Interface Reference topics

Size: px
Start display at page:

Download "Interface Reference topics"

Transcription

1 McAfee Content Security Reporter 2.6.x Interface Reference Guide Interface Reference topics Edit Permission Set page (Permission Sets page) Specify Content Security Reporter permissions and grant user access to reports and report server settings. Table 1 definitions Content Security Reporter Settings Content IPS Content OTP Content Web Content Delegated Reports Allows or prevents users to view and edit the Report Server settings. Allows or prevents users to access report server data. Allows or prevents users to access report IPS server data. Allows or prevents users to access report McAfee OTP server data. Allows or prevents users to access report web server data. Allows users to view all or selected report data. Details page Report Servers (Registered Server Builder wizard) View and modify the report server settings. Table 2 definitions Server Name or IP Address Server port Passkey Specifies the name of the of the connected server or IP address of the computer on which Content Security Reporter is installed. Specifies the port for this server. Specifies the passkey that you set during installation. 1

2 Table 2 definitions (continued) Change Passkey Test Settings Provides the ability to change the passkey that you set during installation. Verifies that the connection with the database server works. McAfee recommends that you do not edit the database server details from the list of registered servers. To edit the database, select Menu Configuration Report Server Settings Database Servers. Details page Advanced Threat Defense Server (Registered Server Builder wizard) View and modify the Advanced Threat Defense server settings. Table 3 definitions Password Server Name or IP Address Test Settings User name Specifies your Advanced Threat Defense password. Specifies the name of the of the connected server or IP address of the computer on which Advanced Threat Defense is installed. Verifies that the connection with the server works. Specifies your Advanced Threat Defense user name. Server Status page View information about the state of the report server and available updates. Table 4 definitions Elapsed time since startup Product updates Refresh Server local time Server version Duration of time since the server was last restarted. Reports when a software update is available. Updates the server status and available update information. System time of the server. The version of the report server in the following format: <major>.<minor>.<patch>.<build> 2

3 Log Sources tab Manage the log files in Content Security Reporter from a list of available log sources. Table 5 definitions Actions Actions to perform from this page include: Delete Removes the log source. Disable Prevents Content Security Reporter from accepting incoming log data until you choose to re-enable it. Duplicate Creates a log source based on the settings of a selected log source. Edit Modifies the log source settings. Enable Allows Content Security Reporter to accept incoming data from a selected log source. Import Log Manually imports log files from a local directory on the client computer. New Creates a log source. Process Now Pulls data to Content Security Reporter from a selected log source. This option works with Collect log files from log source modes. Drag items from the Actions menu on to the Content Security Reporter toolbar. Format Log Source Name Next Scheduled Job Schedule Show Filter / Hide Filter Determines the ability of your web filtering device to send log files. The name associated with the log source. Next scheduled time to pull log files from the directory. A preset time for when log files are pulled from the directory. Displays the Quick find feature, which provides the ability to search for specific text in the Table name column. New, Edit, and Duplicate Log Source page (Log Sources page) Configure or modify log source settings. The Log type area of the page remains at the top regardless of which tab you choose. 3

4 Table 6 definitions Enable log source Log format When selected, allows Content Security Reporter to accept or collect log file data. These log format options are available to configure a log source: McAfee Web Gateway (Webwasher) Auto Discover McAfee Web Gateway (MATD) Auto Discover McAfee Web Gateway Cloud Service McAfee Gateway McAfee and Web Security (Web) McAfee and Web Security ( ) McAfee SiteAdvisor Enterprise McAfee Firewall Enterprise (Sidewinder) SFv4 Text format McAfee SmartFilter IFP SFv4 Text format Blue Coat SG Auto Discover format McAfee Network Security Platform McAfee One Time Password Mode These mode options are available to configure a log source: Accept incoming log files: FTP(S) / HTTP(S) Syslog Collect log files from: McAfee Web Gateway 6.x (Webwasher) McAfee Web Gateway 7.x McAfee Web Gateway 7.x (MATD) McAfee Web Gateway Cloud Service FTP(S) Server Directory on report server McAfee Network Security Manager The mode you select depends on the ability of your web filtering device to send log files. Name Specifies the name for the log source. 4

5 Source tab (New, Edit, and Duplicate Log Source page) Configure the source options for your log source. Table 7 definitions Accept incoming log files FTP(S) / HTTP(S) Accept Log Files from the Network Device To accept log files from the network device, this information is used to create a logon account: Logon name Password For more information about accepting log files using FTP(S)/HTTP(S) options, consult the documentation for your network device. Table 8 definitions Accept incoming log files Syslog Accept Log Files from the Network Device Web Gateway Settings This information is used to accept syslog messages files from the network device: Client address Server Port Protocol Specifies the log header. Only available when you select these log formats: McAfee Web Gateway (Webwasher) - Auto Discover McAfee Web Gateway (MATD) - Auto Discover For more information about accepting Syslog messages, consult the documentation for your network device. Table 9 definitions Collect log files from McAfee Web Gateway 6.x (Webwasher) Webwasher Server Test This information is used collect log files from the Webwasher server: Device address Password UI Port Connect using TLS Logon name Verifies the connection to the Webwasher server. 5

6 Table 10 definitions Collect log files from McAfee Web Gateway 7.x Web Gateway Server Test This information is used to collect log files from the McAfee Web Gateway server: Device address UI Port Connect using TLS Logon name Password Appliance Name (UUID) Log File Base Name Automatically collect logs from node with active GUI Verifies the connection to the Web Gateway server. Table 11 definitions Collect log files from McAfee Web Gateway 7.x (MATD) Web Gateway Server Test This information is used to collect Advanced Threat Defense log files from the McAfee Web Gateway server: Device address UI Port Connect using TLS Logon name Password Appliance Name (UUID) Log File Base Name Automatically collect logs from node with active GUI Verifies the connection to the Web Gateway server. Table 12 definitions Collect log files from McAfee Web Gateway Cloud Service McAfee Web Gateway Cloud Service Test This information is used to collect log files from McAfee Web Gateway Cloud Service : Customer ID Sent in your McAfee Web Gateway Cloud Service Service registration documentation Logon name Password Region You can specify the region as US or EU. Verify that your firewall allows communication between: For US and port 443 For EU and port 443 Content Security Reporter server and the Internet Content Security Reporter collects 15 maximum days of data from McAfee Web Gateway Cloud Service Verifies the connection to McAfee Web Gateway Cloud Service Service. 6

7 Table 13 definitions Collect log files from FTP(S) server FTP Server Test This information is used to collect log files from the FTP, FTPS, or SFTP server: File protocol Logon name FTP Server Address Password Port Directory Verifies the connection to the FTP(S) server. Table 14 definitions Collect log files from Directory on report server Report Server Directory Test Specifies the report server directory information. Verifies the connection to the report server directory. Table 15 definitions Collect log files from McAfee Network Security Manager McAfee Network Security Manager Test This information is used to collect log files from McAfee Network Security Manager: Device Address Device Port Logon name Password Verifies the connection to McAfee Network Security Manager. User-Defined Columns (New, Edit, and Duplicate Log Source page) Configure the settings for up to four user-defined columns. Table 16 definitions Settings for User-Defined columns Settings used to configure user-defined columns include: Populate this column Populates the selected column based on the source data options. Log record Identifies which log record column populates the user-defined column. Log file header Specifies which miscellaneous log file header from a log file populates the user-defined column. When entering a value in the Log file header field, do not use quotation marks. Apply this rule set Applies the selected rule to the identified column when processing log files. User-defined columns Provides a way to obtain data from log file columns normally skipped, or to assign a custom value to data obtained from any log file column. 7

8 Processing tab (New, Edit, and Duplicate Log Source page) Configure how Content Security Reporter handles log file data. Table 17 definitions Log Records These processing options are available to configure a log source: Condense log records into page views Consolidates multiple lines of data into a single page view record in reports. Store log records for detailed reports Stores complete log records, which are used from the detailed user report and when reporting on URLs that have multiple categories for summary reports. Use client host names when storing log records for unknown users Uses client (computer) host names for unknown users. Stop parsing when error line exceed Stops parsing log files when the amount of errors surpasses the number in the exceed field. Ignore log file lines that match this regular expression Skips lines in the log file that match the contents of the regular expression field. Character format Specifies the format of characters. Choose from these character formats: US-ASCII ISO UTF-8 UTF-16 Post-Processing tab (New, Edit, and Duplicate Log Source page) Configure how Content Security Reporter handles log files after processing is complete. Table 18 definitions Post-Processing Log Files These post-processing options are available to configure a log source: Delete processed log files Removes processed log files from the server. Move processed log files to this directory Moves processed log files to the specified directory. Browse Navigates to the directory location. Directory Defines the directory location. FTP processed log files to this server Moves processed log files to the FTP server location. File protocol Specifies the protocol as FTP, FTPS, or SFTP. Server Specifies the host name or IP address of the server. Logon name Specifies the name used to log on the FTP server. Password Specifies the password used to log on to the FTP server. Port Specifies the port number the FTP server uses to communicate. The default port number for FTP and FTPS is 21. The default port number for SFTP is 22. Directory Specifies the file path to store the log files on the FTP server. 8

9 Schedule tab (New, Edit, and Duplicate Log Source page) Create a schedule to process log sources. The Schedule tab is only available when Collect log files from is selected. Table 19 definitions Dates Process logs Start time Specifies the dates for when to begin and end log file collection from the device. Specifies the frequency of log file collection from the device. Specifies when to begin log file collection from the device. Import Log window (Log Sources tab) View details about existing log sources and import a log file. Table 20 definitions Import Log Log format Log source name Processing Provides the option to browse and select a specific log file. Displays the log format for the selected log source. Identifies the name of the log source. Displays processing options for the selected log source. Current Jobs tab (Log Sources) View information about the currently running log processing jobs. Table 21 definitions Refresh Status Updates the job information currently in progress. Displays this information about the current log processing jobs in progress: The number of records in the log file The number of records and bytes processed The number of errors detected The number of records the job has not processed The percentage of the log processing job that is complete How long the job has taken, and a time estimate for when the job finishes The name and size of the log file 9

10 Statistics tab (Log Sources) Displays cumulative log statistics for all the logs processed since the record was last refreshed or reset. Table 22 definitions Cumulative statistics Displays these log statistics: Log records processed Displays the number of log records processed and includes errors and ignored records for the corresponding group. Bytes processed Displays the number of bytes processed for the corresponding statistics group. Byte/log record ratio Displays the average number of bytes per log record processed. Log parsing rate Displays the number of records per second and the number of bytes per second currently being processed. Estimated time to process all log records Displays the total length of time to complete all log processing jobs to date. Elapsed time Displays the length of time that processing has been running since the last server restart or last manual reset. Waiting jobs Displays the number of log jobs waiting to be processed. Quick Find Refresh Reset Search for a specific Syslog client to filter. Retrieves the latest statistics from the report server. Sets the statistics back to zero. Cumulative statistics cannot reset while a log processing job is running. Syslog client statistics can be reset at any time. Show Clients Syslog client statistics Filter which Syslog client statistics to display based on status. Displays these Syslog client statistics: Messages processed Messages cached Job Queue page View a list of log processing jobs that are completed, or currently in progress. Table 23 definitions Actions Actions to perform from this page include: Delete All Completed Jobs Removes all completed log processing jobs. Delete/Cancel Stops and removes selected log processing jobs. Refresh Updates the list of log processing jobs. Job ID Log Source Log source details The number assigned to a log processing job. The name of the log source. Detailed information regarding each selected log processing job. 10

11 Table 23 definitions (continued) Show Filter / Hide Filter Status Submitted Total size Displays the Quick find feature, which provides the ability to search for specific text in the Table name column. The state of the log processing job. The time the job started. The size, in bytes, of the created log file. Custom Columns page Content Security Reporter is configured with default predefined, or editable custom columns. Table 24 definitions Actions Name of Custom Column Show Filter / Hide Filter Opens the Edit Rule Set window that allows you to make changes to the selected custom column rule set. Displays the available custom columns. Displays the Quick find feature, which provides the ability to search for specific text in the Table name column. Custom Rule Sets page Configure custom rule sets to use in user-defined columns. Table 25 definitions Actions Actions to perform from this page include: Delete Removes the selected rule. Duplicate Copies an existing custom rule set. Edit Modifies an existing custom rule set. New Adds a new custom rule set. Name of Custom Rule Set Show Filter / Hide Filter Displays the name of the rule set. Displays the Quick find feature, which provides the ability to search for specific text in the Table name column. 11

12 New, Edit, or Duplicate Rule Set page (Custom Columns page or Custom Rule Sets page) Create a new rule set or change the rules used in a selected rule set. Table 26 definitions Actions Actions to perform from this page include: Add Above / Add Below Opens the New Rule dialog box and place a new rule above or below the selected rule. Decrease Priority Moves the selected rule down the rule list. Export Rule Set Saves the selected rule to a file in the default or user-selected location. Import Rule Set Copies an exported rule into the current rule set. Increase Priority Moves the selected rule up the rule list. New Adds a new rule to the Rules field. If an individual rule is selected in the rule set, and depending on the rule's location in the Rules table, these options become available from the Actions list: Delete Removes the selected rule. You cannot remove the default rule. Edit Makes the rule fields editable for the selected rule. General Rules Test The name of the rule, and an optional description. List of rules in the rule set, the priority of the rule, and the replacement text that appears in the query or report. Replacement text that appears in the query or report. Browse Time page View the default browse time for all users. Table 27 definitions Browse time threshold Default browse time Edit The maximum length of time a user is expected to spend viewing a single webpage. The amount of time recorded in the database when the browse time threshold is exceeded. Opens the Edit Browse time dialog box, where you change the browse time threshold and default browse time. 12

13 Edit Browse Time page (Browse Time page) Configure the default browse time for all users. Table 28 definitions Browse time threshold Default browse time Specifies the maximum length of time a user is expected to spend viewing a single webpage. Specifies the amount of time recorded in the database when the browse time threshold is exceeded. The 3 minutes default values produce the best results. Database page View the database settings and connection status. Table 29 definitions Edit Configuration Connection Mode Status Update Schema Opens a dialog box that allows you to modify database settings. Displays the active database and database settings such as the address, port, and logon details. Displays whether the database connection is online or offline. Displays whether the database is connected or disconnected. Appears when connected to a database from a previous version of Content Security Reporter. Edit Database page (Database page) Access and manage the database configuration options used to process log data. If you choose to use an internal database, the database requires no additional configuration. Table 30 definitions Advanced Displays the Advanced Database Status dialog box to view more information about the currently connected database. This option appears on the Edit Database dialog box and is only available to select when the database is connected. Configuration Choose between Default internal database or This external database to activate a database. If the Content Security Reporter and McAfee epo databases share the same SQL Server instance, you must configure separate databases for each. Connection Mode If you choose to use an external database, the Database settings value box becomes active to enter setting information such as the address, port, and logon details. A checkbox to enable SSL connection to the database is also available. Displays whether the database connection is online or offline. When you set the database to offline, the Advanced button is no longer available. 13

14 Table 30 definitions (continued) Execute SQL Refresh Status Test Update Schema Opens a window that enables a reporting administrator to provide and execute SQL statements. Use this function for troubleshooting when working with technical support. Updates the availability status of the connected database. Displays whether the database is connected or disconnected. Verifies the database configuration settings. Upgrades the database schema. Table 31 Advanced Database Status dialog box Partition Schema Provides the option to partition your schema. If you are not sure what partitioning is, or if you need it, do not partition your schema. Status Displays this database status information: Availability Displays whether the database is connected or offline. Schema version Displays the connected report database schema version. Partitioning Displays if partitioning is supported for: Microsoft SQL Server 2008 MySQL 5.5 Microsoft SQL Server 2012 MYSQL 5.6 Microsoft SQL Server 2014 MYSQL 5.7 Microsoft SQL Server 2016 Permissions Displays the SQL permissions for the user specified in the Logon name field on the Database page. Table 32 Test Status dialog box Status Details Identifies the connection status to the report database. Provides the details for the connected database. Database Maintenance page View the database maintenance jobs schedule, and the maintenance tasks that run during maintenance. Table 33 definitions Delete database records Edit Index maintenance Maintenance options Schedule database maintenance Displays the records to delete from the database during scheduled maintenance. Opens a window where you can modify maintenance settings. Displays the frequency for when the indexes are rebuilt. Displays the number of records deleted in a single maintenance task. Displays the frequency for database maintenance jobs, and the date and time for the next scheduled job. 14

15 Edit Database Maintenance window (Database Maintenance page) Configure automated database maintenance jobs. Table 34 definitions Delete database records Configures the age of summary and detailed data to delete during database maintenance. By default, summary and detailed records older than 12 months are removed from the database. If reports are taking a long time to generate, schedule Content Security Reporter to delete database records more frequently. Index maintenance Configures the frequency for when the indexes are rebuilt. By default, indexes are rebuilt on the first Sunday of each month. Ensure that index maintenance is scheduled on the same day as database maintenance. For example, if index maintenance is scheduled for Monday, but database maintenance is scheduled for Tuesday, then index maintenance will not run. Maintenance options Schedule database maintenance Set Schedule Configures the maximum number of records deleted at any one time. Configures the frequency of database maintenance jobs, and the date and time for the next scheduled job. Opens a dialog box to configure the frequency and start time for scheduled database maintenance jobs. Table 35 Set Schedule dialog box Frequency Start time Configures the frequency for scheduled database maintenance jobs. Configures the start time for scheduled database maintenance jobs. Manual Maintenance page Select and start database maintenance jobs. Table 36 definitions Manual database maintenance by date range Manual database maintenance by log source Custom and user-defined columns Specifies the type of data to remove from the database within a specified date range. Deletes all database records for a selected log source. Repopulates specified custom and user-defined columns. If you choose to repopulate user-defined columns, you can select the specific log source whose report columns you want to repopulate, and set date parameters to speed up the process. Only log sources with user-defined columns are available to select. Index maintenance Database Statistics Rebuilds the indexes to improve record insertion and report performance without running other maintenance tasks. Runs statistics for updated database information without running other maintenance tasks. 15

16 Table 37 Repopulate Columns dialog box Custom columns User-defined columns Specifies which custom columns to repopulate. Repopulates user-defined columns using current rules. Status page View the database maintenance jobs in the maintenance queue. Table 38 definitions Actions Actions to perform from this page include: Delete Removes the selected database maintenance jobs. Delete All Completed Jobs Removes all completed database maintenance jobs. Refresh Updates the list of database maintenance jobs. Job Job details Show Filter / Hide Filter Started / Completed Status The name of a maintenance job. Select and view detailed information for a selected job. Displays the Quick find and Preset features. The start and end time of the job. Reports whether the job was successful or unsuccessful. System Maintenance page View automated system maintenance job options. Table 39 definitions Edit Schedule system maintenance Delete system status Opens a window where you can modify maintenance settings. Displays the frequency for when system maintenance jobs are run. Displays the age of deleted system status information and server logs during system maintenance. Edit System Maintenance page (System Maintenance page) Configure the automated system maintenance job settings. Table 40 definitions Schedule system maintenance Delete system status Configures the age of deleted system status information and server logs during system maintenance. Specifies the frequency for when system maintenance jobs are deleted. 16

17 Manual Maintenance page (System maintenance) Manually run system maintenance jobs. Table 41 definitions Delete Now Delete system status Provides the option to immediately delete system statuses. Specifies which system statuses to delete by age. Status page View the system maintenance jobs in the maintenance queue. Table 42 definitions Actions Actions to perform from this page include: Delete Remove the selected system maintenance jobs. Delete All Completed Jobs Remove all completed system maintenance jobs. Refresh Update the list of system maintenance jobs. Job details Preset / Show selected rows Show Filter / Hide Filter Started / Completed Status Select and view detailed information for a job. Select which system maintenance jobs to display in the queue. Displays the Preset and Show selected rows feature. The start and end time of the job. Reports whether the job was successful or unsuccessful. Performance s page View the current amount of allocated memory and number of concurrent log processing jobs. Table 43 definitions Concurrent jobs Edit Memory Displays the current number of log processing jobs that can run at any one time. Opens the dialog boxes to modify the amount of RAM to dedicate to Content Security Reporter and how many log processing jobs can run simultaneously. Displays the current amount of RAM dedicated to the Content Security Reporter server. Table 44 Memory dialog box Memory Restore Defaults Specifies the amount of RAM to dedicate to the Content Security Reporter server. Restores the memory allocation to 1 GB. Table 45 Concurrent jobs dialog box Concurrent jobs Specifies the number of log processing jobs that can run simultaneously. Restore Defaults Restores the number of concurrent log processing jobs to 2. 17

18 Cache page View setting and status information for the log processing caches. To modify the settings on this page, the database must be online and maintenance jobs cannot be running. When the database is reconnected, changes made to database settings before going offline are retained. If the database goes offline while changes are made in the caches, these changes will not be saved. Table 46 definitions Actions Actions to perform from this page include: Choose Columns Select which columns to display, and the order they appear. Additional columns include: Elapsed Time Displays the duration of time that has passed since the statistics began calculation. Maximum Entries Shows the maximum number of entries that can be held in memory. Default value is different for each row. Preload Displays the preload status; this is deselected by default. Yes Loads the maximum number of entries into memory when the database comes online or the server is restarted. No Does not load the content into memory when the database comes online or the server is restarted. Enabling preload can significantly increase the amount of time to connect to the database. Edit Opens a dialog box that allows you to modify the entries in the summary cache. Refresh Refreshes the content in the caches. Reset Statistics Resets the hit ratio and the elapsed time to zero. Current Entries Displays the current number of entries held in the cache. Set to zero by default. Current Memory Usage Hit Ratio Show Filter / Hide Filter Table Name Displays the estimated total amount of memory used by the cache's entries. Displays the: Ratio between the number of hits versus the sum of the number of hits Number of misses Displays the Quick find feature, which provides the ability to search for specific text in the Table name column. Displays the cache names in the configured database. 18

19 Edit Cache Settings page (Cache page) Modify the entry settings stored in the summary cache. Table 47 s Maximum Entries Mode Table Name Displays the maximum number of entries that can be stored in the summary cache. Provides the option to preload the cache on initialization. Displays the name of the table in the configured database. Summary Cache page View settings and status information for the summary table caches. To modify the settings on this page, the database must be online and maintenance jobs cannot be running. When the database is reconnected, changes made to database settings before going offline are retained. If the database goes offline while changes are made in the caches, these changes will not be saved. Table 48 definitions Actions Actions to perform from this page include: Choose Columns Select which columns to display, and the order they appear. Additional columns include: Average Preload Batch Size Displays the average size of batches the system has attempted to load. Elapsed Time Displays the duration of time that has passed since the statistics began calculation. Maximum Entries Displays the maximum number of entries that can be held in memory. Default value is different for each row. Maximum Preload Batch Size Displays the size of the largest batch that the system attempts to load. Time Units Currently Loaded Displays the number of entry groups that the cache has active. Edit Opens the Cache Settings dialog box. Refresh Refreshes the content in the summary cache. Reset Statistics Resets the hit ratio and elapsed time to zero, and recalculates the Maximum Preload Batch Size and Average Preload Batch Size. Current Entries Displays the current number of entries held in the cache. Set to zero by default. Current Memory Usage Hit Ratio Displays the estimated total amount of memory used by the cache entries. Displays: Ratio between the number of hits versus the sum of the number of hits Number of misses 19

20 Table 48 definitions (continued) Show Filter / Hide Filter Table Name Displays the Quick find feature, which provides the ability to search for specific text in the Table name column. Displays the name of the summary table in the configured database. System Backup page View the backup file that is used to restore Content Security Reporter to a previous configuration. The backup configuration file does not create a backup of any reports, queries, or McAfee epo settings. Note that the server is not available during a system backup. Table 49 definitions Actions Backup Date and Time File Path in Report Server Size Creates a backup file of the current configuration. By default, the backup.xml file is stored in this report server directory: C:\Program Files \McAfee\Content Security Reporter\reporter\conf Displays the date and time the backup file was created. Displays the path to the backup file. Displays the size of the backup file. Support page Generate a feedback file that includes report server information for use by technical support. Table 50 definitions Start Support Generates the feedback file. Describes what information is collected in the feedback file and where the file is stored. Copyright 2018 McAfee, LLC McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others

McAfee Content Security Reporter 2.6.x Product Guide

McAfee Content Security Reporter 2.6.x Product Guide McAfee Content Security Reporter 2.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Content Security Reporter Product Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Product Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide. McAfee Content Security Reporter 2.4.0

Product Guide. McAfee Content Security Reporter 2.4.0 Product Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Client Proxy interface reference

Client Proxy interface reference Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page

More information

Client Proxy interface reference

Client Proxy interface reference McAfee Client Proxy 2.3.5 Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee

More information

Client Proxy interface reference

Client Proxy interface reference McAfee Client Proxy 2.3.3 Interface Reference Guide (McAfee epolicy Orchestrator) Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI.

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN-000213-01 VMware vcenter AppSpeed User s Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

VMware vfabric Data Director Installation Guide

VMware vfabric Data Director Installation Guide VMware vfabric Data Director Installation Guide vfabric Data Director 1.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

McAfee Data Loss Prevention Prevent 11.1.x Release Notes

McAfee Data Loss Prevention Prevent 11.1.x Release Notes Revision B McAfee Data Loss Prevention Prevent 11.1.x Release Notes Contents What's new in update 11.1.100 Resolved issues in update 11.1.100 Additional installation information Rating for update 11.1.100

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

CDP Data Center Console User Guide CDP Data Center Console User Guide Version CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product

More information

McAfee Enterprise Security Manager

McAfee Enterprise Security Manager Release Notes McAfee Enterprise Security Manager 10.0.2 Contents About this release New features Resolved issues Instructions for upgrading Find product documentation About this release This document contains

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Contents. Batch & Import Guide. Batch Overview 2. Import 157. Batch and Import: The Big Picture 2 Batch Configuration 11 Batch Entry 131

Contents. Batch & Import Guide. Batch Overview 2. Import 157. Batch and Import: The Big Picture 2 Batch Configuration 11 Batch Entry 131 Batch & Import Guide Last Updated: 08/10/2016 for ResearchPoint 4.91 Contents Batch Overview 2 Batch and Import: The Big Picture 2 Batch Configuration 11 Batch Entry 131 Import 157 Configure Import File

More information

ForeScout CounterACT. Configuration Guide. Version 3.4

ForeScout CounterACT. Configuration Guide. Version 3.4 ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT

More information

Batch and Import Guide

Batch and Import Guide Batch and Import Guide 06/13/2017 Blackbaud Altru 4.96 Batch and Import US 2017 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Advanced Threat Defense Migration Guide

McAfee Advanced Threat Defense Migration Guide Revision B McAfee Advanced Threat Defense 4.4.0 Migration Guide Migration overview With every new release, McAfee Advanced Threat Defense is optimized for improved performance and enhanced security through

More information

McAfee Web Gateway

McAfee Web Gateway Release Notes Revision A McAfee Web Gateway 7.8.0.3 Contents About this release Resolved issues Installation instructions Known issues About this release This document contains information about the current

More information

McAfee Web Gateway Administration

McAfee Web Gateway Administration McAfee Web Gateway Administration Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction to the tasks crucial

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Atlona Manuals Software AMS

Atlona Manuals Software AMS AMS Atlona Manuals Software Version Information Version Release Date Notes 1 03/18 Initial release AMS 2 Welcome to Atlona! Thank you for purchasing this Atlona product. We hope you enjoy it and will take

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

McAfee Advanced Threat Defense 3.4.4

McAfee Advanced Threat Defense 3.4.4 Release Notes McAfee Advanced Threat Defense 3.4.4 Revision B Contents About this release New Features Enhancements Resolved issues Installation and upgrade notes Known issues Product documentation About

More information

ForeScout Open Integration Module: Data Exchange Plugin

ForeScout Open Integration Module: Data Exchange Plugin ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Reporting Guide V7.0. iprism Web Security

Reporting Guide V7.0. iprism Web Security V7.0 iprism Web Security 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo, iprism and iguard are trademarks of EdgeWave Inc. All other trademarks and registered

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Configuration of trace and Log Central in RTMT

Configuration of trace and Log Central in RTMT About Trace Collection, page 1 Preparation for trace collection, page 2 Types of trace support, page 4 Configuration of trace collection, page 5 Collect audit logs, page 19 View Collected Trace Files with

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

McAfee Advanced Threat Defense Release Notes

McAfee Advanced Threat Defense Release Notes Revision B McAfee Advanced Threat Defense 4.2.0 Release Notes Contents About this release New features and enhancements Resolved issues Installation information Known issues Find product documentation

More information

Skybot Scheduler Release Notes

Skybot Scheduler Release Notes Skybot Scheduler Release Notes Following is a list of the new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.5 Skybot Scheduler 3.5 (May 19, 2014 update) Informatica

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

User Manual. Admin Report Kit for IIS (ARKIIS)

User Manual. Admin Report Kit for IIS (ARKIIS) User Manual Admin Report Kit for IIS (ARKIIS) Table of Contents 1 Admin Report Kit for Internet Information Server-(ARKIIS)... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements...

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Firewall Enterprise and 8.3.x

McAfee Firewall Enterprise and 8.3.x Release Notes Revision A McAfee Firewall Enterprise 8.2.1 and 8.3.x Scan Engine Update MCV02 Contents About this release Installation instructions Known issues Find product documentation About this release

More information

Product Guide. McAfee Performance Optimizer 2.2.0

Product Guide. McAfee Performance Optimizer 2.2.0 Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Managing the CaseMap Admin Console User Guide

Managing the CaseMap Admin Console User Guide Managing the CaseMap Admin Console User Guide CaseMap Server, Version 2.3 Accessing the CaseMap Admin Console Registering CaseMap Servers Registering SQL Servers Setting Up Roles and Users Managing SQL

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes McAfee epolicy Orchestrator 5.9.1 Release Notes Contents About this release What's new Resolved issues Known issues Installation information Getting product information by email Where to find product documentation

More information

McAfee Network Data Loss Prevention Administration

McAfee Network Data Loss Prevention Administration McAfee Network Data Loss Prevention Administration Education Services administration course The McAfee Data Loss Prevention Administration course enables attendees to receive in-depth training on the benefits

More information

Endpoint Intelligence Agent 2.2.0

Endpoint Intelligence Agent 2.2.0 Release Notes Endpoint Intelligence Agent 2.2.0 Revision A Contents About this release New features Resolved issues Installation instructions Known issues Find product documentation About this release

More information

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Working with Trace and Log Central

Working with Trace and Log Central CHAPTER 11 The trace and log central feature in the Cisco Unified Real-Time Monitoring Tool (RTMT) allows you to configure on-demand trace collection for a specific date range or an absolute time. You

More information

McAfee epolicy Orchestrator Update 2

McAfee epolicy Orchestrator Update 2 Release Notes McAfee epolicy Orchestrator 5.10.0 Update 2 Contents Rating for update 5.10.0 Resolved issues in update 5.10.0 Installation instructions Rating for update 5.10.0 The rating defines the urgency

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Desktop Installation Guide

Desktop Installation Guide Desktop Installation Guide Desktop Installation Guide Legal notice Copyright 2017 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

McAfee Security-as-a-Service

McAfee Security-as-a-Service Troubleshooting Solutions Guide McAfee Security-as-a-Service For use with epolicy Orchestrator 4.6.0 Software This guide provides supplemental information related to installing and using the McAfee Security-as-a-Service

More information

PTC Integrity Integration With Microsoft Visual Studio (SDK)

PTC Integrity Integration With Microsoft Visual Studio (SDK) PTC Integrity Integration With Microsoft Visual Studio (SDK) PTC provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access the workflow and

More information

VMware vfabric Data Director Installation Guide

VMware vfabric Data Director Installation Guide VMware vfabric Data Director Installation Guide vfabric Data Director 2.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

DocAve Online 3. User Guide. Service Pack 17, Cumulative Update 2

DocAve Online 3. User Guide. Service Pack 17, Cumulative Update 2 DocAve Online 3 User Guide Service Pack 17, Cumulative Update 2 Issued November 2017 Table of Contents What s New in the Guide... 8 About DocAve Online... 9 Submitting Documentation Feedback to AvePoint...

More information

Legal Notes. Regarding Trademarks. Models supported by the GX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the GX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide Version 4.1 June 2013 Xerox Device Agent (XDA) Lite User Guide 2008-2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the US and/or other countries.

More information

McAfee Security Management Center

McAfee Security Management Center Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability

More information

McAfee Web Gateway

McAfee Web Gateway Release Notes Revision B McAfee Web Gateway 7.7.2.7 Contents About this release Enhancements Resolved issues Installation instructions Known issues About this release This document contains information

More information

Desktop Installation Guide

Desktop Installation Guide Desktop Installation Guide Desktop Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

For Trace and Log Central to work, you must resolve DNS lookup for all nodes in the cluster on the client machine.

For Trace and Log Central to work, you must resolve DNS lookup for all nodes in the cluster on the client machine. Trace and Log Central, page 1 Log Viewers, page 42 Plugins, page 45 Trace and Log Central For Trace and Log Central to work, you must resolve DNS lookup for all nodes in the cluster on the client machine.

More information

Attix5 Pro Storage Platform Console

Attix5 Pro Storage Platform Console Attix5 Pro Storage Platform Console V7.0.1 User Manual for Microsoft Windows Your guide to managing the Attix5 Pro backup environment using the Storage Platform Console. 0 Copyright notice and proprietary

More information

McAfee Enterprise Security Manager 10.3.x Release Notes

McAfee Enterprise Security Manager 10.3.x Release Notes McAfee Enterprise Security Manager 10.3.x Release Notes Contents Installation information What's new in update 10.3.3 Resolved issues in update 10.3.3 Migrating from Flash to HTML Installation information

More information

Tanium Asset User Guide. Version 1.1.0

Tanium Asset User Guide. Version 1.1.0 Tanium Asset User Guide Version 1.1.0 March 07, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is believed

More information

ACD SMR User's Guide. Table of Contents

ACD SMR User's Guide. Table of Contents Table of Contents Table of Contents Table of Contents Overview of ACD SMR... 3... 4 MySQL Server... 4 Installing MySQL Server... 4 Configuring MySQL Server... 5 ACD Service... 9 Installing ACD Service...

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Archiving Service. Exchange server setup (2013) AT&T Secure Gateway Service

Archiving Service. Exchange server setup (2013) AT&T Secure  Gateway Service AT&T Secure E-Mail Gateway Service Archiving Service Exchange server setup (2013) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are

More information

PageScope Net Care Device Manager Ver. 2.0 User s Guide

PageScope Net Care Device Manager Ver. 2.0 User s Guide PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

Resource Manager System Upgrade Guide

Resource Manager System Upgrade Guide [Type the document title] 7.1.0 December 2012 3725-72106-001A Polycom RealPresence Resource Manager System Upgrade Guide Polycom Document Title 1 Trademark Information POLYCOM and the names and marks associated

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

MOVE AntiVirus page-level reference

MOVE AntiVirus page-level reference McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision A McAfee Network Security Platform 8.1 (8.1.7.105-8.1.5.219 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Kintana Object*Migrator System Administration Guide. Version 5.1 Publication Number: OMSysAdmin-1203A

Kintana Object*Migrator System Administration Guide. Version 5.1 Publication Number: OMSysAdmin-1203A Kintana Object*Migrator System Administration Guide Version 5.1 Publication Number: OMSysAdmin-1203A Kintana Object*Migrator, Version 5.1 This manual, and the accompanying software and other documentation,

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information