McAfee PASCDE-AB-IA - Policy Auditor For Servers Product Manual page 94

Product guide
Table of Contents

Advertisement

Index
A
absolute scoring model, Policy Auditor
accept events, file integrity monitoring 62,
agent plug-in debug tool
display help
84
execute tool
83
run a benchmark
85
run a check
85
run an audit
84
save debug information
86
audience for Policy Auditor Product Guide
audit creation and editing
activate a benchmark for use in audit
assign benchmark profiles
41
filter benchmarks based on labels
selecting benchmarks
43
using audit builder
43
audits
add group
41
add system
41
add tag
41
benchmarks
39
blackout period
44
concept 11,
39
Data Collection Scan 36,
37
delete
44
differentiating expired results
disable
44
Foundstone, create audit that uses
frequency (how often data is gathered)
introduction
10
missing audit results 36,
37
no results
40
run manually
43
run on demand
42
set whiteout and blackout periods
specify criteria
41
Vulnerability Manager, create audit that uses
when audits are run
40
whiteout period
44
audits results
export
47
view
46
audits, scoring models on Policy Auditor
absolute scoring model
51
changing the scoring model
default scoring model
49
flat scoring model
50
flat unweighted scoring model
B
baseline, file integrity monitoring
benchmark profiles
effect on system audits
41
94
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
51
66
8
42
41
40
42
40
44
42
51
50
60
benchmarks
activate for use in Policy Auditor
defining frequency
43
select benchmarks for an audit
used in audits
39
using Foundstone to audit systems
using Vulnerability Manager to audit systems
C
CCE implementation
89
certificates for Vulnerability Manager ePO Extension 37,
checks
use in audits
39
Common Configuration Enumeration (CCE)
common criteria requirements
92
Common Platform Enumeration (CPE)
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System (CVSS)
compare file versions, file integrity monitoring 62,
compliance audits
10
components installed
12
conventions used in this guide
8
CPE implementation
89
CVE implementation
88
CVSS implementation
90
D
dashboards, Policy Auditor
default provided by Policy Auditor
PA:Compliance Summary dashboard
PA:MS Patch Status Summary dashboard
PA:Operations
80
PA:PCI Summary
81
queries as dashboard monitors
Data Collection Scan
28
Data Import server task
29
default scoring model, Policy Auditor
delete audits
44
differentiating expired results
40
disable audits
44
documentation
product-specific, finding
9
typographical conventions
8
E
ePolicy Orchestrator
features used by Policy Auditor
events, file integrity monitoring 62,
expiration date, Policy Auditor waivers
F
FDCC compliance
87
file integrity monitoring
accept events 62,
66
42
43
43
43
38
89
89
88
90
65
77
80
80
82
49
13
66
54

Advertisement

Table of Contents
loading

This manual is also suitable for:

Policy auditor 6.0

Table of Contents