Advice Request Short Guide on How to Install McAfee Endpoint Security

  • Thread starter ForgottenSeer 89360
  • Start date

Please provide comments and solutions that are helpful to the author of this topic.


ForgottenSeer 89360

Thread author
Hi all,

This is a short guide on how to deploy McAfee Endpoint Security 10.7

Once the archive is downloaded, just open it.
You'll see the following screen that looks like a hot mess, but it is in fact very VERY easy to get started.

McAfee Endpoint Security consists of 5 components:
  1. Adaptive Threat Protection (extensive behavioural blocking working against 0-days).
  2. Firewall (stops risky connections, such as intrusions or communication to C&C servers).
  3. Threat Prevention (standard antivirus protection against known and not so known threats).
  4. Web Control (protection against malicious, phishing and unverified websites).
  5. Endpoint Security Platform (provides the UI and link between all components).


Immediately after opening the archive it would be great if you get rid of components you don't need.
These are the MVISION & ePO extensions. MVISION is a paid product and we are looking to use McAfee Endpoint Security as a standalone product.
That's why we can simply type extensions into the windows search bar. We can then use CTRL+A to select all the archives listed bellow and SHIFT+Delete to remove them.


It's also safe to remove the file, the help_mcc and help_mcp,, mcp-win 3.1.0 Build 215 Package #1 (ENU-LICENSED-RELEASE-MAIN).Zip, and
We won't need any of those.

That way we are left with a screen looking like this.


Now it's time to extract the archive and unpack all components to a new folder. After we have successfully unpacked everything to a new folder we have a screen looking like this:


It's time to start installing. Bear in mind none of the installer brings up a UI.
We have to begin with the Endpoint Security Platform. Navigate to Endpoint_Security_Platform_10.7.0.1733.5_client and launch setupCC.exe.


In less than a minute, the platform will be ready.
Now it's time for the standard antivirus component, which is called Threat Prevention. This component will install antivirus with minimal definitions set, so it's recommended that you launch an update right after the installation.

Navigate to Threat_Prevention_10.7.0.1751.10_client and launch setupTP.exe.

In less than a minute, the antivirus will be installed as well.
Now it's time to install Adaptive Threat Protection.

Navigate to Adaptive_Threat_Protection_10.7.0.1929.4_client ands launch setupATP.exe.

In less than a minute this component will be installed as well. There is a McAfee tray icon (M-Shield icon) in the system tray. You can launch the main UI and all installed components should already be listed there.

Now we can install Firewall and Web Control by navigating to their respective folders and launching setupFW.exe and setupWC.exe.

The product is now deployed in full and the main UI should be looking like this:

This guide shows you how to install all components, but you can choose to install for example only Firewall, to complement solutions like Avira, F-Secure or TrendMicro that don't have firewall built-in or you can install just Threat Prevention + Adaptive Threat Protection if you already have a firewall and URL filtering extension. You can't install Adaptive Threat Protection on its own however.
It would make no sense to install Web Control as a standalone component, as McAfee Web Advisor as well as various other web blockers are available as a browser extension, but you can also do that if you feel like it.

I advise you to read McAfee documentation as there is a lot going on in the product settings.
This can be found here:

You can also have a look at my configuration or view additional resources here:

Thanks for reading.
Last edited by a moderator:

ForgottenSeer 89360

Thread author
Is McAfee Client Proxy not needed? I thought it was necessary to the web control module.

By the way, the version on is trial. It's not licensed.
Client proxy provides a connection between McAfee ENS and the McAfee Gateway appliance which nobody would deploy. It’s only used in large corporations such as banks, where high-security is needed. in that case Client Proxy works the same way a VPN would - it redirects the whole traffic to the appliance, where it will be thoroughly examined before it reaches the Endpoint.
Both Symantec Endpoint Protection and McAfee ENS are trials, but they never expire so they can be used without purchase or activation.

ForgottenSeer 89360

Thread author
Important Update:

It has been brought to my attention that the archive containing the Adaptive Threat Prevention component is now shipped with a new name.
This is: HostATP 10.7.0 Build xxxx Package #8(client).zip

Please use this package to install Adaptive Threat Prevention, which provides protection against unknown threats.

Last edited by a moderator:

ForgottenSeer 89360

Thread author
How easy/difficult is its uninstalling process?
Every component (Web Control, Adaptive Threat Protection, Threat Prevention and Firewall) will have a separate uninstall entry. You need to uninstall these one by one, but it's all quick and error-free. Once you remove these, the uninstaller of the main platform will be launched automatically and the product will be removed entirely.


Level 71
Top Poster
Content Creator
Oct 9, 2016

I have left 2x Firewall files, 3xThreat Prevention files, 1x Threat Detection Reporting, 2x Web Control files, 1x Endpoint Security Platform file, 1x McAfee Endpoint Security file and 1x Common file following your advice.

Anymore to be removed? A bit different from yours ah

Last edited:
  • Like
Reactions: Venustus and Nevi

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.