtection&amp;diff=1676"/>
				<updated>2016-05-31T09:14:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Please refer to [Endpoint Security 10#Overview Endpoint Security 10 ThreatProtection]&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1675</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1675"/>
				<updated>2016-05-31T09:11:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Documents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Endpoint protection for targeted attacks&lt;br /&gt;
*Intelligent, adaptive scanning&lt;br /&gt;
*Advanced anti-malware protection&lt;br /&gt;
*Proactive web security&lt;br /&gt;
*Blocks hostile network attacks&lt;br /&gt;
*Actionable threat forensics&lt;br /&gt;
*Centralized management (McAfee ePO platform) with multiple deployment choices&lt;br /&gt;
*Open, extensible endpoint security framework&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [http://www.mcafee.com/us/resources/solution-briefs/sb-endpoint-security-technology.pdf Overcome the Attacker Advantage with McAfee Endpoint Security 10]&lt;br /&gt;
&lt;br /&gt;
=Version &amp;amp; Supported Operating Systems=&lt;br /&gt;
'''NOTE''': Where applicable, both 32-bit and 64-bit versions are implied. Exceptions are noted explicitly.&amp;lt;br&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!Threat Prevention !! Web Control !! Firewall&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10|| minimum 10.1|| minimum 10.1 ||minimum 10.1&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1 update 1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 SP1 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Vista|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows XP SP3 Professional x86|| 10.0.0, 10.0.1 only|| 10.0.0, 10.0.1 only || 10.0.0, 10.0.1 only&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded 8: Pro, Standard, and Industry|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded Standard 7|| Yes|| Yes || Yes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB82761 Intel Security Endpoint Security Platform Support]&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1674</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1674"/>
				<updated>2016-05-31T09:11:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Documents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Endpoint protection for targeted attacks&lt;br /&gt;
*Intelligent, adaptive scanning&lt;br /&gt;
*Advanced anti-malware protection&lt;br /&gt;
*Proactive web security&lt;br /&gt;
*Blocks hostile network attacks&lt;br /&gt;
*Actionable threat forensics&lt;br /&gt;
*Centralized management (McAfee ePO platform) with multiple deployment choices&lt;br /&gt;
*Open, extensible endpoint security framework&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [http://www.mcafee.com/us/resources/solution-briefs/sb-endpoint-security-technology.pdf Overcome the Attacker Advantage with McAfee Endpoint Security 10]&lt;br /&gt;
&lt;br /&gt;
=Version &amp;amp; Supported Operating Systems=&lt;br /&gt;
'''NOTE''': Where applicable, both 32-bit and 64-bit versions are implied. Exceptions are noted explicitly.&amp;lt;br&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!Threat Prevention !! Web Control !! Firewall&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10|| minimum 10.1|| minimum 10.1 ||minimum 10.1&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1 update 1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 SP1 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Vista|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows XP SP3 Professional x86|| 10.0.0, 10.0.1 only|| 10.0.0, 10.0.1 only || 10.0.0, 10.0.1 only&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded 8: Pro, Standard, and Industry|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded Standard 7|| Yes|| Yes || Yes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB82761 Intel Security Endpoint Security Platform Support]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;br /&gt;
'''&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;Under Construction&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;'''&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1673</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1673"/>
				<updated>2016-05-31T09:09:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Endpoint protection for targeted attacks&lt;br /&gt;
*Intelligent, adaptive scanning&lt;br /&gt;
*Advanced anti-malware protection&lt;br /&gt;
*Proactive web security&lt;br /&gt;
*Blocks hostile network attacks&lt;br /&gt;
*Actionable threat forensics&lt;br /&gt;
*Centralized management (McAfee ePO platform) with multiple deployment choices&lt;br /&gt;
*Open, extensible endpoint security framework&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [http://www.mcafee.com/us/resources/solution-briefs/sb-endpoint-security-technology.pdf Overcome the Attacker Advantage with McAfee Endpoint Security 10]&lt;br /&gt;
&lt;br /&gt;
=Version &amp;amp; Supported Operating Systems=&lt;br /&gt;
'''NOTE''': Where applicable, both 32-bit and 64-bit versions are implied. Exceptions are noted explicitly.&amp;lt;br&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Operating System!!Threat Prevention !! Web Control !! Firewall&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10|| minimum 10.1|| minimum 10.1 ||minimum 10.1&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8.1 update 1|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8 SP1 || Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows 7|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Vista|| Yes || Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows XP SP3 Professional x86|| 10.0.0, 10.0.1 only|| 10.0.0, 10.0.1 only || 10.0.0, 10.0.1 only&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded 8: Pro, Standard, and Industry|| Yes|| Yes || Yes&lt;br /&gt;
|-&lt;br /&gt;
| Windows Embedded Standard 7|| Yes|| Yes || Yes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB82761 Intel Security Endpoint Security Platform Support]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1672</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1672"/>
				<updated>2016-05-31T08:57:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Endpoint protection for targeted attacks&lt;br /&gt;
*Intelligent, adaptive scanning&lt;br /&gt;
*Advanced anti-malware protection&lt;br /&gt;
*Proactive web security&lt;br /&gt;
*Blocks hostile network attacks&lt;br /&gt;
*Actionable threat forensics&lt;br /&gt;
*Centralized management (McAfee ePO platform) with multiple deployment choices&lt;br /&gt;
*Open, extensible endpoint security framework&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [http://www.mcafee.com/us/resources/solution-briefs/sb-endpoint-security-technology.pdf Overcome the Attacker Advantage with McAfee Endpoint Security 10]&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1671</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1671"/>
				<updated>2016-05-31T08:56:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
*Endpoint protection for targeted attacks&lt;br /&gt;
*Intelligent, adaptive scanning&lt;br /&gt;
*Advanced anti-malware protection&lt;br /&gt;
*Proactive web security&lt;br /&gt;
*Blocks hostile network attacks&lt;br /&gt;
*Actionable threat forensics&lt;br /&gt;
*Centralized management (McAfee ePO platform) with multiple deployment choices&lt;br /&gt;
*Open, extensible endpoint security framework&amp;lt;br&amp;gt;&lt;br /&gt;
For more information, please refer to [[http://www.mcafee.com/us/resources/solution-briefs/sb-endpoint-security-technology.pdf|Overcome the Attacker Advantage with McAfee Endpoint Security 10]]&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1670</id>
		<title>Endpoint Security 10</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=Endpoint_Security_10&amp;diff=1670"/>
				<updated>2016-05-31T08:51:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Endpoint Security is a comprehensive security management solution that runs on network computers to identify and stop threats automatically. This Help explains how to use the basic security features and troubleshoot problems.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Endpoint Security modules '''&amp;lt;br&amp;gt;&lt;br /&gt;
The administrator configures and installs one or more Endpoint Security modules on client computers. &lt;br /&gt;
*Threat Prevention — Checks for viruses, spyware, unwanted programs, and other threats by scanning items — automatically when users access them or on demand at any time. &lt;br /&gt;
*Firewall — Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. &lt;br /&gt;
*Web Control — Displays safety ratings and reports for websites during online browsing and searching. Web Control enables the site administrator to block access to websites based on safety rating or content.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=MIC&amp;diff=1667</id>
		<title>MIC</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=MIC&amp;diff=1667"/>
				<updated>2016-05-31T08:40:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Documents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Block unauthorized, out-of-policy changes&lt;br /&gt;
'''McAfee Integrity Control (MIC)''' blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including ATMs, point-of-sale (POS) systems, and kiosks. Combining industry-leading whitelisting and change control technology, it prevents out-of-policy changes while still allowing updates from authorized sources.&lt;br /&gt;
&lt;br /&gt;
*Reduce change-related outages and compliance violations.&lt;br /&gt;
*Secure fixed-function devices with a fixed CPU or memory. A low-overhead footprint does not impact system performance, and it is equally effective in standalone mode, without network access.&lt;br /&gt;
*Dynamically manage whitelists and support multiple configurations for different business needs and devices.&lt;br /&gt;
*Centralize deployment and management with the McAfee ePolicy Orchestrator console.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
'''&amp;lt;big&amp;gt;Prevent unapproved changes and applications&amp;lt;/big&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Block unauthorized applications and change attempts'''&lt;br /&gt;
**Ensure that only approved software runs on the point-of-service infrastructure. Easily block unauthorized, vulnerable, or malicious applications that can compromise the security of critical systems.&lt;br /&gt;
&lt;br /&gt;
*'''Link change protection to policy'''&lt;br /&gt;
**Verify changes against the source, time window, or approved change ticket. Changes outside of policy are blocked, and the attempt is sent as an alert to administrators, reducing outages and violations.&lt;br /&gt;
&lt;br /&gt;
*'''Monitor file integrity and file changes'''&lt;br /&gt;
**Check files and directories for changes to content and permissions. McAfee Integrity Control provides continuous file integrity monitoring, essential for verifying the security of an environment and meeting compliance requirements.&lt;br /&gt;
&lt;br /&gt;
*'''Meet and sustain PCI DSS compliance'''&lt;br /&gt;
**Get continuous information about change events across the point-of-service infrastructure to comply with PCI DSS requirements. See information about every change, including the user and the program used to make the change.&lt;br /&gt;
&lt;br /&gt;
*'''Get dynamic whitelisting via a trusted source'''&lt;br /&gt;
**Eliminate the need for IT administrators to manually maintain lists of approved applications. A repository of trusted applications prevents execution of unauthorized scripts and dynamic link libraries, and defends against exploits.&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
Please refer to [[MAC w/ ePO#Supported Operating Systems|MAC w/ ePO Supported Operating Systems]]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;br /&gt;
'''Quick Start Guides'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Item || Document || Download&lt;br /&gt;
|-&lt;br /&gt;
|  1 || &amp;lt;big&amp;gt;McAfee ePO install introduction 1&amp;lt;/big&amp;gt; || [[Media:McAfee®_ePolicy_Orchestrator®_5.1.1_installation_introduction_1.pdf|'''Download''']]&lt;br /&gt;
|-&lt;br /&gt;
|  2 ||  &amp;lt;big&amp;gt;McAfee ePO install introduction 2&amp;lt;/big&amp;gt; || [[Media:McAfee®_ePolicy_Orchestrator®_5.1.1_Check-In_Package_&amp;amp;_Licensing_2.pdf |'''Download''']]&lt;br /&gt;
|-&lt;br /&gt;
|  3 ||  &amp;lt;big&amp;gt;McAfee Application Control with ePO &amp;lt;/big&amp;gt; || [[Media:McAfee®_ePolicy_Orchestrator®_5.1.1_Application_Control_3.pdf |'''Download''']]&lt;br /&gt;
|-&lt;br /&gt;
|  4 ||  &amp;lt;big&amp;gt;McAfee Change Control with ePO &amp;lt;/big&amp;gt; || [[Media:McAfee®_ePolicy_Orchestrator®_5.1.1_Change_Control_4.pdf |'''Download''']]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=File:McAfee%C2%AE_ePolicy_Orchestrator%C2%AE_5.1.1_Change_Control_4.pdf&amp;diff=1666</id>
		<title>File:McAfee® ePolicy Orchestrator® 5.1.1 Change Control 4.pdf</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=File:McAfee%C2%AE_ePolicy_Orchestrator%C2%AE_5.1.1_Change_Control_4.pdf&amp;diff=1666"/>
				<updated>2016-05-31T08:40:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=MIC&amp;diff=1664</id>
		<title>MIC</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=MIC&amp;diff=1664"/>
				<updated>2016-05-31T08:37:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Supported Operating Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Block unauthorized, out-of-policy changes&lt;br /&gt;
'''McAfee Integrity Control (MIC)''' blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including ATMs, point-of-sale (POS) systems, and kiosks. Combining industry-leading whitelisting and change control technology, it prevents out-of-policy changes while still allowing updates from authorized sources.&lt;br /&gt;
&lt;br /&gt;
*Reduce change-related outages and compliance violations.&lt;br /&gt;
*Secure fixed-function devices with a fixed CPU or memory. A low-overhead footprint does not impact system performance, and it is equally effective in standalone mode, without network access.&lt;br /&gt;
*Dynamically manage whitelists and support multiple configurations for different business needs and devices.&lt;br /&gt;
*Centralize deployment and management with the McAfee ePolicy Orchestrator console.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
'''&amp;lt;big&amp;gt;Prevent unapproved changes and applications&amp;lt;/big&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Block unauthorized applications and change attempts'''&lt;br /&gt;
**Ensure that only approved software runs on the point-of-service infrastructure. Easily block unauthorized, vulnerable, or malicious applications that can compromise the security of critical systems.&lt;br /&gt;
&lt;br /&gt;
*'''Link change protection to policy'''&lt;br /&gt;
**Verify changes against the source, time window, or approved change ticket. Changes outside of policy are blocked, and the attempt is sent as an alert to administrators, reducing outages and violations.&lt;br /&gt;
&lt;br /&gt;
*'''Monitor file integrity and file changes'''&lt;br /&gt;
**Check files and directories for changes to content and permissions. McAfee Integrity Control provides continuous file integrity monitoring, essential for verifying the security of an environment and meeting compliance requirements.&lt;br /&gt;
&lt;br /&gt;
*'''Meet and sustain PCI DSS compliance'''&lt;br /&gt;
**Get continuous information about change events across the point-of-service infrastructure to comply with PCI DSS requirements. See information about every change, including the user and the program used to make the change.&lt;br /&gt;
&lt;br /&gt;
*'''Get dynamic whitelisting via a trusted source'''&lt;br /&gt;
**Eliminate the need for IT administrators to manually maintain lists of approved applications. A repository of trusted applications prevents execution of unauthorized scripts and dynamic link libraries, and defends against exploits.&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
Please refer to [[MAC w/ ePO#Supported Operating Systems|MAC w/ ePO Supported Operating Systems]]&lt;br /&gt;
&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	<entry>
		<id>https://ess-wiki.advantech.com.tw/wiki/index.php?title=MIC&amp;diff=1663</id>
		<title>MIC</title>
		<link rel="alternate" type="text/html" href="https://ess-wiki.advantech.com.tw/wiki/index.php?title=MIC&amp;diff=1663"/>
				<updated>2016-05-31T08:35:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rogerlin: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Overview=&lt;br /&gt;
Block unauthorized, out-of-policy changes&lt;br /&gt;
'''McAfee Integrity Control (MIC)''' blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including ATMs, point-of-sale (POS) systems, and kiosks. Combining industry-leading whitelisting and change control technology, it prevents out-of-policy changes while still allowing updates from authorized sources.&lt;br /&gt;
&lt;br /&gt;
*Reduce change-related outages and compliance violations.&lt;br /&gt;
*Secure fixed-function devices with a fixed CPU or memory. A low-overhead footprint does not impact system performance, and it is equally effective in standalone mode, without network access.&lt;br /&gt;
*Dynamically manage whitelists and support multiple configurations for different business needs and devices.&lt;br /&gt;
*Centralize deployment and management with the McAfee ePolicy Orchestrator console.&lt;br /&gt;
&lt;br /&gt;
=Features=&lt;br /&gt;
'''&amp;lt;big&amp;gt;Prevent unapproved changes and applications&amp;lt;/big&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Block unauthorized applications and change attempts'''&lt;br /&gt;
**Ensure that only approved software runs on the point-of-service infrastructure. Easily block unauthorized, vulnerable, or malicious applications that can compromise the security of critical systems.&lt;br /&gt;
&lt;br /&gt;
*'''Link change protection to policy'''&lt;br /&gt;
**Verify changes against the source, time window, or approved change ticket. Changes outside of policy are blocked, and the attempt is sent as an alert to administrators, reducing outages and violations.&lt;br /&gt;
&lt;br /&gt;
*'''Monitor file integrity and file changes'''&lt;br /&gt;
**Check files and directories for changes to content and permissions. McAfee Integrity Control provides continuous file integrity monitoring, essential for verifying the security of an environment and meeting compliance requirements.&lt;br /&gt;
&lt;br /&gt;
*'''Meet and sustain PCI DSS compliance'''&lt;br /&gt;
**Get continuous information about change events across the point-of-service infrastructure to comply with PCI DSS requirements. See information about every change, including the user and the program used to make the change.&lt;br /&gt;
&lt;br /&gt;
*'''Get dynamic whitelisting via a trusted source'''&lt;br /&gt;
**Eliminate the need for IT administrators to manually maintain lists of approved applications. A repository of trusted applications prevents execution of unauthorized scripts and dynamic link libraries, and defends against exploits.&lt;br /&gt;
&lt;br /&gt;
=Supported Operating Systems=&lt;br /&gt;
=Documents=&lt;/div&gt;</summary>
		<author><name>Rogerlin</name></author>	</entry>

	</feed>