McAfee EPOLICY ORCHESTRATOR 4.5 Product Manual page 288

Hide thumbs Also See for EPOLICY ORCHESTRATOR 4.5:
Table of Contents

Advertisement

Index
A
access requirements for System Tree
accounts, See user accounts
actions, Rogue System Detection
events and
234
queries and installing sensors
Active Directory
adding systems to the System Tree
configuring Windows authorization
containers, mapping to System Tree groups
enabling user autocreation
systems only synchronization
Active Directory synchronization
borders and
106
deleting systems 108,
109
duplicate entry handling
108
integration with System Tree
Synchronize Now action
108
systems and structure
109
tasks
108
to System Tree structure
123
types
109
adding comments to issues
269
administrator accounts, See user accounts
administrators, global, See global administrators
advanced features, ePolicy Orchestrator
agent
alien, on rogue systems
226
command-line options
97
configuring client tasks 87,
configuring policies to use repositories
configuring proxy settings for
distributing to systems
21
enabling on unmanaged McAfee products
first call to server
112
grouping
56
grouping by assignment rules
GUID and System Tree location
inactive, on rogue systems
installation, See agent installation
introduction to
60
maintenance
89
manage systems using
21
McAfee Agent, ePO components
modes, converting
76
properties, viewing
89
removal methods 98, 99,
100
removing from systems in query results
responses and event forwarding
restoring a previous UNIX version
restoring a previous Windows version
Rogue System Detection configuration
settings, viewing
96
status
101
288
McAfee ePolicy Orchestrator 4.5 Product Guide
105
242
20
38
123
32
109
108
22
88
187
135
76
56
112
226
14
100
251
83
83
231
agent (continued)
system requirements
63
tasks, running from managed systems
uninstalling
99
UNIX installation folder
78
upgrading with phased approach
user interface
93
viewing system information
wake-up calls
92
Windows installation folder
agent activity logs 101,
102
agent distribution
FrmInst.exe command-line
Agent Handlers
about
52
assigning agents
53
assignment priority
57
configuring and managing
53
how they work
52
introduction to
60
moving agents between
56
multiple
52
priority
in sitelist file
52
agent installation
CmdAgent.exe
97
command-line options
80
creating custom packages
70
deployment methods
65
force
66
from an image
72
manually on Windows
68
on UNIX
69
on Windows from ePolicy Orchestrator
on Windows via push technology
package, location of 71,
79
uninstalling
99
update packages
82
using login scripts
71
Agent Monitor
95
agent upgrade 81, 82,
83
agent-server communication
about
61
after agent setup
62
interval, (ASCI)
72
secure communication keys (ASSC)
System Tree sorting
111
agent-server secure communication (ASSC)
about
41
using different key pairs for servers
using one key pair
48
viewing systems that use a key pair
working with keys 46,
47
aggregation, See notifications
Applied Policies
creating queries
151
93
82
90
78
99
66
74
46
49
49

Advertisement

Table of Contents
loading

Table of Contents