Sign In
Upload
Manuals
Brands
MCAFEE Manuals
Software
EPOLICY ORCHESTRATOR 4.0.2 -
MCAFEE EPOLICY ORCHESTRATOR 4.0.2 - Manuals
Manuals and User Guides for MCAFEE EPOLICY ORCHESTRATOR 4.0.2 -. We have
1
MCAFEE EPOLICY ORCHESTRATOR 4.0.2 - manual available for free PDF download: Product Manual
MCAFEE EPOLICY ORCHESTRATOR 4.0.2 - Product Manual (228 pages)
Brand:
MCAFEE
| Category:
Software
| Size: 2.37 MB
Table of Contents
Table of Contents
3
Introducing Epolicy Orchestrator 4.0.2
13
Epolicy Orchestrator 4.0.2 Components and What They Do
13
The Epo Server
13
The Mcafee Agent
14
Using this Guide
14
Audience
15
Where to Find Mcafee Enterprise Product Information
15
Configuring Epolicy Orchestrator Servers
16
Epo User Accounts
17
Global Administrators
17
How Permission Sets Work
17
Contacts
18
Server Settings and the Behaviors They Control
18
Available Server Tasks and What They Do
19
The Audit Log
20
The Event Log
20
Data Exports from any Table or Chart
21
Myavert Security Threats
22
Logging on and off from Epo Servers
22
Logging on to Epo Servers
22
Logging off of Epo Servers
23
Viewing the Server Version Number
23
Working with User Accounts
23
Creating User Accounts
23
Editing User Accounts
24
Deleting User Accounts
24
Working with Permission Sets
24
Creating Permission Sets for User Accounts
25
Duplicating Permission Sets
25
Editing Permission Sets
26
Deleting Permission Sets
26
Working with Contacts
26
Creating Contacts
26
Editing Contacts
27
Deleting Contacts
27
Working with Server Settings
27
Specifying an Email Server
28
Configuring the Template and Location for Exported Reports
28
Determining Which Events Are Forwarded to the Server
28
Viewing and Changing Communication Ports
29
Working with the Server Task Log
29
Viewing the Server Task Log
30
Filtering the Server Task Log
30
Purging the Server Task Log
31
Working with the Audit Log
31
Viewing the Audit Log
31
Purging the Audit Log
32
Purging the Audit Log on a Schedule
32
Working with the Event Log
33
Viewing the Event Log
33
Purging Events
33
Purging the Event Log on a Schedule
34
Working with Myavert Security Threats
34
Configuring Myavert Update Frequency and Proxy Settings
35
Viewing Threat Notifications
35
Deleting Threat Notifications
35
Exporting Tables and Charts to Other Formats
36
Allowed Cron Syntax When Scheduling a Server Task
36
Organizing Systems for Management
38
The System Tree
39
Considerations When Planning Your System Tree
40
Administrator Access
40
Environmental Borders and Their Impact on System Organization
41
Subnets and IP Address Ranges
41
Tags and Systems with Similar Characteristics
42
Operating Systems and Software
42
Tags and How They Work
42
Active Directory and NT Domain Synchronization
43
Active Directory Synchronization
43
NT Domain Synchronization
45
Criteria-Based Sorting
45
How Settings Affect Sorting
46
IP Address Sorting Criteria
46
Tag-Based Sorting Criteria
47
Group Order and Sorting
47
Catch-All Groups
47
How a System Is First Placed in the System Tree
47
Working with Tags
48
Creating Tags with the Tag Builder
49
Excluding Systems from Automatic Tagging
49
Applying Tags to Selected Systems
50
Applying Criteria-Based Tags Automatically to All Matching
50
Creating and Populating Groups
51
Creating Groups Manually
52
Adding Systems Manually to an Existing Group
53
Importing Systems from a Text File
54
Sorting Systems into Criteria-Based Groups
55
Importing Active Directory Containers
57
Importing NT Domains to an Existing Group
59
Synchronizing the System Tree on a Schedule
61
Updating the Synchronized Group with an NT Domain Manually
62
Moving Systems Manually Within the System Tree
62
Distributing Agents to Manage Systems
64
Agents and Superagents
65
Agent-Server Communication
66
Superagents and Broadcast Wake-Up Calls
67
Agent Activity Logs
69
Agent Policy Settings
69
Security Keys
71
Agent-Server Secure Communication Keys
71
Master Repository Key Pair
72
Other Repository Public Keys
72
Methods of Agent Distribution
72
Creating Custom Agent Installation Packages
73
Distributing Agents
73
Deploying the Agent with Epolicy Orchestrator
74
Installing the Agent with Login Scripts
76
Installing the Agent Manually
77
Enabling the Agent on Unmanaged Mcafee Products
78
Including the Agent on an Image
78
Using Other Deployment Products
79
Distributing the Agent to Webshield Appliances and Novell Netware Servers
79
Forcing the Agent to Call in to the Server
79
Upgrading Existing Agents
79
Upgrading Agents Using Login Scripts or Manual Installation
80
Upgrading Agents with Epolicy Orchestrator
80
Removing the Agent
81
Running FRMINST.EXE from a Command Line
81
Removing Agents When Deleting Systems from the System Tree
81
Removing Agents When Deleting Groups from the System Tree
82
Removing Agents from Systems in Query Results
82
Maintaining the Agent
82
Sending Manual Wake-Up Calls to Systems
83
Sending Manual Wake-Up Calls to a Group
83
Sending Wake-Up Calls on a Schedule
84
Viewing the Agent Activity Log
85
Viewing of the Agent and Product Properties
85
Running Agent Tasks from the Managed System
86
Working with Security Keys
88
Agent Command-Line Options
94
Agent Installation Command-Line Options
94
Creating Repositories
96
Repository Types and What They Do
96
Types of Distributed Repositories
98
Repository Branches and Their Purposes
99
Repository List File and Its Uses
99
How Repositories Work Together
100
Ensuring Access to the Source Site
101
Using Internet Explorer Proxy Settings for the Master Repository
101
Configuring Custom Proxy Settings for the Master Repository
102
Working with Source and Fallback Sites
103
Switching Source and Fallback Sites
103
Creating Source Sites
104
Editing Source and Fallback Sites
105
Deleting Source or Fallback Sites
105
Using Superagents as Distributed Repositories
105
Creating Superagent Repositories
106
Selecting Which Packages Are Replicated to Superagent Repositories
106
Deleting Superagent Distributed Repositories
107
Creating and Configuring FTP, HTTP, and UNC Repositories
107
Creating a Folder Location on an FTP, HTTP Server or UNC Share
108
Adding the Distributed Repository to Epolicy Orchestrator
108
Enabling Folder Sharing for UNC and HTTP Repositories
109
Editing Distributed Repositories
110
Deleting Distributed Repositories
110
Working with the Repository List Files
110
Exporting the Repository List SITELIST.XML File
110
Exporting the Repository List SITEMGR.XML File for Backup or Use by Other Servers
111
Importing Distributed Repositories from the SITEMGR.XML File
111
Importing Source Sites from the SITEMGR.XML File
112
Changing Credentials on Multiple Distributed Repositories
112
Managing Products with Policies and Client Tasks
114
Extensions and What They Do
114
Policy Management
115
Policy Application
116
Client Tasks and What They Do
117
Bringing Products under Management
118
Viewing Policy Information
118
Viewing Groups and Systems Where a Policy Is Assigned
118
Viewing the Settings of a Policy
119
Viewing Policy Ownership
119
Viewing Assignments Where Policy Enforcement Is Disabled
119
Viewing Policies Assigned to a Group
120
Viewing Policies Assigned to a Specific System
120
Viewing a Group's Policy Inheritance
120
Viewing and Resetting Broken Inheritance
120
Working with the Policy Catalog
121
Creating a Policy on the Policy Catalog Page
121
Duplicating a Policy on the Policy Catalog Page
122
Editing a Policy's Settings from the Policy Catalog
122
Renaming a Policy from the Policy Catalog
122
Deleting a Policy from the Policy Catalog
123
Working with Policies
123
Changing the Owner of a Policy
123
Sharing Policies between Epo Servers
124
Assigning a Policy to a Group of the System Tree
125
Assigning a Policy to a Managed System
125
Assigning a Policy to Multiple Managed Systems Within a Group
126
Enforcing Policies for a Product on a Group
126
Enforcing Policies for a Product on a System
126
Copying and Pasting Assignments
127
Working with Client Tasks
128
Creating and Scheduling Client Tasks
129
Editing Client Tasks
129
Deleting Client Tasks
129
Frequently Asked Questions
130
Deploying Software and Updates
131
Deployment Packages for Products and Updates
131
Product and Update Deployment
133
Deployment Tasks
134
Update Tasks
134
Global Updating
135
Pull Tasks
136
Replication Tasks
137
Repository Selection
137
Server Task Log
138
Checking in Packages Manually
138
Using the Product Deployment Task to Deploy Products to Managed Systems
139
Configuring the Deployment Task for Groups of Managed Systems
140
Configuring the Deployment Task to Install Products on a Managed System
140
Deploying Update Packages Automatically with Global Updating
141
Deploying Update Packages with Pull and Replication Tasks
142
Using Pull Tasks to Update the Master Repository
143
Replicating Packages from the Master Repository to Distributed Repositories
145
Configuring Agent Policies to Use a Distributed Repository
147
Using Local Distributed Repositories that Are Not Managed
147
Checking in Engine, DAT and EXTRA.DAT Update Packages Manually
148
Updating Managed Systems Regularly with a Scheduled Update Task
149
Confirming that Clients Are Using the Latest DAT Files
149
Evaluating New Dats and Engines before Distribution
150
Manually Moving DAT and Engine Packages between Branches
150
Deleting DAT or Engine Packages from the Master Repository
151
Sending Notifications
152
Notifications and How It Works
153
Throttling and Aggregation
153
Notification Rules and System Tree Scenarios
153
Default Rules
155
Planning
155
Determining How Events Are Forwarded
156
Determining Which Events Are Forwarded Immediately
156
Determining Which Events Are Forwarded
157
Setting up Epo Notifications
157
Giving Users Appropriate Permissions to Notifications
157
Working with SNMP Servers
158
Working with Registered Executables and External Commands
160
Creating and Editing Notification Rules
163
Describing the Rule
163
Setting Filters for the Rule
164
Setting Thresholds of the Rule
164
Configuring the Notifications for the Rule
165
Viewing the History of Notifications
166
Configuring the Notification Log
166
Viewing the Details of Notification Log Entries
167
Purging the Notifications Log
167
Product and Component List
168
Frequently Asked Questions
168
Querying the Database
170
Queries
170
Public and Personal Queries
171
Query Permissions
171
Query Builder
172
Multi-Server Roll-Up Querying
173
Preparing for Roll-Up Querying
174
Registering Epo Servers
174
Creating a Data Roll up Server Task
174
Working with Queries
175
Creating Custom Queries
175
Running an Existing Query
176
Running a Query on a Schedule
176
Making Personal Queries Public
178
Duplicating Queries
178
Sharing a Query between Epo Servers
179
Exporting Query Results to Other Formats
179
Default Queries and What They Display
180
MA: Agent Communication Summary Query
180
MA: Agent Version Summary Query
180
Epo: Compliance History Query
181
Epo: Compliance Summary Query
181
Epo: Malware Detection History Query
181
Epo: Distributed Repository Status Query
182
Epo: Failed User Actions in Epo Console Query
182
Epo: Failed Logon Attempts Query
182
Epo: Multi-Server Compliance History Query
182
Epo: Systems Per Top-Level Group Query
183
Epo: Systems Tagged as Server Query
183
Epo: Today's Detections Per Product Query
183
Assessing Your Environment with Dashboards
184
Dashboards and How They Work
184
Queries as Dashboard Monitors
184
Default Dashboard Monitors
184
Setting up Dashboard Access and Behavior
185
Giving Users Permissions to Dashboards
185
Configuring the Refresh Frequency of Dashboards
185
Working with Dashboards
186
Creating Dashboards
186
Making a Dashboard Active
186
Selecting All Active Dashboards
187
Making a Dashboard Public
187
Detecting Rogue Systems
189
What Are Rogue Systems
189
How the Rogue System Sensor Works
190
Passive Listening to Layer-2 Traffic
190
Intelligent Filtering of Network Traffic
190
Data Gathering and Communications to the Server
191
Systems that Host Sensors
191
How Detected Systems Are Matched and Merged
192
Rogue System Detection States
192
Overall System Status
193
Rogue System Sensor Status
194
Subnet Status
195
Top 25 Subnets
195
Rogue Sensor Blacklist
195
Rogue System Detection Policy Settings
196
Considerations for Policy Settings
196
Rogue System Detection Permission Sets
197
Setting up Rogue System Detection
198
Configuring Rogue System Detection Policy Settings
198
Configuring Server Settings for Rogue System Detection
199
Editing Compliance Settings
199
Editing Matching Settings
199
Editing Sensor Settings
200
Setting up Automatic Responses to Rogue System Detection Events
201
Working with Detected Systems
202
Adding Systems to the Exceptions List
202
Adding Systems to the Rogue Sensor Blacklist
202
Editing System Comments
203
Exporting the Exceptions List
203
Importing Systems to the Exceptions List
204
Merging Detected Systems
204
Removing Systems from the Detected Systems List
204
Removing Systems from the Exceptions List
205
Removing Systems from the Rogue Sensor Blacklist
205
Viewing Detected Systems and Their Details
206
Working with Sensors
206
Changing the Sensor-To-Server Port Number
206
Installing Sensors
207
Editing Sensor Descriptions
208
Removing Sensors
209
Working with Subnets
210
Adding Subnets
210
Deleting Subnets
210
Ignoring Subnets
211
Including Subnets
211
Renaming Subnets
211
Viewing Detected Subnets and Their Details
212
Rogue System Detection Command-Line Options
212
Default Rogue System Detection Queries
213
Appendix: Maintaining Epolicy Orchestrator Databases
214
Performing Daily or Weekly Database Maintenance
214
Performing Weekly Maintenance of MSDE Databases
214
Performing Regular Maintenance of SQL Server Databases
215
Backing up Epolicy Orchestrator Databases Regularly
216
Backing up a SQL Database--See Your SQL Documentation
216
Backing up an MSDE Database
216
Changing SQL Server Information
217
Restoring Epolicy Orchestrator Databases
217
Restoring a SQL Database--See Your SQL Documentation
218
Restoring an MSDE Database from a Backup
218
Advertisement
Advertisement
Related Products
MCAFEE EPOLICY ORCHESTRATOR 4.0 - LOG FILES FOR
MCAFEE EPOLICY ORCHESTRATOR 4.5 -
MCAFEE EPOLICY ORCHESTRATOR 4.5 RELEA
MCAFEE UTILITIES 4.0
McAfee Endpoint Encryption for Files and Folders 4.0.0
McAfee ePolicy Orchestrator 4.6.0
McAfee ePolicy Orchestrator 4.0
McAfee ePolicy Orchestrator
MCAFEE EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S 12-05-2009
MCAFEE EPOLICY ORCHESTRATOR 3.6 - WALKTHROUGH GUIDE
MCAFEE Categories
Software
Firewall
Accessories
Network Hardware
Server
More MCAFEE Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL