Sign In
Upload
Manuals
Brands
McAfee Manuals
Software
ePolicy Orchestrator 4.6.0
McAfee ePolicy Orchestrator 4.6.0 Manuals
Manuals and User Guides for McAfee ePolicy Orchestrator 4.6.0. We have
1
McAfee ePolicy Orchestrator 4.6.0 manual available for free PDF download: Product Manual
McAfee ePolicy Orchestrator 4.6.0 Product Manual (328 pages)
Product Guide
Brand:
McAfee
| Category:
Software
| Size: 3.39 MB
Table of Contents
Table of Contents
3
License Agreement
2
About this Guide
11
Audience
11
Conventions
11
Mcafee ® Epolicy Orchestrator ® 4.6.0 Software Product Guide
11
What's in this Guide
12
Finding Product Documentation
12
Preface
11
Introducing Mcafee Epolicy Orchestrator Software Version
13
1 Introducing Mcafee Epolicy Orchestrator Software Version
15
What Is Epolicy Orchestrator Software
15
Components and What They Do
16
How the Software Works
17
How to Navigate the Epolicy Orchestrator Interface
18
About the Epolicy Orchestrator Navigation Menu
18
About the Navigation Bar
19
2 Planning Your Epolicy Orchestrator Configuration
21
About Scalability
21
When to Use Multiple Epolicy Orchestrator Servers
21
When to Use Multiple Remote Agent Handlers
22
Server Configuration Overview
22
Setting up and Configuring Your Epolicy Orchestrator Server
25
3 Configuring Essential Features
27
About Essential Features
27
Using the Guided Configuration to Configure Essential Features
28
4 Configuring General Server Settings
31
About General Server Settings
31
Allowing Agent Deployment Credentials to be Cached
31
Specifying Default Dashboards and Dashboard Refresh Intervals
32
Determining Which Events Are Forwarded to the Server
32
Choosing an Epo Notification Event Interval
33
Configuring Settings for Global Updates
33
Providing a License Key
34
Creating a Custom Login Message
34
Mcafee Labs Security Threats
34
Controlling Unsupported Product Policy Visibility
35
Changing Agent Communication Ports
36
Configuring the Template and Location for Exported Reports
36
Using a Proxy Server
36
SSL Certificates
37
Enabling System Tree Sorting on the Server
39
Epolicy Orchestrator Server Settings Categories and Their Descriptions
39
5 Creating User Accounts
43
About User Accounts
43
Global Administrators
43
Working with User Accounts
44
Creating User Accounts
44
Editing User Accounts
44
Deleting User Accounts
45
6 Setting up Permission Sets
47
How Users, Groups, and Permission Sets Fit Together
47
Working with Permission Sets
49
Creating a New Permission Set
49
Modifying an Existing Permission Set
50
Duplicating a Permission Set
50
Exporting Permission Sets
50
Importing Permission Sets
51
Removing a Permission Set
51
Deleting Permission Sets
51
7 Configuring Advanced Server Settings
53
Configuring Active Directory User Login
53
Managing Epolicy Orchestrator Users with Active Directory
53
Configuring Windows Authentication and Authorization
56
Authenticating with Certificates
58
When to Use Certificate Authentication
58
Configuring Epolicy Orchestrator for Certificate Authentication
58
Uploading Server Certificates
59
Removing Server Certificates
59
Configuring Users for Certificate Authentication
60
Problems with Certificate Authentication
60
Configuring Rogue System Detection Server Settings
61
Configuring Server Settings for Rogue System Detection
61
Managing Security Keys
64
Security Keys and How They Work
64
Master Repository Key Pair
65
Agent-Server Secure Communication (ASSC) Keys
67
Backing up and Restoring Keys
71
Configuring Source and Fallback Sites
73
Working with Source and Fallback Sites
73
8 Setting up Repositories Repository Types and What They Do
78
Repository Types and What They Do
78
Types of Distributed Repositories
79
Repository Branches and Their Purposes
80
Repository List File and Its Uses
81
How Repositories Work Together
82
Ensuring Access to the Source Site
82
Configuring Proxy Settings
83
Configuring Proxy Settings for the Mcafee Agent
83
Configuring Proxy Settings for Mcafee Labs Security Threats
84
Using Superagents as Distributed Repositories
84
Creating Superagent Repositories
85
Selecting Which Packages Are Replicated to Superagent Repositories
86
Deleting Superagent Distributed Repositories
86
Creating and Configuring FTP, HTTP, and UNC Repositories
86
Creating a Folder Location on an FTP, HTTP Server or UNC Share
87
Adding the Distributed Repository to Epolicy Orchestrator
87
Avoiding Replication of Selected Packages
89
Disabling Replication of Selected Packages
89
Enabling Folder Sharing for UNC and HTTP Repositories
90
Editing Distributed Repositories
90
Deleting Distributed Repositories
90
Using Local Distributed Repositories that Are Not Managed
91
Working with the Repository List Files
92
Exporting the Repository List Sitelist.xml File
92
Exporting the Repository List Sitemgr.xml File for Backup or Use by Other Servers
93
Importing Distributed Repositories from the Sitemgr.xml File
93
Importing Source Sites from the Sitemgr.xml File
93
Changing Credentials on Multiple Distributed Repositories
94
9 Setting up Registered Servers
95
Registering Servers
95
Registering Mcafee Epo Servers
95
Registering LDAP Servers
97
Registering SNMP Servers
98
Registering a Database Server
99
10 Setting up Agent Handlers
101
Agent Handlers and What They Do
101
How Agent Handlers Work
101
Handler Groups and Priority
102
Working with Agent Handlers
103
Assigning Agents to Agent Handlers
103
Managing Agent Handler Assignments
104
Setting up Agent Handler Groups
104
Managing Agent Handler Groups
105
Moving Agents between Handlers
105
11 Other Important Server Information
109
About Internet Protocols in Managed Environment
109
Exporting Objects from Epolicy Orchestrator
110
Importing Items into Epolicy Orchestrator
110
Exporting Objects and Data from Your Epolicy Orchestrator Server
111
Epolicy Orchestrator Log Files
112
The Audit Log
112
The Server Task Log
114
Allowed Cron Syntax When Scheduling a Server Task
115
The Threat Event Log
116
Managing Your Network Security with Your Epolicy Orchestrator Server
119
12 Organizing the System Tree
121
The System Tree Structure
121
Considerations When Planning Your System Tree
123
Administrator Access
123
Environmental Borders and Their Impact on System Organization
124
Subnets and IP Address Ranges
124
Tags and Systems with Similar Characteristics
124
Operating Systems and Software
125
Tags and How They Work
125
Active Directory and NT Domain Synchronization
126
Active Directory Synchronization
126
NT Domain Synchronization
127
Criteria-Based Sorting
128
How Settings Affect Sorting
129
IP Address Sorting Criteria
129
Tag-Based Sorting Criteria
130
Group Order and Sorting
130
Catch-All Groups
130
How a System Is Added to the System Tree When Sorted
130
Working with Tags
132
Creating Tags with the Tag Builder
132
Excluding Systems from Automatic Tagging
133
Applying Tags to Selected Systems
133
Applying Criteria-Based Tags Automatically to All Matching Systems
133
Creating and Populating Groups
135
Creating Groups Manually
136
Adding Systems Manually to an Existing Group
137
Exporting Systems from the System Tree
138
Importing Systems from a Text File
138
Sorting Systems into Criteria-Based Groups
140
Importing Active Directory Containers
142
Importing NT Domains to an Existing Group
144
Synchronizing the System Tree on a Schedule
146
Moving Systems Manually Within the System Tree
147
Updating the Synchronized Group with an NT Domain Manually
147
Transferring Systems between Mcafee Epo Servers
148
13 Working with the Agent from the Mcafee Epo Server
149
Agent-Server Communication
149
Agent-Server Communication Interval
150
Agent-Server Communication Interruption Handling
150
Wake-Up Calls and Tasks
151
Superagents and Broadcast Wake-Up Calls
151
Superagent Caching and Communication Interruptions
152
Viewing Agent and Product Properties
153
Responding to Policy Events
153
Running Client Tasks Immediately
154
Sending Manual Wake-Up Calls to Systems
155
Sending Manual Wake-Up Calls to a Group
155
Locate Inactive Agents
156
Queries Provided by Mcafee Agent
156
Windows System and Product Properties Reported by the Agent
157
14 Using the Software Manager to Check in Software
159
What's in the Software Manager
159
Checking In, Updating, and Removing Software Using the Software Manager
160
15 Using Policies to Manage Products and Systems
163
Policy Management
163
Policy Application
165
How Policy Assignment Rules Work
166
Policy Assignment Rule Priority
166
About User-Based Policy Assignments
167
About System-Based Policy Assignments
168
Using Tags to Assign System-Based Policies
168
Working with Policy Assignment Rules
169
Creating Policy Management Queries
170
Working with the Policy Catalog
171
Creating a Policy from the Policy Catalog Page
172
Duplicating a Policy on the Policy Catalog Page
172
Editing a Policy's Settings from the Policy Catalog
173
Renaming a Policy from the Policy Catalog
173
Deleting a Policy from the Policy Catalog
173
Working with Policies
173
Configuring Agent Policies to Use a Distributed Repository
174
Changing the Owners of a Policy
175
Moving Policies between Mcafee Epo Servers
175
Assigning a Policy to a Group of the System Tree
176
Assigning a Policy to a Managed System
177
Assigning a Policy to Multiple Managed Systems Within a Group
177
Enforcing Policies for a Product on a Group
178
Enforcing Policies for a Product on a System
178
Copying and Pasting Assignments
179
Viewing Policy Information
180
Viewing Groups and Systems Where a Policy Is Assigned
181
Viewing the Settings of a Policy
181
Viewing Policy Ownership
182
Viewing Assignments Where Policy Enforcement Is Disabled
182
Viewing Policies Assigned to a Group
182
Viewing Policies Assigned to a Specific System
183
Viewing a Group's Policy Inheritance
183
Viewing and Resetting Broken Inheritance
183
Sharing Policies Among Mcafee Epo Servers
183
Setting up Policy Sharing for Multiple Mcafee Epo Servers
184
Frequently Asked Questions
185
16 Using Tasks to Manage Products and Systems
187
Deployment Packages for Products and Updates
187
Product and Update Deployment
189
First Time Product and Update Deployment Overview
189
Server Tasks and What They Do
190
Global Updating
190
Pull Tasks
192
Replication Tasks
193
Deploying Update Packages with Pull and Replication Tasks
194
Allowed Cron Syntax When Scheduling a Server Task
198
About the Pull and Replication Task Information in the Server Task Log
199
Client Tasks and What They Do
199
How the Client Task Catalog Works
200
Deployment Tasks
200
Update Tasks
203
Working with Client Tasks
204
Confirming that Clients Are Using the Latest DAT Files
205
Evaluating New Dats and Engines before Distribution
206
17 Managing Packages and Extensions Manually
207
Bringing Products under Management
207
Checking in Packages Manually
207
Deleting DAT or Engine Packages from the Master Repository
208
Manually Moving DAT and Engine Packages between Branches
208
Checking in Engine, DAT and Extradat Update Packages Manually
209
18 Responding to Events in Your Network
211
About Using Automatic Responses
212
Automatic Responses and How It Works
212
Throttling, Aggregation, and Grouping
213
Default Rules
213
Planning
214
Determining How Events Are Forwarded
214
Determining Which Events Are Forwarded Immediately
215
Determining Which Events Are Forwarded
215
Configuring Automatic Responses
216
Assigning Permission Sets to Access Automatic Responses
216
Working with SNMP Servers
217
Deleting an Snmp Server
219
Working with Registered Executables and External Commands
220
Creating and Editing Automatic Response Rules
222
Describing the Rule
222
Setting Filters for the Rule
223
Setting Thresholds of the Rule
223
Configuring the Action for Automatic Response Rules
224
Frequently Asked Questions
226
Monitoring and Reporting on Your Network Security Status
227
19 Monitoring with Dashboards
229
Working with Dashboards
229
Creating Dashboards
230
Adding Monitors to Dashboards
230
Removing Monitors from Dashboards
231
Duplicating Dashboards
231
Deleting Dashboards
232
Importing Dashboards
232
Exporting Dashboards
232
Changing the System Default Dashboard
233
Assigning Permissions to Dashboards
233
Working with Dashboard Monitors
234
Configuring Dashboard Monitors
234
Moving and Resizing Dashboard Monitors
235
Default Dashboards and Their Monitors
235
20 Querying the Database and Reporting on System Status
239
Query and Report Permissions
240
About Queries
240
Queries as Dashboard Monitors
241
Query Builder
242
Working with Queries
243
Creating Custom Queries
243
Running an Existing Query
244
You Can Run Saved Queries On-Demand
244
Running a Query on a Schedule
245
Creating a Query Group
245
A Server Task Is Used to Run a Query on a Regular Basis
245
Moving a Query to a Different Group
246
Duplicating Queries
246
Deleting Queries
246
Queries Can be Deleted When They Are no Longer Needed
246
Exporting a Query
247
Importing a Query
247
Importing a Query Exported from Another Epolicy Orchestrator Server Provides a Uniform
247
Exporting Query Results to Other Formats
248
Multi-Server Rollup Querying
249
Creating a Rollup Data Server Task
249
Creating a Query to Define Compliance
250
Generating Compliance Events
250
About Reports
251
Structure of a Report
251
Working with Reports
252
Creating a New Report
253
Editing an Existing Report
253
Every Report Must be Assigned to a Group
258
Running Reports
259
Configuring Internet Explorer 8 to Automatically Accept Mcafee Epo Downloads
259
Grouping Reports Together
258
Viewing Report Output
258
You Can View the Last Run Version of Every Report
258
As a Security Measure, Microsoft Internet Explorer Might Block Epolicy Orchestrator
259
Running a Report with a Server Task
260
Exporting Reports
260
Reports Must be Run before Examining Their Results
259
Reports Can be Run Automatically Using Server Tasks
260
Importing Reports
261
Deleting Reports
261
Using Database Servers
261
Working with Database Servers
262
Modifying a Database Registration
262
Removing a Registered Database
262
21 Detecting Rogue Systems
265
What Are Rogue Systems
265
Rogue System Detection States
266
Rogue Sensor Blacklist
269
Rogue System Detection Policy Settings
269
General Settings
270
Rogue System Detection Permission Sets
271
How the Rogue System Sensor Works
272
Passive Listening to Layer-2 Traffic
272
Intelligent Filtering of Network Traffic
272
Data Gathering and Communications to the Server
273
Systems that Host Sensors
273
How Detected Systems Are Matched and Merged
274
Working with Detected Systems
274
Configuring Rogue System Detection Policy Settings
275
Adding Systems to the Exceptions List
276
Adding Detected Systems to the System Tree
277
Adding Systems to the Rogue Sensor Blacklist
277
Editing System Comments
277
Exporting the Exceptions List
278
Importing Systems to the Exceptions List
278
Merging Detected Systems
278
Use this Task to Merge Detected Systems
278
Pinging a Detected System
279
Querying Detected System Agents
279
Removing Systems from the Detected Systems List
279
Removing Systems from the Exceptions List
280
Removing Systems from the Rogue Sensor Blacklist
280
Viewing Detected Systems and Their Details
280
Working with Sensors
280
Installing Sensors
281
Editing Sensor Descriptions
283
Removing Sensors
283
Working with Subnets
284
Adding Subnets
284
Deleting Subnets
285
Ignoring Subnets
285
Including Subnets
285
Renaming Subnets
286
Viewing Detected Subnets and Their Details
286
Rogue System Detection Command-Line Options
286
Default Rogue System Detection Queries
287
22 Managing Issues and Tickets
289
Issues and How They Work
290
Working with Issues
290
Creating Basic Issues Manually
290
Configuring Responses to Automatically Create Issues
291
Managing Issues
294
Purging Closed Issues
295
Purging Closed Issues Manually
295
Purging Closed Issues on a Schedule
295
Tickets and How They Work
296
Ways to Add Tickets to Issues
296
Assignment of Ticketed Issues to Users
296
How Tickets and Ticketed Issues Are Closed
296
Benefits of Adding Comments to Ticketed Issues
297
How Tickets Are Reopened
297
Ticketed Issue Synchronization
297
Integration with Ticketing Servers
297
Considerations When Deleting a Registered Ticketing Server
298
Required Fields for Mapping
298
Sample Mappings
298
Working with Tickets
301
Adding Tickets to Issues
301
Synchronizing Ticketed Issues
302
Synchronizing Ticketed Issues on a Schedule
302
Working with Ticketing Servers
302
Installing Extensions for Ticketing Server
303
Registering and Mapping a Ticketing Server
305
Configuring the Field Mappings
306
Upgrading a Registered Ticketing Server
308
A Appendix: Maintaining Epolicy Orchestrator Databases
311
Perform Regular Maintenance of SQL Server Databases
311
Backup and Restore Epolicy Orchestrator Databases
312
Changing SQL Server Information
312
Index
315
Advertisement
Advertisement
Related Products
MCAFEE EPOLICY ORCHESTRATOR 4.0 - LOG FILES FOR
MCAFEE EPOLICY ORCHESTRATOR 4.5 -
MCAFEE EPOLICY ORCHESTRATOR 4.5 RELEA
MCAFEE EPOLICY ORCHESTRATOR 4.0.2 -
MCAFEE UTILITIES 4.0
McAfee Endpoint Encryption for Files and Folders 4.0.0
MCAFEE EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S 12-05-2009
MCAFEE EPOLICY ORCHESTRATOR 3.6 - WALKTHROUGH GUIDE
McAfee ePolicy Orchestrator 4.0
McAfee ePolicy Orchestrator
McAfee Categories
Software
Firewall
Accessories
Network Hardware
Server
More McAfee Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL