McAfee Vulnerability Manager 7.0.1
|
|
- Clifford Kory Horton
- 6 years ago
- Views:
Transcription
1 McAfee Vulnerability Manager The McAfee Vulnerability Manager quarterly release brings important functionality to the product without having to wait for the next major release. This technical note contains information about new features since McAfee Vulnerability Manager 7.0. Note: McAfee Vulnerability Manager provides context-sensitive help. For this quarterly release, there are no updates to the online help files. Clicking on a help icon for an existing feature with new functionality will not include information for the new features. What's new The new features for this quarterly release include vulnerability sets, viewing port numbers in reports, and some new configuration manager preferences. Vulnerability sets (page 1) Create a vulnerability set to target which vulnerabilities to scan for and generate reports for. Ports in reports (page 8) For general vulnerabilities and web FSL checks, the port number, service, and protocol are now included in the Vulnerability Details and Vulnerabilities by IP report sections. Configuration manager preferences (page 9) A scan controller configuration tab and a scan engine configuration tab have been added to the configuration manager Preferences dialog box. Using vulnerability sets Create a vulnerability set and add the vulnerabilities that are important to your organization. You can add a vulnerability set to a scan configuration or asset report, modify the vulnerability set, and have those updated vulnerability selections applied to all scan configurations using the vuln set. You can add one vulnerability set to a scan configuration or an asset report template. When adding vulnerabilities to a set, you can select the vulnerabilities from a tree structure, or you can create rules for selecting vulnerabilities.
2 Only organization and workgroup administrators can create vulnerability sets. Administrators above the vulnerability set creator can modify, duplicate, or delete the vulnerability set. Administrators below the set creator can only view or duplicate the vulnerability set. Tree Based Select vulnerabilities from a list of vulnerabilities. View vulnerabilities by type (Display By) or search for them (Search By). Rule Based Select criteria in the rule editor for selecting vulnerabilities. Click Preview Rules to see which vulnerabilities are selected based on your rules. Creating a vulnerability set using the vuln tree Select vulnerabilities from the vuln tree when you want to include specific vulnerabilities in your scan configurations and asset reports. A vuln tree based vulnerability set works the same as the vuln tree in a scan configuration. All vulnerability categories are set to not use new vulnerability checks each time the scan is run. You can modify this using advanced settings so new vulnerability checks are used each time the scan is run. 2 Click Create New. 3 Type a name for the vulnerability set. Typing a description is optional. 4 Select Tree Based for the Type, then click Next. 5 Select vulnerabilities from the tree. You can also use the Display By list or use Search to find vulnerabilities. 6 Click Advanced, then select Run New Checks for any vulnerabilities you want the scan configuration to check for updates on every time the scan is run. 7 Click Save. 2
3 Vuln tree options The following table describes the options available for use in the Vuln Tree. Vulnerability tree options Display by Changes the way the vulnerability checks are displayed on this page: Category - Displays the vulnerability checks in categories. Vulnerability check categories fall into two important categories: Intrusive - these checks are likely to interfere with the host's normal operating behavior. Some intrusive checks can cause a denial-of-service condition or require that the host be restarted. If you enable Intrusive checks, monitor the devices both during and after the scan to ensure they are performing as anticipated. Non-Intrusive - these checks do not affect the host being scanned. MS Number - sorts and categorizes the vulnerability checks according to the Microsoft Security Bulletin numbers. Risk Level - sorts and displays the vulnerability checks according to their risk level: Informational, Low, Medium, and High. CVE - sorts and categorizes the vulnerability checks according to their CVE numbers. Warning: When displaying vulnerability checks by CVE Number or Risk Rating, the intrusive checks and nonintrusive checks are combined. Selecting entire CVE Number or Risk Rating categories will result in selecting a mixture of intrusive and non-intrusive checks. Search by Select the data you want to search on: Name Search through vulnerability check names. CVE Number Search for a specific CVE number Risk Level Select a risk level: High, Medium, Low, or Informational. Enter the criteria you want to search, based on your Search by selection. 3
4 Creating a vulnerability set using rules Create rules when you want to include all vulnerabilities that meet a set of criteria. Rules are evaluated at scan time. New checks are automatically added if they match the rules defined in a rule-based vulnerability set when the scan configuration using this set runs. Note: In Microsoft Internet Explorer, the internet security settings for Internet and Local Internet must be set to default for the rule pop-up window to display. 2 Click Create New. 3 Type a name for the vulnerability set. Typing a description is optional. 4 Select Rule Based for the Type. 5 Click the Rules tab. The rule "Intrusive equals No" is added by default, which means only non-intrusive vulnerability checks will be added to the scan configuration. 6 Click Add Condition or Add Nest Condition. Add Condition Add a condition at the current level in the hierarchy. Add Nested Condition Create a new condition on a new child-level in the hierarchy. Nested conditions share the same operator. 7 Select a condition type from the list. 8 Select criteria for the condition. 9 Click Set Condition. 10 Click Preview to view the vulnerability tree, with the vulnerabilities selected based on the conditions of your rules. 11 Click Save. 4
5 Vuln rule options The following table describes the conditions available for use in the Vuln Set rule editor. Vuln rule options Category CVE Number CWE Intrusive Module MS Number Risk Select an operator (equals or does not equal), then type the category name. As you type the name, a list appears. Select a category from the list or type out the full category name. Select an operator (contains or does not contain), then type a CVE string. This will include or exclude the vulnerabilities associated with the CVE string. Type a CWE and select to include or exclude the vulnerabilities associated with the CWE. Select to include intrusive or non-intrusive vulnerability checks. Select to include or exclude vulnerabilities based on a module (General Vulnerability, Windows Host, Wireless, Shell, or Web). Type an MS number and select to include or exclude vulnerabilities associated with the MS number. Select a risk level and condition to include vulnerabilities that match the condition. Specific Vulnerability Type a vulnerability and select to include or exclude the vulnerability. Vulnerability Name Enter a vulnerability name, and set whether to include or exclude this name. Vulnerability Severity Select the vulnerability severity level(s), and set whether to include or exclude the severity level. 5
6 Modifying a vulnerability set You can add or remove vulnerabilities from a set, and those changes will affect any scan configurations and asset report templates using it. This allows you to quickly modify the vulnerabilities you are scanning and reporting on. You can also change the type, like from tree based to rule based. This allows you to change the vulnerability set for multiple scan configurations and asset report templates in one location. Note: Changing the vulnerability set type erases any vuln tree selections or rules created. 2 Click View/Edit. 3 Select the Vuln Tree tab if the set is Tree Based. Select the Rules tab if the set is Rules Based. 4 Add or remove vulnerabilities (tree based) or rules (rules based) from the set. 5 Click Save. Duplicating a vulnerability set Duplicating a vulnerability set allows you to use an existing set as a starting point, and then modify the set as needed. 2 Click View/Edit. 3 Click Save As. A message appears. 4 Click OK. A duplicate set is created and Copy Of is added to the name. 5 Type a new name for the vulnerability set. Typing a description is optional. 6 Depending on the type, either add vulnerabilities using the Vuln Tree or add rules using the Rules editor. 7 Click Save. Deleting a vulnerability set You can delete vulnerability sets that are no longer needed. Before you can delete a vulnerability set, you must remove it from all scan configurations and asset report templates. 2 Click Delete. A confirmation message appears. 3 Click OK. 6
7 Adding a vulnerability set to a scan configuration After creating a vulnerability set, you can add it to your scan configurations. Create a new scan configuration, or edit an existing one, and go to the Settings tab. There is a radio button that enabled using Vulnerability Sets. Select the option and start typing the name of a vulnerability set. A list of vulnerability sets appears based on what is being typed. This list displays the first 20 matching entries. Select a vulnerability set. If you want to preview which vulnerabilities are included in the vulnerability set, click Preview. The vulnerability tree is updated with the vulnerabilities selected in the set. Note: A set might contain vulnerability checks that require credentialed access to the system being scanned. If necessary, include credentials on the Settings page of a scan configuration. If you want to change the vulnerability set being used, edit the scan configuration and select a different vulnerability set. If you do not want to use the vulnerability set, select Do not use a Vuln Set. You can then select vulnerabilities for the scan configuration. Adding a vulnerability set to an asset report When creating an asset report template, you can include a vulnerability set on the Asset Filter tab and the Sections tab. Adding a vulnerability set on the Asset Filter tab will include the assets that are vulnerable to one or more of the vulnerabilities specified in the set. Adding a vulnerability set on the Sections tab will only include vulnerabilities from the set in the asset report. If you want to change the vulnerability set being used, edit the asset report template and select a different vulnerability set. 1 On the Asset Filter tab for an asset report template, click Add Condition or Add Nested Condition. 2 Select Vulnerability (Vuln Set) from the list. The only operator available is contained in. 3 Type the name of the vulnerability set. As you type, a list of sets appears. You can type the full name of the set or select one from the list. Note: The vulnerability set list displays the first 20 matching entries. 4 Click Set Condition. 5 On the Sections tab, select Vulnerability Assessment. 6 Click Select Vulnerabilities. 7 Select the Vuln Set radio button, then select a vulnerability set. 8 Click OK. 9 Save your asset report template. 7
8 Checking for vulnerability sets in use Before a vulnerability set can be deleted, the set must be removed from any scan configuration or asset report template using it. If a vulnerability set is in use, the Delete button is not available. 2 If the vulnerability set is being used, click Yes under In Use. View the list of scan configurations and asset report template using the vulnerability set. Note: This list only displays scan configurations and asset report templates that you have access to. A warning message displays if there are scan configurations or asset report templates using this set that you do not have access to. Ports in reports For scan reports and asset reports, the Vulns By IP and Vulnerability Details report pages display the port number, protocol, and service name a vulnerability is discovered on. This information will appear in HTML, PDF, XML, and CSV reports. General, Windows, Shell, Wireless, and Web FSL vulnerabilities will display the port, protocol, and service name information. You can search for a port number on the Vulns By IP and Vulnerability Details report pages. The service name and protocol are not searchable. Reports generated before the upgrade will not display the ports. Reports generated from scan configurations run before the upgrade will not display the ports. You must rerun your scan configurations and then generate your reports for the port information to display. Enabling non-standard ports in a scan configuration If you are running services on custom ports, make sure detecting services running on non-standard ports is enabled in the scan configuration and that the proper services are selected. 1 Create a new scan configuration or edit an existing one. 2 Select Services on the Settings tab. 3 Click Advanced Options. 4 Make sure Detect services running on non-standard ports is selected. 5 Select a service under Available Services, then click >> to add it to the Selected Services list. 6 Click Close, then click Save. 8
9 Configuration manager preferences The configuration manager has two new tabs in the Preferences dialog box, the Scan Controller tab and the Scan Engine tab. The scan controller tab allows you to change the maximum number of connections allowed for a scan controller. The scan engines tab allows you to change the amount of time the scan engine will wait for a response before terminating the post operation. Note: When adding a new scan controller or scan engine to an existing McAfee Vulnerability Manager deployment, you must reapply the configuration manager settings for the new components. Specifying scan controller preferences The Max Database Connection Pool value is the maximum number of concurrent connections a scan controller can make to the database. If the server running your database exceeds the minimum system requirements, you can adjust this number to improve product performance. 1 In the configuration manager, select Tools Preferences. 2 Select the Scan Controller tab. 3 Type the maximum number of connections allowed for all connected scan controllers. If a scan controller is offline, this change will not affect that scan controller. Note: Zero is not a valid number for the Max Database Connection Pool. 4 Click Apply. Specifying scan engine preferences You can set the maximum amount of time allowed for a post operation to get a response before it is timed out by the scan engine. There is an initial timeout value and two retry timeout values. 1 In the configuration manager, select Tools Preferences. 2 Select the Scan Engine tab. 3 Type a value for the Initial timeout, First retry, and Second retry. The values must be between one and 600. The first retry value must be greater than the initial timeout, and the second retry value must be greater than the first retry timeout. 4 Click Apply. 9
10 Known issues Known issues in this release of the software are described below: If you are working with McAfee Vulnerability Manager and epolicy Orchestrator, web application assets are not imported into epolicy Orchestrator through Rogue System Detection (RSD). This means users with access to McAfee Vulnerability Manager information but no RSD permissions can still query and view McAfee Vulnerability Manager web application asset information. To restrict access to web application asset information, users should not have McAfee Vulnerability Manager permissions in epolicy Orchestrator. This quarterly release provides updates to the database. Synchronizing data from McAfee Vulnerability Manager to will work. Synchronizing data from McAfee Vulnerability Manager to will not work. Adding a vulnerability set to a Quick Scan configuration causes future Quick Scans to not function properly. 10
McAfee Security-as-a-Service
Troubleshooting Solutions Guide McAfee Security-as-a-Service For use with epolicy Orchestrator 4.6.0 Software This guide provides supplemental information related to installing and using the McAfee Security-as-a-Service
More informationRelease Notes McAfee Vulnerability Manager 7.5.8
Release Notes McAfee Vulnerability Manager 7.5.8 About this release Resolved issues Installation instructions Known issues Find product documentation About this release This document contains important
More informationHow-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018
How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable
More informationInterface reference. McAfee Policy Auditor Interface Reference Guide. Add Service Level Agreement page
McAfee Policy Auditor 6.4.0 Interface Reference Guide (McAfee epolicy Orchestrator) Interface reference Add Service Level Agreement page Use this page to add Service Level Agreements. Service Level Agreements
More informationFoundstone 7.0 Patch 6 Release Notes
Foundstone 7.0 Patch 6 Release Notes These release notes describe the changes and updates for Foundstone 7.0, patch 6. This application installs only the patch needed to update the Foundstone system. Foundstone
More informationMobility Services CAS. wips CHAPTER
13 CHAPTER This chapter briefly describes the CAS or wips services that WCS supports and gives steps for mobility procedures that are common across all services. You can refer to the Cisco Context-Aware
More informationTenable for McAfee epolicy Orchestrator
How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More informationWorking with Reports
The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page
More informationFoundstone 7.0 Patch 8 Release Notes
Foundstone 7.0 Patch 8 Release Notes These release notes describe the changes and updates for Foundstone 7.0, patch 8. This application installs only the patch needed to update the Foundstone system. Foundstone
More informationMcAfee epolicy Orchestrator Release Notes
McAfee epolicy Orchestrator 5.9.1 Release Notes Contents About this release What's new Resolved issues Known issues Installation information Getting product information by email Where to find product documentation
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationThe following topics describe how to work with reports in the Firepower System:
The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working
More informationMcAfee Cloud Workload Security Product Guide
Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationTenable.io User Guide. Last Revised: November 03, 2017
Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link
More informationMcAfee Red and Greyscale
epolicy Orchestrator version 4.0 Quick Reference Card Product Updates DAT File Updates Database server McAfee Download Site 1 2 4 Threat Notification epolicy Orchestrator Server and Master Repository 6
More informationProduct Guide Revision B. McAfee Cloud Workload Security 5.0.0
Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.5.0
Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee VirusScan and McAfee epolicy Orchestrator Administration Course
McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration
More informationMcAfee Data Loss Prevention Endpoint
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.300 For use with epolicy Orchestrator 4.6, 5.0.1, 5.1 Software Contents About this release Enhancements Resolved issues Installation instructions
More informationMcafee epo. Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0
Mcafee epo Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ McAfee MA0-100 McAfee Certified Product Specialist-ePO Practice Test Version: 4.0 Exam A QUESTION
More informationPerform Configuration Audits Using Compliance
How To Perform a Compliance Audit, page 1 Enable and Disable Compliance Auditing, page 2 Create a New Compliance Policy, page 2 Create Compliance Policy Rules, page 3 Create a Compliance Profile That Contains
More informationMcAfee Management for Optimized Virtual Environments AntiVirus 4.5.0
Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to
More informationUser Guide. Version R95. English
Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationUsing LCS Help. In This Section
Using LCS Help We want to help you get the most out of Square D Lighting Control Software (LCS) system by Schneider Electric. This Help system contains most of the information you'll need to successfully
More informationForeScout Extended Module for Qualys VM
ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...
More informationMcAfee Exam MA0-100 McAfee Certified Product Specialist-ePO Version: 7.0 [ Total Questions: 157 ]
s@lm@n McAfee Exam MA0-100 McAfee Certified Product Specialist-ePO Version: 7.0 [ Total Questions: 157 ] Question No : 1 To remove computers from epo using the Active Directory Synchronization task, it
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationMcAfee Vulnerability Manager Release Notes
McAfee Vulnerability Manager 7.5.13 Release Notes COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationInterface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1
More informationForeScout CounterACT. Configuration Guide. Version 5.0
ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5
More informationMcAfee epolicy Orchestrator Release Notes
Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product
More informationSeries 6 Technical Admin Guide Page 1
Series 6 Technical Admin Guide Page 1 TABLE OF CONTENTS PRODUCT REGISTRATION... 6 Free Trial Registration and the Wizard...7 How the Trial Works...8 Register Invu Document Management...8 Privileges for
More informationAT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)
AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) i Contents ii Contents Introduction 3 1. Start Download Manager...3 2. Remove Incompatible
More informationCounterACT VMware vsphere Plugin
Configuration Guide Version 2.0.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What to Do... 5 Requirements... 5 CounterACT
More informationMcAfee Vulnerability Manager
Release Notes McAfee Vulnerability Manager 7.0.11 Contents About this release Resolved issues Known issues Find product documentation About this release This document contains important information about
More informationTenable for McAfee epolicy Orchestrator
HOW-TO GUIDE Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More informationMcAfee epolicy Orchestrator Update 2
Release Notes McAfee epolicy Orchestrator 5.10.0 Update 2 Contents Rating for update 5.10.0 Resolved issues in update 5.10.0 Installation instructions Rating for update 5.10.0 The rating defines the urgency
More informationCity National E Deposit SM User Guide
City National E Deposit SM User Guide July 2016 Copyright 2016 by City National Bank Member FDIC All rights reserved. No part of this User Guide may be reproduced or transmitted in any form or by any means,
More informationMcAfee Rogue Database Detection For use with epolicy Orchestrator Software
McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationMcAfee Boot Attestation Service 3.5.0
Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationDiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd.
DiskSavvy DISK SPACE ANALYZER User Manual Version 10.3 Dec 2017 www.disksavvy.com info@flexense.com 1 1 Product Overview...3 2 Product Versions...7 3 Using Desktop Versions...8 3.1 Product Installation
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationE: W: avinet.com.au. Air Maestro Training Guide Document Library Module Page 1
E: help@avinet.com.au W: avinet.com.au Air Maestro Training Guide Document Library Module Page 1 Contents Assigning Access Levels... 3 Document Library Overview... 4 Sort Documents... 4 Find Documents...
More informationUser Guide. Web Intelligence Rich Client. Business Objects 4.1
User Guide Web Intelligence Rich Client Business Objects 4.1 2 P a g e Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence 4.1... 5 Log into EDDIE...
More informationCopyright 2010, Oracle. All rights reserved.
Agenda Interactive Dashboards Master-Detail Linking New Prompt Controls Pivot Table Interactions Enhanced Dashboard Builder Analysis Editor Overview Working with the analysis editor step by step Praxisteil
More informationBasic Query for Human Resources
Basic Query for Human Resources Open browser Log into PeopleSoft Human Resources: Go to: https://cubshr9.clemson.edu/psp/hpprd/?cmd=login Enter your Novell ID and Password Click Sign In Navigation into
More informationIBM Security SiteProtector System User Guide for Security Analysts
IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 83. This
More informationCounterACT VMware vsphere Plugin
CounterACT VMware vsphere Plugin Configuration Guide Version 2.0.0 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What
More informationForeScout Extended Module for Palo Alto Networks Next Generation Firewall
ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic
More informationChapter 1. Configuring VPGO
Chapter 1. Configuring VPGO The VPGO module is configured in the VISUAL PLANNING client. You can define as many VPGO templates as you need based on the three existing template types: Diary template Events
More informationMcAfee Content Security Reporter 2.6.x Migration Guide
McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationIBM Proventia Management SiteProtector Policies and Responses Configuration Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,
More informationMigration Guide. McAfee Content Security Reporter 2.4.0
Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationForeScout Extended Module for Advanced Compliance
ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support
More informationTanium Patch User Guide. Version 2.3.0
Tanium Patch User Guide Version 2.3.0 September 18, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is
More informationNewforma Contact Directory Quick Reference Guide
Newforma Contact Directory Quick Reference Guide This topic provides a reference for the Newforma Contact Directory. Purpose The Newforma Contact Directory gives users access to the central list of companies
More informationSureClose Advantage. Release Notes Version
SureClose Advantage Release Notes Version 2.1.000 Table of Contents Overview...1 Post-Installation Considerations... 1 Features and Functionality...3 What s New in this Release... 3 Import Files, Parties
More informationForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0
ForeScout CounterACT Core Extensions Module: IoT Posture Assessment Engine Version 1.0 Table of Contents About the IoT Posture Assessment Engine... 3 View All Endpoints Having a Security Risk... 3 Assess
More informationNETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We
More informationProduct overview. McAfee Web Protection Hybrid Integration Guide. Overview
McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee
More informationSoftkey Template Setup
This chapter provides details about softkey template configuration. The administrator can copy, update, or delete nonstandard softkey templates by using softkey template configuration. About, on page 1
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationForeScout CounterACT. Plugin. Configuration Guide. Version 2.1
ForeScout CounterACT Hybrid Cloud Module: VMware vsphere Plugin Version 2.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin...
More informationColligo Contributor Pro 4.4 SP2. User Guide
4.4 SP2 User Guide CONTENTS Introduction... 3 Benefits... 3 System Requirements... 3 Software Requirements... 3 Client Software Requirements... 3 Server Software Requirements... 3 Installing Colligo Contributor...
More informationUsing the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1
Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationOracle User Productivity Kit Reports Management. E July 2012
Oracle User Productivity Kit Reports Management E29429-01 July 2012 Oracle User Productivity Kit Reports Management E29429-01 July 2012 Copyright 1998, 2012, Oracle and/or its affiliates. All rights reserved.
More informationQuark XML Author October 2017 Update for Platform with Business Documents
Quark XML Author 05 - October 07 Update for Platform with Business Documents Contents Getting started... About Quark XML Author... Working with the Platform repository...3 Creating a new document from
More informationProcedure to Create Custom Report to Report on F5 Virtual Services
Procedure to Create Custom Report to Report on F5 Virtual Services Summary: The purpose of this Application Note is to provide a procedure to report on F5 Load Balancer Virtual Services. The report uses
More informationORACLE USER PRODUCTIVITY KIT KNOWLEDGE CENTER: REPORTS MANAGEMENT RELEASE 11.0 PART NO. E
ORACLE USER PRODUCTIVITY KIT KNOWLEDGE CENTER: REPORTS MANAGEMENT RELEASE 11.0 PART NO. E23918-01 JULY 2011 COPYRIGHT & TRADEMARKS Copyright 1998, 2011, Oracle and/or its affiliates. All rights reserved.
More informationClaims Loss Run Report
About the Claims Loss Run Report The Claims Loss Run report gives you the ability to build custom reports from the data collected via the Claims modules with financial information pertinent to actuary
More informationQualys Cloud Suite 2.x
Qualys Cloud Suite 2.x Version 2.34 August 29, 2018 Here s what s new in Qualys Cloud Suite 2.34! Continuous Monitoring License Counts are enforced for Continuous Monitoring Security Assessment Questionnaire
More informationHow to use the Assets panel
Adobe Dreamweaver Guide How to use the Assets panel You can use the Assets panel in Dreamweaver to manage assets in the current site (Figure 1). The Assets panel displays assets for the site associated
More informationMcAfee Security Connected Integrating epo and MVM
McAfee Security Connected Integrating epo and MVM Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Optional Configuration Steps for McAfee Risk Advisor 2.7.2
More informationIncreasing Host IPS Management Success McAfee Inc. External Use
Increasing Host IPS Management Success Tech 60 W ebinar Series Webinar Viewing Click the arrow on the Grab Tab to open or close the control panel Audio options listen via your PC computer OR via the telephone
More information9.4 Authentication Server
9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the
More informationKMnet Viewer. User Guide
KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be
More informationHPE Security Fortify Plugins for Eclipse
HPE Security Fortify Plugins for Eclipse Software Version: 17.20 Installation and Usage Guide Document Release Date: November 2017 Software Release Date: November 2017 Legal Notices Warranty The only warranties
More informationTanium Patch User Guide. Version 2.1.5
Tanium Patch User Guide Version 2.1.5 May 21, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is believed
More informationUsing the VMware vrealize Orchestrator Client
Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationPageScope Net Care Device Manager Ver. 2.0 User s Guide
PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT Duplicate Files Search Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one
More informationQualys Cloud Suite 2.30
Qualys Cloud Suite 2.30 Here s what s new in Qualys Cloud Suite 2.30! AssetView ThreatPROTECT Dynamic tag support for Amazon EC2 Metadata Search Assets by Amazon EC2 Metadata Cloud Agent Download Search
More informationQuark XML Author for FileNet 2.5 with BusDocs Guide
Quark XML Author for FileNet 2.5 with BusDocs Guide CONTENTS Contents Getting started...6 About Quark XML Author...6 System setup and preferences...8 Logging in to the repository...8 Specifying the location
More informationAdministrative Training Mura CMS Version 5.6
Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:
More informationForeScout CounterACT. Classify Devices. How-to Guide. Version 8.0
ForeScout CounterACT How-to Guide Version 8.0 Table of Contents About Device Classification... 3 Groups That Can Be Created by the Policy... 3 Prerequisites... 4 Create a Primary Classification Policy...
More informationDupScout DUPLICATE FILES FINDER
DupScout DUPLICATE FILES FINDER User Manual Version 10.3 Dec 2017 www.dupscout.com info@flexense.com 1 1 Product Overview...3 2 DupScout Product Versions...7 3 Using Desktop Product Versions...8 3.1 Product
More informationSitecore Experience Platform 8.0 Rev: September 13, Sitecore Experience Platform 8.0
Sitecore Experience Platform 8.0 Rev: September 13, 2018 Sitecore Experience Platform 8.0 All the official Sitecore documentation. Page 1 of 455 Experience Analytics glossary This topic contains a glossary
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT File Integrity Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)
McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationShopping Cart: Queries, Personalizations, Filters, and Settings
Shopping Cart: Queries, Personalizations, Filters, and Settings on the Shopping Cart Home Page Use this Job Aid to: Learn how to organize the Shopping Cart home page so that it is easier to use. BEFORE
More informationACTS Version 5.9 Release
ACTS Version 5.9 Release Release Note Last Updated: August 22, 2014 EFC Version: 12.1.1, Country Code: 1 Product Affected: ACTS Version 5.9 Document Author: Lindsey Organ KEY FEATURES AND UPDATES This
More informationQualys Cloud Suite Release Notes
Qualys Cloud Suite 8.10.2 Release Notes This new release of the Qualys Cloud Suite of Security and Compliance Applications includes improvements to Vulnerability Management and Policy Compliance. Qualys
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS
More informationProventeq Migration Accelerator User Guide for Documentum To Oracle WebCenter Content Migration. Version: 6.4
Proventeq Migration Accelerator User Guide for Documentum To Oracle WebCenter Content Migration Version: 6.4 Proventeq Ltd 24 May 2018 Table of Contents 1. INTRODUCTION... 5 2. LAUNCH APPLICATION-... 6
More informationQuark XML Author June 2017 Update for Platform with DITA
Quark XML Author 05 - June 07 Update for Platform with DITA Contents Getting started... About Quark XML Author... Resources on DITA... Working with the repository...4 Creating a new topic from a repository
More informationLegal Notes. Regarding Trademarks KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationTenable.io Evaluation Workflow. Last Revised: August 22, 2018
Tenable.io Evaluation Workflow Last Revised: August 22, 2018 Table of Contents Welcome 3 Part One 4 Create User(s) and Group(s) 5 Create Target Group(s) 6 Create Exclusion Lists 7 Create an External Scan
More information