CUMC Home | Columbia University | Jobs at CUMC | Contact CUMC | Find People
Columbia University Medical Center logo,  Columbia University Medical Center Information Technology
For support: call extension 5-Help (212-305-4357) or email us

Installing Symantec Endpoint Encryption

Please be sure to give yourself plenty of time when first using Symantec Endpoint Encryption (SEE). While the installation may take a few minutes, hard disk encryption can take a few hours depending on how much data is being encrypted.
IMPORTANT: Installation of SEE does not automatically enable pre-boot authentication, please see information for Verifying or Requesting Pre-Boot Authentication with SEE.

The steps immediately below describe installation via the SEE form, which will prompt you to download an installation file after you have successfully submitted the form.

Installing Symantec Endpoint Encryption from the CUMC IT Online Form

  1. Select the link in to the lower left column of this page for the Symantec Endpoint Encryption Installation Form. You will be prompted to log in to the form; please use your Columbia UNI and its password.
    NOTE: Symantec Endpoint Encryption is available to current CUMC affiliates only.
  2. Follow the instructions on the form to submit your request. Note that all fields are required. Select the Submit button at the bottom of the form when done.
  3. The Symantec Endpoint Encryption Software Download page will appear. Select the appropriate link to download the zipped installation file for 32 or 64-bit Windows. If you are not sure whether your Windows computer is 32-bit or 64-bit see this Microsoft article for help.
  4. A File Download window will appear; select Save to download the installation file to your computer.

    Symantec Endpoint Encryption Download

  5. When prompted, save the installation file to your Desktop; if it does not automatically select this location use the links in the left of the Save As window to choose your Desktop.
    The downloaded file can be deleted once SEE installation is completed.

    Symantec Endpoint Encryption Download to Desktop

  6. When the download is complete, click Open if prompted or double-click the SEE zip file on your desktop.

    Symantec Endpoint Encryption Installation Zip File

  7. Open the SEE folder within the zipped file, then double-click on the first installation file (1_x32 or 1_x64 depending on the bit version you've downloaded) to begin installing Symantec Endpoint Encryption.

    SEE 3 Installation files

  8. In the Open File - Security Warning window that appears, select the Run button. You may also be prompted to type in your computer's Administrative password.

    Symantec Endpoint Encryption Security Warning

  9. Click Next when prompted to by the Symantec InstallShield Wizard.

    Symantec Endpoint Installtion Wizard

  10. Select Next again to accept the default installation location on your computer.

    Symantec Endpoint Encryption

  11. Click Install at the following window to allow installation to begin.

    Symantec Endpoint Encyrption Installation prompt

  12. Symantec will display the progress of installation, it may take a few minutes to complete. Once the Installation Completed window appears, click the Finish button.

    Symantec Endpoint Encryption Intallation Completed window

  13. Click Yes when prompted to restart, then log back in to the computer after restart and repeat from step 7 for the 2nd file; repeat again for the 3rd file.
    IMPORTANT: be sure to install all three files in order.

    Symantec Endpoint Encryption restart prompt

  14. Once all 3 files have been installed and the computer has restarted, log back in and follow instructions on the After Installation page to verify encryption. Please note that the computer may respond a little more slowly than usual while encryption is first being completed; after initial encryption the speed will return to normal since only new or modified files will require encryption.
Do not shut down, restart or run updates on the computer while initial encryption is being performed; see the After Installation page for full instructions.

| TOP |

Last updated 10/28/2014