Configuring Agentless Audits; How Mcafee Policy Auditor Integrates With The Mcafee Vulnerability Manager Extension; Uniform System Management - McAfee PASCDE-AB-IA - Policy Auditor For Servers Product Manual

Product guide
Table of Contents

Advertisement

Configuring agentless audits

McAfee Policy Auditor can register a McAfee Vulnerability Manager 6.8 or 7.0 (formerly
Foundstone) server to conduct agentless audits.
Agentless audits allow you to audit systems that do not have the McAfee Policy Auditor agent
plug-in installed. McAfee Vulnerability Manager searches for systems using a Host Name or IP
range, adds them to the System Tree, and conducts agentless audits.
Installing the Foundstone ePO Data Integration (ePO 4.5 server or ePO 4.6 server) allows you
to import McAfee Vulnerability Manager data into your ePolicy Orchestrator database and view
that data in reports.
To use the extension with ePolicy Orchestrator software, you must also have an existing McAfee
Vulnerability Manager installation with scanned asset data.
Contents

How McAfee Policy Auditor integrates with the McAfee Vulnerability Manager extension

Configure McAfee Vulnerability Manager and the ePolicy Orchestrator extension
How to handle missing audit results
How to handle mismatched McAfee Vulnerability Manager certificates
How McAfee Policy Auditor integrates with the McAfee
Vulnerability Manager extension
McAfee Policy Auditor and McAfee Vulnerability Manager integrate seamlessly to gather data,
share information, and perform both agent- and system-based audits.
Systems with the agent plug-in installed are referred to as managed systems. Systems without
the agent plug-in are called unmanaged systems.

Uniform system management

McAfee Policy Auditor and McAfee Vulnerability Manager support uniform system management
under ePolicy Orchestrator software.
Managed and unmanaged system are supported the same way:
Assets from a McAfee Vulnerability Manager Discovery Scan are matched to system already
managed by the ePolicy Orchestrator server to avoid duplication. Each system is uniquely
identified. Systems with duplicate names can be added to the System Tree, but they are still
managed as different systems.
A System Tree group can contain both managed and unmanaged systems.
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
27

Advertisement

Table of Contents
loading

This manual is also suitable for:

Policy auditor 6.0

Table of Contents