McAfee Vulnerability Manager 7.0.1

Size: px
Start display at page:

Download "McAfee Vulnerability Manager 7.0.1"

Transcription

1 McAfee Vulnerability Manager The McAfee Vulnerability Manager quarterly release brings important functionality to the product without having to wait for the next major release. This technical note contains information about new features since McAfee Vulnerability Manager 7.0. Note: McAfee Vulnerability Manager provides context-sensitive help. For this quarterly release, there are no updates to the online help files. Clicking on a help icon for an existing feature with new functionality will not include information for the new features. What's new The new features for this quarterly release include vulnerability sets, viewing port numbers in reports, and some new configuration manager preferences. Vulnerability sets (page 1) Create a vulnerability set to target which vulnerabilities to scan for and generate reports for. Ports in reports (page 8) For general vulnerabilities and web FSL checks, the port number, service, and protocol are now included in the Vulnerability Details and Vulnerabilities by IP report sections. Configuration manager preferences (page 9) A scan controller configuration tab and a scan engine configuration tab have been added to the configuration manager Preferences dialog box. Using vulnerability sets Create a vulnerability set and add the vulnerabilities that are important to your organization. You can add a vulnerability set to a scan configuration or asset report, modify the vulnerability set, and have those updated vulnerability selections applied to all scan configurations using the vuln set. You can add one vulnerability set to a scan configuration or an asset report template. When adding vulnerabilities to a set, you can select the vulnerabilities from a tree structure, or you can create rules for selecting vulnerabilities.

2 Only organization and workgroup administrators can create vulnerability sets. Administrators above the vulnerability set creator can modify, duplicate, or delete the vulnerability set. Administrators below the set creator can only view or duplicate the vulnerability set. Tree Based Select vulnerabilities from a list of vulnerabilities. View vulnerabilities by type (Display By) or search for them (Search By). Rule Based Select criteria in the rule editor for selecting vulnerabilities. Click Preview Rules to see which vulnerabilities are selected based on your rules. Creating a vulnerability set using the vuln tree Select vulnerabilities from the vuln tree when you want to include specific vulnerabilities in your scan configurations and asset reports. A vuln tree based vulnerability set works the same as the vuln tree in a scan configuration. All vulnerability categories are set to not use new vulnerability checks each time the scan is run. You can modify this using advanced settings so new vulnerability checks are used each time the scan is run. 2 Click Create New. 3 Type a name for the vulnerability set. Typing a description is optional. 4 Select Tree Based for the Type, then click Next. 5 Select vulnerabilities from the tree. You can also use the Display By list or use Search to find vulnerabilities. 6 Click Advanced, then select Run New Checks for any vulnerabilities you want the scan configuration to check for updates on every time the scan is run. 7 Click Save. 2

3 Vuln tree options The following table describes the options available for use in the Vuln Tree. Vulnerability tree options Display by Changes the way the vulnerability checks are displayed on this page: Category - Displays the vulnerability checks in categories. Vulnerability check categories fall into two important categories: Intrusive - these checks are likely to interfere with the host's normal operating behavior. Some intrusive checks can cause a denial-of-service condition or require that the host be restarted. If you enable Intrusive checks, monitor the devices both during and after the scan to ensure they are performing as anticipated. Non-Intrusive - these checks do not affect the host being scanned. MS Number - sorts and categorizes the vulnerability checks according to the Microsoft Security Bulletin numbers. Risk Level - sorts and displays the vulnerability checks according to their risk level: Informational, Low, Medium, and High. CVE - sorts and categorizes the vulnerability checks according to their CVE numbers. Warning: When displaying vulnerability checks by CVE Number or Risk Rating, the intrusive checks and nonintrusive checks are combined. Selecting entire CVE Number or Risk Rating categories will result in selecting a mixture of intrusive and non-intrusive checks. Search by Select the data you want to search on: Name Search through vulnerability check names. CVE Number Search for a specific CVE number Risk Level Select a risk level: High, Medium, Low, or Informational. Enter the criteria you want to search, based on your Search by selection. 3

4 Creating a vulnerability set using rules Create rules when you want to include all vulnerabilities that meet a set of criteria. Rules are evaluated at scan time. New checks are automatically added if they match the rules defined in a rule-based vulnerability set when the scan configuration using this set runs. Note: In Microsoft Internet Explorer, the internet security settings for Internet and Local Internet must be set to default for the rule pop-up window to display. 2 Click Create New. 3 Type a name for the vulnerability set. Typing a description is optional. 4 Select Rule Based for the Type. 5 Click the Rules tab. The rule "Intrusive equals No" is added by default, which means only non-intrusive vulnerability checks will be added to the scan configuration. 6 Click Add Condition or Add Nest Condition. Add Condition Add a condition at the current level in the hierarchy. Add Nested Condition Create a new condition on a new child-level in the hierarchy. Nested conditions share the same operator. 7 Select a condition type from the list. 8 Select criteria for the condition. 9 Click Set Condition. 10 Click Preview to view the vulnerability tree, with the vulnerabilities selected based on the conditions of your rules. 11 Click Save. 4

5 Vuln rule options The following table describes the conditions available for use in the Vuln Set rule editor. Vuln rule options Category CVE Number CWE Intrusive Module MS Number Risk Select an operator (equals or does not equal), then type the category name. As you type the name, a list appears. Select a category from the list or type out the full category name. Select an operator (contains or does not contain), then type a CVE string. This will include or exclude the vulnerabilities associated with the CVE string. Type a CWE and select to include or exclude the vulnerabilities associated with the CWE. Select to include intrusive or non-intrusive vulnerability checks. Select to include or exclude vulnerabilities based on a module (General Vulnerability, Windows Host, Wireless, Shell, or Web). Type an MS number and select to include or exclude vulnerabilities associated with the MS number. Select a risk level and condition to include vulnerabilities that match the condition. Specific Vulnerability Type a vulnerability and select to include or exclude the vulnerability. Vulnerability Name Enter a vulnerability name, and set whether to include or exclude this name. Vulnerability Severity Select the vulnerability severity level(s), and set whether to include or exclude the severity level. 5

6 Modifying a vulnerability set You can add or remove vulnerabilities from a set, and those changes will affect any scan configurations and asset report templates using it. This allows you to quickly modify the vulnerabilities you are scanning and reporting on. You can also change the type, like from tree based to rule based. This allows you to change the vulnerability set for multiple scan configurations and asset report templates in one location. Note: Changing the vulnerability set type erases any vuln tree selections or rules created. 2 Click View/Edit. 3 Select the Vuln Tree tab if the set is Tree Based. Select the Rules tab if the set is Rules Based. 4 Add or remove vulnerabilities (tree based) or rules (rules based) from the set. 5 Click Save. Duplicating a vulnerability set Duplicating a vulnerability set allows you to use an existing set as a starting point, and then modify the set as needed. 2 Click View/Edit. 3 Click Save As. A message appears. 4 Click OK. A duplicate set is created and Copy Of is added to the name. 5 Type a new name for the vulnerability set. Typing a description is optional. 6 Depending on the type, either add vulnerabilities using the Vuln Tree or add rules using the Rules editor. 7 Click Save. Deleting a vulnerability set You can delete vulnerability sets that are no longer needed. Before you can delete a vulnerability set, you must remove it from all scan configurations and asset report templates. 2 Click Delete. A confirmation message appears. 3 Click OK. 6

7 Adding a vulnerability set to a scan configuration After creating a vulnerability set, you can add it to your scan configurations. Create a new scan configuration, or edit an existing one, and go to the Settings tab. There is a radio button that enabled using Vulnerability Sets. Select the option and start typing the name of a vulnerability set. A list of vulnerability sets appears based on what is being typed. This list displays the first 20 matching entries. Select a vulnerability set. If you want to preview which vulnerabilities are included in the vulnerability set, click Preview. The vulnerability tree is updated with the vulnerabilities selected in the set. Note: A set might contain vulnerability checks that require credentialed access to the system being scanned. If necessary, include credentials on the Settings page of a scan configuration. If you want to change the vulnerability set being used, edit the scan configuration and select a different vulnerability set. If you do not want to use the vulnerability set, select Do not use a Vuln Set. You can then select vulnerabilities for the scan configuration. Adding a vulnerability set to an asset report When creating an asset report template, you can include a vulnerability set on the Asset Filter tab and the Sections tab. Adding a vulnerability set on the Asset Filter tab will include the assets that are vulnerable to one or more of the vulnerabilities specified in the set. Adding a vulnerability set on the Sections tab will only include vulnerabilities from the set in the asset report. If you want to change the vulnerability set being used, edit the asset report template and select a different vulnerability set. 1 On the Asset Filter tab for an asset report template, click Add Condition or Add Nested Condition. 2 Select Vulnerability (Vuln Set) from the list. The only operator available is contained in. 3 Type the name of the vulnerability set. As you type, a list of sets appears. You can type the full name of the set or select one from the list. Note: The vulnerability set list displays the first 20 matching entries. 4 Click Set Condition. 5 On the Sections tab, select Vulnerability Assessment. 6 Click Select Vulnerabilities. 7 Select the Vuln Set radio button, then select a vulnerability set. 8 Click OK. 9 Save your asset report template. 7

8 Checking for vulnerability sets in use Before a vulnerability set can be deleted, the set must be removed from any scan configuration or asset report template using it. If a vulnerability set is in use, the Delete button is not available. 2 If the vulnerability set is being used, click Yes under In Use. View the list of scan configurations and asset report template using the vulnerability set. Note: This list only displays scan configurations and asset report templates that you have access to. A warning message displays if there are scan configurations or asset report templates using this set that you do not have access to. Ports in reports For scan reports and asset reports, the Vulns By IP and Vulnerability Details report pages display the port number, protocol, and service name a vulnerability is discovered on. This information will appear in HTML, PDF, XML, and CSV reports. General, Windows, Shell, Wireless, and Web FSL vulnerabilities will display the port, protocol, and service name information. You can search for a port number on the Vulns By IP and Vulnerability Details report pages. The service name and protocol are not searchable. Reports generated before the upgrade will not display the ports. Reports generated from scan configurations run before the upgrade will not display the ports. You must rerun your scan configurations and then generate your reports for the port information to display. Enabling non-standard ports in a scan configuration If you are running services on custom ports, make sure detecting services running on non-standard ports is enabled in the scan configuration and that the proper services are selected. 1 Create a new scan configuration or edit an existing one. 2 Select Services on the Settings tab. 3 Click Advanced Options. 4 Make sure Detect services running on non-standard ports is selected. 5 Select a service under Available Services, then click >> to add it to the Selected Services list. 6 Click Close, then click Save. 8

9 Configuration manager preferences The configuration manager has two new tabs in the Preferences dialog box, the Scan Controller tab and the Scan Engine tab. The scan controller tab allows you to change the maximum number of connections allowed for a scan controller. The scan engines tab allows you to change the amount of time the scan engine will wait for a response before terminating the post operation. Note: When adding a new scan controller or scan engine to an existing McAfee Vulnerability Manager deployment, you must reapply the configuration manager settings for the new components. Specifying scan controller preferences The Max Database Connection Pool value is the maximum number of concurrent connections a scan controller can make to the database. If the server running your database exceeds the minimum system requirements, you can adjust this number to improve product performance. 1 In the configuration manager, select Tools Preferences. 2 Select the Scan Controller tab. 3 Type the maximum number of connections allowed for all connected scan controllers. If a scan controller is offline, this change will not affect that scan controller. Note: Zero is not a valid number for the Max Database Connection Pool. 4 Click Apply. Specifying scan engine preferences You can set the maximum amount of time allowed for a post operation to get a response before it is timed out by the scan engine. There is an initial timeout value and two retry timeout values. 1 In the configuration manager, select Tools Preferences. 2 Select the Scan Engine tab. 3 Type a value for the Initial timeout, First retry, and Second retry. The values must be between one and 600. The first retry value must be greater than the initial timeout, and the second retry value must be greater than the first retry timeout. 4 Click Apply. 9

10 Known issues Known issues in this release of the software are described below: If you are working with McAfee Vulnerability Manager and epolicy Orchestrator, web application assets are not imported into epolicy Orchestrator through Rogue System Detection (RSD). This means users with access to McAfee Vulnerability Manager information but no RSD permissions can still query and view McAfee Vulnerability Manager web application asset information. To restrict access to web application asset information, users should not have McAfee Vulnerability Manager permissions in epolicy Orchestrator. This quarterly release provides updates to the database. Synchronizing data from McAfee Vulnerability Manager to will work. Synchronizing data from McAfee Vulnerability Manager to will not work. Adding a vulnerability set to a Quick Scan configuration causes future Quick Scans to not function properly. 10

McAfee Security-as-a-Service

McAfee Security-as-a-Service Troubleshooting Solutions Guide McAfee Security-as-a-Service For use with epolicy Orchestrator 4.6.0 Software This guide provides supplemental information related to installing and using the McAfee Security-as-a-Service

More information

Release Notes McAfee Vulnerability Manager 7.5.8

Release Notes McAfee Vulnerability Manager 7.5.8 Release Notes McAfee Vulnerability Manager 7.5.8 About this release Resolved issues Installation instructions Known issues Find product documentation About this release This document contains important

More information

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018 How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable

More information

Interface reference. McAfee Policy Auditor Interface Reference Guide. Add Service Level Agreement page

Interface reference. McAfee Policy Auditor Interface Reference Guide. Add Service Level Agreement page McAfee Policy Auditor 6.4.0 Interface Reference Guide (McAfee epolicy Orchestrator) Interface reference Add Service Level Agreement page Use this page to add Service Level Agreements. Service Level Agreements

More information

Foundstone 7.0 Patch 6 Release Notes

Foundstone 7.0 Patch 6 Release Notes Foundstone 7.0 Patch 6 Release Notes These release notes describe the changes and updates for Foundstone 7.0, patch 6. This application installs only the patch needed to update the Foundstone system. Foundstone

More information

Mobility Services CAS. wips CHAPTER

Mobility Services CAS. wips CHAPTER 13 CHAPTER This chapter briefly describes the CAS or wips services that WCS supports and gives steps for mobility procedures that are common across all services. You can refer to the Cisco Context-Aware

More information

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments

More information

Working with Reports

Working with Reports The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page

More information

Foundstone 7.0 Patch 8 Release Notes

Foundstone 7.0 Patch 8 Release Notes Foundstone 7.0 Patch 8 Release Notes These release notes describe the changes and updates for Foundstone 7.0, patch 8. This application installs only the patch needed to update the Foundstone system. Foundstone

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes McAfee epolicy Orchestrator 5.9.1 Release Notes Contents About this release What's new Resolved issues Known issues Installation information Getting product information by email Where to find product documentation

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

The following topics describe how to work with reports in the Firepower System:

The following topics describe how to work with reports in the Firepower System: The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

McAfee Red and Greyscale

McAfee Red and Greyscale epolicy Orchestrator version 4.0 Quick Reference Card Product Updates DAT File Updates Database server McAfee Download Site 1 2 4 Threat Notification epolicy Orchestrator Server and Master Repository 6

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration

More information

McAfee Data Loss Prevention Endpoint

McAfee Data Loss Prevention Endpoint Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.300 For use with epolicy Orchestrator 4.6, 5.0.1, 5.1 Software Contents About this release Enhancements Resolved issues Installation instructions

More information

Mcafee epo. Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0

Mcafee epo.  Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Mcafee epo Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ McAfee MA0-100 McAfee Certified Product Specialist-ePO Practice Test Version: 4.0 Exam A QUESTION

More information

Perform Configuration Audits Using Compliance

Perform Configuration Audits Using Compliance How To Perform a Compliance Audit, page 1 Enable and Disable Compliance Auditing, page 2 Create a New Compliance Policy, page 2 Create Compliance Policy Rules, page 3 Create a Compliance Profile That Contains

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Using LCS Help. In This Section

Using LCS Help. In This Section Using LCS Help We want to help you get the most out of Square D Lighting Control Software (LCS) system by Schneider Electric. This Help system contains most of the information you'll need to successfully

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

McAfee Exam MA0-100 McAfee Certified Product Specialist-ePO Version: 7.0 [ Total Questions: 157 ]

McAfee Exam MA0-100 McAfee Certified Product Specialist-ePO Version: 7.0 [ Total Questions: 157 ] s@lm@n McAfee Exam MA0-100 McAfee Certified Product Specialist-ePO Version: 7.0 [ Total Questions: 157 ] Question No : 1 To remove computers from epo using the Active Directory Synchronization task, it

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

McAfee Vulnerability Manager Release Notes

McAfee Vulnerability Manager Release Notes McAfee Vulnerability Manager 7.5.13 Release Notes COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product

More information

Series 6 Technical Admin Guide Page 1

Series 6 Technical Admin Guide Page 1 Series 6 Technical Admin Guide Page 1 TABLE OF CONTENTS PRODUCT REGISTRATION... 6 Free Trial Registration and the Wizard...7 How the Trial Works...8 Register Invu Document Management...8 Privileges for

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) i Contents ii Contents Introduction 3 1. Start Download Manager...3 2. Remove Incompatible

More information

CounterACT VMware vsphere Plugin

CounterACT VMware vsphere Plugin Configuration Guide Version 2.0.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What to Do... 5 Requirements... 5 CounterACT

More information

McAfee Vulnerability Manager

McAfee Vulnerability Manager Release Notes McAfee Vulnerability Manager 7.0.11 Contents About this release Resolved issues Known issues Find product documentation About this release This document contains important information about

More information

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator HOW-TO GUIDE Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments

More information

McAfee epolicy Orchestrator Update 2

McAfee epolicy Orchestrator Update 2 Release Notes McAfee epolicy Orchestrator 5.10.0 Update 2 Contents Rating for update 5.10.0 Resolved issues in update 5.10.0 Installation instructions Rating for update 5.10.0 The rating defines the urgency

More information

City National E Deposit SM User Guide

City National E Deposit SM User Guide City National E Deposit SM User Guide July 2016 Copyright 2016 by City National Bank Member FDIC All rights reserved. No part of this User Guide may be reproduced or transmitted in any form or by any means,

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd.

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd. DiskSavvy DISK SPACE ANALYZER User Manual Version 10.3 Dec 2017 www.disksavvy.com info@flexense.com 1 1 Product Overview...3 2 Product Versions...7 3 Using Desktop Versions...8 3.1 Product Installation

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

E: W: avinet.com.au. Air Maestro Training Guide Document Library Module Page 1

E: W: avinet.com.au. Air Maestro Training Guide Document Library Module Page 1 E: help@avinet.com.au W: avinet.com.au Air Maestro Training Guide Document Library Module Page 1 Contents Assigning Access Levels... 3 Document Library Overview... 4 Sort Documents... 4 Find Documents...

More information

User Guide. Web Intelligence Rich Client. Business Objects 4.1

User Guide. Web Intelligence Rich Client. Business Objects 4.1 User Guide Web Intelligence Rich Client Business Objects 4.1 2 P a g e Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence 4.1... 5 Log into EDDIE...

More information

Copyright 2010, Oracle. All rights reserved.

Copyright 2010, Oracle. All rights reserved. Agenda Interactive Dashboards Master-Detail Linking New Prompt Controls Pivot Table Interactions Enhanced Dashboard Builder Analysis Editor Overview Working with the analysis editor step by step Praxisteil

More information

Basic Query for Human Resources

Basic Query for Human Resources Basic Query for Human Resources Open browser Log into PeopleSoft Human Resources: Go to: https://cubshr9.clemson.edu/psp/hpprd/?cmd=login Enter your Novell ID and Password Click Sign In Navigation into

More information

IBM Security SiteProtector System User Guide for Security Analysts

IBM Security SiteProtector System User Guide for Security Analysts IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

CounterACT VMware vsphere Plugin

CounterACT VMware vsphere Plugin CounterACT VMware vsphere Plugin Configuration Guide Version 2.0.0 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What

More information

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic

More information

Chapter 1. Configuring VPGO

Chapter 1. Configuring VPGO Chapter 1. Configuring VPGO The VPGO module is configured in the VISUAL PLANNING client. You can define as many VPGO templates as you need based on the three existing template types: Diary template Events

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

Tanium Patch User Guide. Version 2.3.0

Tanium Patch User Guide. Version 2.3.0 Tanium Patch User Guide Version 2.3.0 September 18, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is

More information

Newforma Contact Directory Quick Reference Guide

Newforma Contact Directory Quick Reference Guide Newforma Contact Directory Quick Reference Guide This topic provides a reference for the Newforma Contact Directory. Purpose The Newforma Contact Directory gives users access to the central list of companies

More information

SureClose Advantage. Release Notes Version

SureClose Advantage. Release Notes Version SureClose Advantage Release Notes Version 2.1.000 Table of Contents Overview...1 Post-Installation Considerations... 1 Features and Functionality...3 What s New in this Release... 3 Import Files, Parties

More information

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0 ForeScout CounterACT Core Extensions Module: IoT Posture Assessment Engine Version 1.0 Table of Contents About the IoT Posture Assessment Engine... 3 View All Endpoints Having a Security Risk... 3 Assess

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

Softkey Template Setup

Softkey Template Setup This chapter provides details about softkey template configuration. The administrator can copy, update, or delete nonstandard softkey templates by using softkey template configuration. About, on page 1

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1 ForeScout CounterACT Hybrid Cloud Module: VMware vsphere Plugin Version 2.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin...

More information

Colligo Contributor Pro 4.4 SP2. User Guide

Colligo Contributor Pro 4.4 SP2. User Guide 4.4 SP2 User Guide CONTENTS Introduction... 3 Benefits... 3 System Requirements... 3 Software Requirements... 3 Client Software Requirements... 3 Server Software Requirements... 3 Installing Colligo Contributor...

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Oracle User Productivity Kit Reports Management. E July 2012

Oracle User Productivity Kit Reports Management. E July 2012 Oracle User Productivity Kit Reports Management E29429-01 July 2012 Oracle User Productivity Kit Reports Management E29429-01 July 2012 Copyright 1998, 2012, Oracle and/or its affiliates. All rights reserved.

More information

Quark XML Author October 2017 Update for Platform with Business Documents

Quark XML Author October 2017 Update for Platform with Business Documents Quark XML Author 05 - October 07 Update for Platform with Business Documents Contents Getting started... About Quark XML Author... Working with the Platform repository...3 Creating a new document from

More information

Procedure to Create Custom Report to Report on F5 Virtual Services

Procedure to Create Custom Report to Report on F5 Virtual Services Procedure to Create Custom Report to Report on F5 Virtual Services Summary: The purpose of this Application Note is to provide a procedure to report on F5 Load Balancer Virtual Services. The report uses

More information

ORACLE USER PRODUCTIVITY KIT KNOWLEDGE CENTER: REPORTS MANAGEMENT RELEASE 11.0 PART NO. E

ORACLE USER PRODUCTIVITY KIT KNOWLEDGE CENTER: REPORTS MANAGEMENT RELEASE 11.0 PART NO. E ORACLE USER PRODUCTIVITY KIT KNOWLEDGE CENTER: REPORTS MANAGEMENT RELEASE 11.0 PART NO. E23918-01 JULY 2011 COPYRIGHT & TRADEMARKS Copyright 1998, 2011, Oracle and/or its affiliates. All rights reserved.

More information

Claims Loss Run Report

Claims Loss Run Report About the Claims Loss Run Report The Claims Loss Run report gives you the ability to build custom reports from the data collected via the Claims modules with financial information pertinent to actuary

More information

Qualys Cloud Suite 2.x

Qualys Cloud Suite 2.x Qualys Cloud Suite 2.x Version 2.34 August 29, 2018 Here s what s new in Qualys Cloud Suite 2.34! Continuous Monitoring License Counts are enforced for Continuous Monitoring Security Assessment Questionnaire

More information

How to use the Assets panel

How to use the Assets panel Adobe Dreamweaver Guide How to use the Assets panel You can use the Assets panel in Dreamweaver to manage assets in the current site (Figure 1). The Assets panel displays assets for the site associated

More information

McAfee Security Connected Integrating epo and MVM

McAfee Security Connected Integrating epo and MVM McAfee Security Connected Integrating epo and MVM Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Optional Configuration Steps for McAfee Risk Advisor 2.7.2

More information

Increasing Host IPS Management Success McAfee Inc. External Use

Increasing Host IPS Management Success McAfee Inc. External Use Increasing Host IPS Management Success Tech 60 W ebinar Series Webinar Viewing Click the arrow on the Grab Tab to open or close the control panel Audio options listen via your PC computer OR via the telephone

More information

9.4 Authentication Server

9.4 Authentication Server 9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

HPE Security Fortify Plugins for Eclipse

HPE Security Fortify Plugins for Eclipse HPE Security Fortify Plugins for Eclipse Software Version: 17.20 Installation and Usage Guide Document Release Date: November 2017 Software Release Date: November 2017 Legal Notices Warranty The only warranties

More information

Tanium Patch User Guide. Version 2.1.5

Tanium Patch User Guide. Version 2.1.5 Tanium Patch User Guide Version 2.1.5 May 21, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is believed

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

PageScope Net Care Device Manager Ver. 2.0 User s Guide

PageScope Net Care Device Manager Ver. 2.0 User s Guide PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Duplicate Files Search Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

Qualys Cloud Suite 2.30

Qualys Cloud Suite 2.30 Qualys Cloud Suite 2.30 Here s what s new in Qualys Cloud Suite 2.30! AssetView ThreatPROTECT Dynamic tag support for Amazon EC2 Metadata Search Assets by Amazon EC2 Metadata Cloud Agent Download Search

More information

Quark XML Author for FileNet 2.5 with BusDocs Guide

Quark XML Author for FileNet 2.5 with BusDocs Guide Quark XML Author for FileNet 2.5 with BusDocs Guide CONTENTS Contents Getting started...6 About Quark XML Author...6 System setup and preferences...8 Logging in to the repository...8 Specifying the location

More information

Administrative Training Mura CMS Version 5.6

Administrative Training Mura CMS Version 5.6 Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:

More information

ForeScout CounterACT. Classify Devices. How-to Guide. Version 8.0

ForeScout CounterACT. Classify Devices. How-to Guide. Version 8.0 ForeScout CounterACT How-to Guide Version 8.0 Table of Contents About Device Classification... 3 Groups That Can Be Created by the Policy... 3 Prerequisites... 4 Create a Primary Classification Policy...

More information

DupScout DUPLICATE FILES FINDER

DupScout DUPLICATE FILES FINDER DupScout DUPLICATE FILES FINDER User Manual Version 10.3 Dec 2017 www.dupscout.com info@flexense.com 1 1 Product Overview...3 2 DupScout Product Versions...7 3 Using Desktop Product Versions...8 3.1 Product

More information

Sitecore Experience Platform 8.0 Rev: September 13, Sitecore Experience Platform 8.0

Sitecore Experience Platform 8.0 Rev: September 13, Sitecore Experience Platform 8.0 Sitecore Experience Platform 8.0 Rev: September 13, 2018 Sitecore Experience Platform 8.0 All the official Sitecore documentation. Page 1 of 455 Experience Analytics glossary This topic contains a glossary

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT File Integrity Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Shopping Cart: Queries, Personalizations, Filters, and Settings

Shopping Cart: Queries, Personalizations, Filters, and Settings Shopping Cart: Queries, Personalizations, Filters, and Settings on the Shopping Cart Home Page Use this Job Aid to: Learn how to organize the Shopping Cart home page so that it is easier to use. BEFORE

More information

ACTS Version 5.9 Release

ACTS Version 5.9 Release ACTS Version 5.9 Release Release Note Last Updated: August 22, 2014 EFC Version: 12.1.1, Country Code: 1 Product Affected: ACTS Version 5.9 Document Author: Lindsey Organ KEY FEATURES AND UPDATES This

More information

Qualys Cloud Suite Release Notes

Qualys Cloud Suite Release Notes Qualys Cloud Suite 8.10.2 Release Notes This new release of the Qualys Cloud Suite of Security and Compliance Applications includes improvements to Vulnerability Management and Policy Compliance. Qualys

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Proventeq Migration Accelerator User Guide for Documentum To Oracle WebCenter Content Migration. Version: 6.4

Proventeq Migration Accelerator User Guide for Documentum To Oracle WebCenter Content Migration. Version: 6.4 Proventeq Migration Accelerator User Guide for Documentum To Oracle WebCenter Content Migration Version: 6.4 Proventeq Ltd 24 May 2018 Table of Contents 1. INTRODUCTION... 5 2. LAUNCH APPLICATION-... 6

More information

Quark XML Author June 2017 Update for Platform with DITA

Quark XML Author June 2017 Update for Platform with DITA Quark XML Author 05 - June 07 Update for Platform with DITA Contents Getting started... About Quark XML Author... Resources on DITA... Working with the repository...4 Creating a new topic from a repository

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018 Tenable.io Evaluation Workflow Last Revised: August 22, 2018 Table of Contents Welcome 3 Part One 4 Create User(s) and Group(s) 5 Create Target Group(s) 6 Create Exclusion Lists 7 Create an External Scan

More information