Agent Activity Logs; Distributing Agents - McAfee EPOLICY ORCHESTRATOR 3.6 - WALKTHROUGH GUIDE Manual

System protection, a product overview and quick set up in a test environment version 3.6
Table of Contents

Advertisement

®
ePolicy Orchestrator
3.6 Walkthrough Guide

Agent activity logs

Distributing agents

The agent log files are useful when determining agent status or troubleshooting
problems. There are two log files that record agent activity, both are located in the
agent installation folders on the managed system running Windows 95, Windows 98,
or Windows NT systems. On managed systems running Windows 2000, Windows
2003, and Windows XP , these files are located in the
):
Documents and Settings
Agent activity log
The agent activity log is an
is the NetBIOS name of the system on which the agent is installed. This log file
records agent activity related to such things as policy enforcement, agent-to-server
communication, and event forwarding. You can define a size limit of this log file.
You can configure the level of logging of agent activity on the
Agent 3.5.0 | Configuration
policy pages.
Detailed agent activity log
The detailed agent activity log (
message in addition to the content of the agent activity log. This file has a 1MB size
limit. When this log file reaches 1MB, a backup copy is made
(
_<
>_
AGENT
COMPUTER
BACKUP
Due to the variety of scenarios and requirements of different environments, there are
several methods you can use to distribute the agent to the systems you want to
manage. Before using any of these methods, you should consider each.
The following table details the advantages and disadvantages of the different methods
to distribute the agent.
Table 4-2 Advantages and disadvantages of agent distribution methods
Method
Advantages
Deploying agents
By deploying the agent
while creating
automatically while creating the
Directory
sites and groups of the Directory,
you don't have to complete any
additional steps.
Deploying agents
This is an efficient method for
from ePolicy
distributing the agent.
Orchestrator
Using login scripts
This is an efficient method for an
environment where systems log
onto the network frequently. You
do the work once, and the agent
is deployed automatically.
Common Framework
file named
_<
XML
AGENT
SYSTEM
_<
>.
) file contains troubleshooting
AGENT
SYSTEM
LOG
.
).
LOG
Disadvantages
If you are creating sites by importing
large NT domains or Active Directory
containers, too much network traffic
may be generated for your network
resources.
You must embed user credentials
with administrator rights to the
desired systems. Also, you must
ensure that systems running
Microsoft XP Service Pack 2, have
File and Printer sharing added to the
firewall exceptions list.
Systems that don't log onto the
network frequently, may not be
running the most up-to-date agent.
34
Deploying the Agent and Products
Distributing agents
folder (within
>.
where <
>
XML
SYSTEM
Logging
ePO
tab of the
4

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epolicy orchestrator

Table of Contents