Sign In
Upload
Manuals
Brands
MCAFEE Manuals
Software
EPOLICY ORCHESTRATOR 4.5 -
MCAFEE EPOLICY ORCHESTRATOR 4.5 - Manuals
Manuals and User Guides for MCAFEE EPOLICY ORCHESTRATOR 4.5 -. We have
4
MCAFEE EPOLICY ORCHESTRATOR 4.5 - manuals available for free PDF download: Product Manual, Installation Manual, Supplement Manual, Release Note
MCAFEE EPOLICY ORCHESTRATOR 4.5 - Product Manual (298 pages)
Brand:
MCAFEE
| Category:
Software
| Size: 2.93 MB
Table of Contents
Table of Contents
3
Introducing Epolicy Orchestrator 4.5
14
Components and What They Do
14
Using this Guide
15
Audience
15
Finding Documentation for Mcafee Enterprise Products
15
Getting Started with Epolicy Orchestrator 4.5
17
Logging on and off Epo Servers
17
Logging on to Epo Servers
17
Logging off Epo Servers
17
Viewing the Server Version Number
18
How to Navigate the Epo Interface
18
The Menu
18
The Navigation Bar
19
Setting up Epolicy Orchestrator
19
Configure Your Epo Server
20
Add Systems to the System Tree
20
Distribute Agents to Your Systems
21
Create Repositories
21
Configure Your Policies and Client Tasks
22
Deploy Your Products and Software
22
Configure Advanced Features
22
Configuring Epolicy Orchestrator
23
Epo User Accounts
24
Global Administrators
24
Working with User Accounts
24
How Permission Sets Work
25
Working with Permission Sets
26
Contacts
28
Working with Contacts
28
Server Settings and the Behaviors They Control
29
Working with Server Settings
30
Installing Trusted Security Certificate for Epo
34
Managing Epolicy Orchestrator Users with Active Directory
36
Configuring Windows Authentication and Authorization
37
Registering Servers for Use with Epolicy Orchestrator
39
What Are Registered Servers
39
Registering Servers
39
Security Keys and How They Work
41
Backing up and Restoring Keys
42
Master Repository Key Pair
44
Agent-Server Secure Communication (ASSC) Keys
46
Myavert Security Threats
50
Working with Myavert Security Threats
50
Agent Handlers and What They Do
52
How Agent Handlers Work
52
Handler Groups and Priority
52
Working with Agent Handlers
53
Ipv6
58
Exporting Tables and Charts to Other Formats
59
Distributing Agents to Manage Systems
60
About the Mcafee Agent
60
Agent-Server Communication
61
Wake-Up Calls and Wake-Up Tasks
62
Superagents and Broadcast Wake-Up Calls
63
System Requirements and Supported Operating Systems and Processors
63
Installing the Mcafee Agent
65
Methods of Agent Deployment and Installation
65
Agent Installation Folder - Windows
78
Agent Installation Folder - UNIX-Based Systems
78
The Agent Installation Package
79
Agent Installation Command-Line Options
80
Assigning Values to Custom Properties
81
Upgrading and Restoring Agents
81
Upgrading Agents Using Product Deployment Task
82
Upgrading Agents Manually or with Login Scripts
83
Restoring a Previous Version of the Agent (Windows)
83
Restoring a Previous Version of the Agent (UNIX)
83
Configuring Agent Policies
83
About Agent Policy Settings
84
Proxy Settings for the Agent
86
Retrieving System Properties
87
Scheduling a Client Task for a Group
87
Creating a New Scheduled Client Task
88
Configuring Selected Systems for Updating
89
Working with the Agent from the Epo Server
89
Viewing Agent and Product Properties
89
Viewing System Information
90
Accessing Settings to Retrieve Properties
90
Windows System and Product Properties Reported by the Agent
91
Sending Manual Wake-Up Calls to Systems
92
Sending Manual Wake-Up Calls to a Group
92
Making the System Tray Icon Visible
93
Locating Inactive Agents
93
Running Agent Tasks from the Managed System
93
Running a Manual Update
94
Enforcing Policies
94
Updating Policies
95
Sending Properties to the Epo Server
95
Sending Events to the Epo Server Immediately
95
Using the Icon Option to Update
95
Forcing the Agent to Call in to the Server
96
Viewing Version Numbers and Settings
96
Agent Command-Line Options
97
Using the System Tray Icon
97
What the System Tray Icon Does
97
Making the System Tray Icon Visible
98
Enabling User Access to Updating Functionality
98
Removing the Mcafee Agent
98
Running Frminst.exe from the Command Line
99
Removing Agents When Deleting Systems from the System Tree
99
Removing Agents When Deleting Groups from the System Tree
99
Removing Agents from Systems in Query Results
100
Uninstalling from Non-Windows Operating Systems
100
Agent Activity Logs
101
Viewing the Agent Activity Log
101
Organizing the System Tree
103
The System Tree
104
Considerations When Planning Your System Tree
105
Administrator Access
105
Environmental Borders and Their Impact on System Organization
106
Subnets and IP Address Ranges
106
Tags and Systems with Similar Characteristics
107
Operating Systems and Software
107
Tags and How They Work
107
Active Directory and NT Domain Synchronization
108
Active Directory Synchronization
108
NT Domain Synchronization
110
Criteria-Based Sorting
110
How Settings Affect Sorting
111
IP Address Sorting Criteria
111
Tag-Based Sorting Criteria
111
Group Order and Sorting
112
Catch-All Groups
112
How a System Is First Placed in the System Tree
112
Working with Tags
113
Creating Tags with the Tag Builder
113
Excluding Systems from Automatic Tagging
114
Applying Tags to Selected Systems
115
Applying Criteria-Based Tags Automatically to All Matching Systems
115
Creating and Populating Groups
116
Creating Groups Manually
118
Adding Systems Manually to an Existing Group
118
Importing Systems from a Text File
119
Sorting Systems into Criteria-Based Groups
121
Importing Active Directory Containers
123
Importing NT Domains to an Existing Group
125
Synchronizing the System Tree on a Schedule
127
Updating the Synchronized Group with an NT Domain Manually
128
Moving Systems Manually Within the System Tree
128
Transferring Systems between Epo Servers
129
Creating Repositories
130
Repository Types and What They Do
130
Types of Distributed Repositories
132
Repository Branches and Their Purposes
133
Repository List File and Its Uses
134
How Repositories Work Together
134
Ensuring Access to the Source Site
135
Configuring Proxy Settings
135
Configuring Proxy Settings for the Mcafee Agent
135
Configuring Proxy Settings for Myavert Security Threats
136
Working with Source and Fallback Sites
137
Switching Source and Fallback Sites
137
Creating Source Sites
137
Editing Source and Fallback Sites
138
Deleting Source Sites or Disabling Fallback Sites
139
Using Superagents as Distributed Repositories
139
Creating Superagent Repositories
139
Selecting Which Packages Are Replicated to Superagent Repositories
140
Deleting Superagent Distributed Repositories
141
Creating and Configuring FTP, HTTP, and UNC Repositories
141
Creating a Folder Location on an FTP, HTTP Server or UNC Share
141
Adding the Distributed Repository to Epolicy Orchestrator
142
Avoiding Replication of Selected Packages
143
Disabling Replication of Selected Packages
144
Enabling Folder Sharing for UNC and HTTP Repositories
144
Editing Distributed Repositories
144
Deleting Distributed Repositories
145
Working with the Repository List Files
145
Exporting the Repository List Sitelist.xml File
145
Exporting the Repository List Sitemgr.xml File for Backup or Use by Other Servers
146
Importing Distributed Repositories from the Sitemgr.xml File
146
Importing Source Sites from the Sitemgr.xml File
147
Changing Credentials on Multiple Distributed Repositories
147
Managing Your Network with Policies and Client Tasks
148
Product Extensions and What They Do
148
Policy Management
149
Policy Application
150
Creating Policy Management Queries
151
Client Tasks and What They Do
152
Bringing Products under Management
153
Viewing Policy Information
153
Viewing Groups and Systems Where a Policy Is Assigned
153
Viewing the Settings of a Policy
154
Viewing Policy Ownership
154
Viewing Assignments Where Policy Enforcement Is Disabled
154
Viewing Policies Assigned to a Group
155
Viewing Policies Assigned to a Specific System
155
Viewing a Group's Policy Inheritance
155
Viewing and Resetting Broken Inheritance
155
Working with the Policy Catalog
156
Creating a Policy from the Policy Catalog Page
156
Duplicating a Policy on the Policy Catalog Page
157
Editing a Policy's Settings from the Policy Catalog
157
Renaming a Policy from the Policy Catalog
158
Deleting a Policy from the Policy Catalog
158
Working with Policies
158
Changing the Owners of a Policy
159
Moving Policies between Epo Servers
159
Assigning a Policy to a Group of the System Tree
160
Assigning a Policy to a Managed System
160
Assigning a Policy to Multiple Managed Systems Within a Group
161
Enforcing Policies for a Product on a Group
161
Enforcing Policies for a Product on a System
162
Copying and Pasting Assignments
162
Working with Client Tasks
164
Creating and Scheduling Client Tasks
164
Editing Client Tasks
164
Deleting Client Tasks
165
Frequently Asked Questions
165
Sharing Policies Among Epo Servers
166
Setting up Policy Sharing for Multiple Epo Servers
166
How Policy Assignment Rules Work
167
Policy Assignment Rule Priority
168
Working with Policy Assignment Rules
168
Deploying Software and Updates
171
Deployment Packages for Products and Updates
171
Product and Update Deployment
173
Deployment Tasks
173
Update Tasks
174
Global Updating
174
Pull Tasks
175
Replication Tasks
176
Repository Selection
177
Server Task Log
177
Checking in Packages Manually
178
Using the Product Deployment Task to Deploy Products to Managed Systems
179
Configuring the Deployment Task for Groups of Managed Systems
179
Configuring the Deployment Task to Install Products on a Managed System
180
Deploying Update Packages Automatically with Global Updating
181
Deploying Update Packages with Pull and Replication Tasks
183
Using Pull Tasks to Update the Master Repository
183
Replicating Packages from the Master Repository to Distributed Repositories
185
Configuring Agent Policies to Use a Distributed Repository
187
Using Local Distributed Repositories that Are Not Managed
188
Checking in Engine, DAT and Extradat Update Packages Manually
189
Updating Managed Systems Regularly with a Scheduled Update Task
190
Confirming that Clients Are Using the Latest DAT Files
190
Evaluating New Dats and Engines before Distribution
191
Manually Moving DAT and Engine Packages between Branches
192
Deleting DAT or Engine Packages from the Master Repository
192
Reporting on System Status
193
Queries
193
Public and Personal Queries
194
Query Permissions
194
Query Builder
195
Working with Queries
196
Creating Custom Queries
196
Running an Existing Query
197
Running a Query on a Schedule
197
Making a Personal Query Group
199
Making Existing Personal Queries Public
200
Duplicating Queries
200
Sharing a Query between Epo Servers
200
Exporting Query Results to Other Formats
201
Multi-Server Rollup Querying
202
Preparing for Rollup Querying
202
Creating a Query to Define Compliance
204
Generating Compliance Events
204
The Audit Log
205
Working with the Audit Log
205
The Server Task Log
207
Working with the Server Task Log
210
Allowed Cron Syntax When Scheduling a Server Task
211
The Threat Event Log
212
Working with the Threat Event Log
213
Data Exports from any Table or Chart
214
Monitoring with Dashboards
216
Default Dashboards and Their Monitors
216
Queries as Dashboard Monitors
216
Setting up Dashboard Access and Behavior
218
Giving Users Permissions to Dashboards
219
Configuring the Refresh Frequency of Dashboards
219
Working with Dashboards
219
Creating Dashboards
220
Making a Dashboard Active
220
Selecting All Active Dashboards
220
Making a Dashboard Public
221
Detecting Rogue Systems
222
What Are Rogue Systems
223
How the Rogue System Sensor Works
223
Passive Listening to Layer-2 Traffic
223
Intelligent Filtering of Network Traffic
224
Data Gathering and Communications to the Server
224
Systems that Host Sensors
225
How Detected Systems Are Matched and Merged
225
Rogue System Detection States
226
Overall System Status
226
Rogue System Sensor Status
227
Subnet Status
228
Top 25 Subnets
228
Rogue Sensor Blacklist
229
Rogue System Detection Policy Settings
229
Considerations for Policy Settings
229
Rogue System Detection Permission Sets
231
Setting up Rogue System Detection
231
Configuring Rogue System Detection Policy Settings
232
Configuring Server Settings for Rogue System Detection
232
Editing Detected System Compliance
232
Editing Detected Systems Matching
233
Editing Rogue System Sensor Settings
234
Editing Detected System Exception Categories
234
Editing Detected System Ouis
235
Working with Detected Systems
235
Adding Systems to the Exceptions List
235
Adding Systems to the Rogue Sensor Blacklist
236
Adding Detected Systems to the System Tree
236
Editing System Comments
237
Exporting the Exceptions List
237
Importing Systems to the Exceptions List
238
Merging Detected Systems
238
Pinging a Detected System
238
Querying Detected System Agents
239
Removing Systems from the Detected Systems List
239
Removing Systems from the Exceptions List
239
Removing Systems from the Rogue Sensor Blacklist
240
Viewing Detected Systems and Their Details
240
Working with Sensors
240
Changing the Sensor-To-Server Port Number
241
Installing Sensors
241
Editing Sensor Descriptions
243
Removing Sensors
243
Working with Subnets
244
Adding Subnets
244
Deleting Subnets
244
Ignoring Subnets
245
Including Subnets
245
Renaming Subnets
245
Viewing Detected Subnets and Their Details
246
Rogue System Detection Command-Line Options
246
Default Rogue System Detection Queries
247
Setting up Automatic Responses
248
Automatic Responses and How It Works
249
Throttling, Aggregation, and Grouping
249
Default Rules
250
Planning
251
Determining How Events Are Forwarded
251
Determining Which Events Are Forwarded Immediately
251
Determining Which Events Are Forwarded
252
Configuring Automatic Responses
252
Assigning Permission Sets to Access Automatic Responses
252
Working with SNMP Servers
254
Working with Registered Executables and External Commands
256
Creating and Editing Automatic Response Rules
258
Describing the Rule
258
Setting Filters for the Rule
259
Setting Thresholds of the Rule
259
Configuring the Action for Automatic Response Rules
260
Frequently Asked Questions
261
Managing Issues and Tickets
263
Ways to Manage Issues
263
Creating, Configuring, and Managing Issues
264
Creating Basic Issues Manually
264
Configuring Responses to Automatically Create Issues
265
Managing Issues
269
Purging Closed Issues
270
Purging Closed Issues Manually
270
Purging Closed Issues on a Schedule
270
Tickets and How They Work
271
Ways to Add Tickets to Issues
271
Assignment of Ticketed Issues to Users
271
How Tickets and Ticketed Issues Are Closed
271
Benefits of Adding Comments to Ticketed Issues
271
How Tickets Are Reopened
272
Synchronization of Ticketed Issues
272
Integration with Ticketing Servers
272
Considerations When Deleting a Registered Ticketing Server
273
Required Fields for Mapping
273
Sample Mappings
273
Working with Tickets
276
Adding Tickets to Issues
276
Synchronizing Ticketed Issues
276
Synchronizing Ticketed Issues on a Schedule
277
Working with Ticketing Servers
277
Installing Extensions for Ticketing Server
278
Registering and Mapping a Ticketing Server
281
Configuring the Field Mappings
282
Upgrading a Registered Ticketing Server
284
Appendix: Maintaining Epolicy Orchestrator Databases
285
Perform Regular Maintenance of SQL Server Databases
285
Backup and Restore Epolicy Orchestrator Databases
286
Changing SQL Server Information
286
Advertisement
MCAFEE EPOLICY ORCHESTRATOR 4.5 - Installation Manual (30 pages)
Brand:
MCAFEE
| Category:
Software
| Size: 0.64 MB
Table of Contents
Table of Contents
3
Pre-Installation
5
System Requirements
5
Server and Agent Handler Requirements
5
Database Requirements
7
Database Considerations
8
Distributed Repositories
10
Supported Products and Components
10
Operating Systems Language Support
11
First-Time Installation
13
Installing the Server
13
Installing an Agent Handler
15
Upgrading to Epolicy Orchestrator 4.5
17
Removing Unused Consoles
17
Unsupported Products
17
Performing Backups before Upgrading
18
Upgrading the Epo Server from Version 3.6.1
18
Upgrading the Epo Server from Version 4.0
20
Post-Installation Tasks
22
Completing a First-Time Installation
22
Completing an Upgrade
22
Migrating Events from Version 3.6.1
23
Files to Check in Manually
23
Configuring the Software for a Server with Multiple Nics
24
Uninstalling the Software
24
Troubleshooting
26
Common Installation Messages and Their Solutions
26
Default Locations of Troubleshooting Log Files
29
McAfee EPOLICY ORCHESTRATOR 4.5 - Supplement Manual (15 pages)
Operational User Guidance and Preparative Procedures
Brand:
McAfee
| Category:
Software
| Size: 0.54 MB
Table of Contents
License Agreement
2
License Information
2
Table of Contents
3
1 Introduction
5
About the Common Criteria
5
Assumptions
6
Authorized Administrators
6
Physical Access
6
Acronyms
6
2 Installation Guidelines and Preparative Procedures
7
Overview
7
Downloading the TOE
7
Evaluated Configuration
8
Functionality Not Included in the Evaluation
9
Verify Software
9
Updating System Software
10
Install Database Capacity Monitor Extension
10
Step 1: Adjust or Review Database Space Requirements
11
Step 2: Create a Server Task to Generate the Event
11
Step 3: Setting up the Automatic Response
12
3 Guidance for Administrators
15
Software Version Inspection
15
Required Password Length
15
Advertisement
MCAFEE EPOLICY ORCHESTRATOR 4.5 - Release Note (10 pages)
Brand:
MCAFEE
| Category:
Software
| Size: 0.06 MB
Table of Contents
Drag and Drop
2
Ipv6 Support
2
Known Issues
3
Installation and Upgrade Issues
3
Browser Issues
4
Other Issues
5
Migration Considerations
6
Other Information
7
Finding Documentation for Mcafee Enterprise Products
8
Advertisement
Related Products
MCAFEE EPOLICY ORCHESTRATOR 4.0 - LOG FILES FOR
MCAFEE EPOLICY ORCHESTRATOR 4.5 RELEA
MCAFEE EPOLICY ORCHESTRATOR 4.0.2 -
MCAFEE UTILITIES 4.0
McAfee Endpoint Encryption for Files and Folders 4.0.0
McAfee ePolicy Orchestrator 4.6.0
McAfee ePolicy Orchestrator 4.0
McAfee ePolicy Orchestrator
MCAFEE EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S 12-05-2009
MCAFEE EPOLICY ORCHESTRATOR 3.6 - WALKTHROUGH GUIDE
MCAFEE Categories
Software
Firewall
Accessories
Network Hardware
Server
More MCAFEE Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL