McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide

Size: px
Start display at page:

Download "McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide"

Transcription

1 McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide

2 COPYRIGHT Copyright 009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. License Attributions Refer to the product Release Notes.

3 Contents Introduction Purpose of this guide Calculating Hardware Requirements Types of servers used for testing Considerations for outbreak response How products and events affect calculations Calculating data for your environment Recommendations for events per client per ASCI Managed systems per server Agent Handler scalability Bandwidth Usage Bandwidth requirements for initial deployment Agent deployment and bandwidth Bandwidth requirements to deploy managed products Methods to minimize impact when deploying products Bandwidth recommendations for repository distribution Concurrent Users Concurrent users and the effect on dashboard page loading Database Sizing

4 Introduction This document provides a tool for determining the level of server hardware, processor, memory, storage, and network bandwidth that McAfee recommends for the server-based components of your epolicy Orchestrator 4.5 deployment. This information can help guide your decision-making for hardware purchasing and provisioning. Contents Purpose of this guide Purpose of this guide McAfee has performed extensive tests on different server-class systems to help you decide the hardware requirements for your epolicy Orchestrator deployment. What is the goal? Assess and recommend the hardware required to support and manage environments of varying sizes. What is being measured and determined? Number of agent communication transactions processed over a period of time. Peak transaction rates for each server configuration. Recommendations for the number of client systems a server can manage. Which products were tested? VirusScan Enterprise 8.7i AntiSpyware Enterprise Module 8.7 Host Intrusion Prevention 7.0 GroupShield for Microsoft Exchange 7.0 Rogue Detection Sensor 4.5 SiteAdvisor Enterprise.0 What effect does the product have on events and performance? An event from VirusScan Enterprise is essentially the same size as an event from Host Intrusion Prevention. Performance is determined by how many events a product generates. 4

5 Calculating Hardware Requirements McAfee provides hardware recommendations for the server-based components of your epolicy Orchestrator 4.5 deployment. Use these recommendations when allocating server hardware to host the epo server. Contents Types of servers used for testing How products and events affect calculations Managed systems per server Types of servers used for testing McAfee conducted tests on a two-processor epo server with a four-processor database; a four-processor epo server with an eight-processor database; and an eight-processor epo server with a sixteen-processor database. The following are specifications for the epo server, the database server, and the network. Server specifications Two-processor server system, Intel Xeon.0 GHz Core server Four-processor server system, Intel Xeon.0 GHz Core server Eight-processor server system, Intel Xeon.0 GHz Core server GB of RAM per processor Windows 003 Server R, Service Pack, 3-bit RAID array 5 hard drive for local storage Database server specifications Four-server system, Intel Xeon 3.0 GHz Core Eight-processor server system, Intel Xeon 3.0 GHz Core Sixteen-processor server system, Intel Xeon 3.0 GHz Core GB of RAM per processor Windows 003 Server R, Service Pack, 64-bit SQL Server 005, Service Pack, 64-bit RAID array 5 hard drive for local storage Network specification 000Base-T Ethernet 5

6 Calculating Hardware Requirements How products and events affect calculations Considerations for outbreak response When applying this data to your own environment, you must consider your outbreak response requirements, including the response time and the number of systems. Response time The time period during which all systems must check in to the epo server. The three factors that define the response time in epolicy Orchestrator 4.5 are: Agent-to-server communication interval You can configure the response time when setting the agent-to-server communication interval (ASCI). Agent wake-up call The agent wake-up call is initiated manually, but you can determine the response time by setting this period as the Agent randomization interval. Global updating Once configured, global updating initiates updating automatically when packages are checked in. You can configure the response time by setting the randomization interval. NOTE: Although this information includes data for one to eight-hour response times, McAfee recommends a response time of no greater than six hours. Number of systems The number of managed systems that are required to check in within the response time. How products and events affect calculations For this guide we made calculations from customer interviews to determine the level of event generation for each product. NOTE: This guide makes no distinction between everyday events and outbreak events. All of this data is factored in. Examples of customer environments and events The following examples show the products that two customers have installed in their environments, as well as the number of agent-to-server communication intervals (ASCI), and the number of events per product. Customer 8,74 client systems ASCI per day (ASCI = hours) Product Daily events Events/client Events/client/ASCI VirusScan Enterprise 8.5i 370, To calculate averages for Customer : 370,6 events / 874 client systems = 9.77 events per client 9.77 events / ASCI per day =.6479 events per client per ASCI Customer 403 client systems 6

7 Calculating Hardware Requirements How products and events affect calculations 4 ASCI per day (ASCI = hour) Product Daily events Events/client Events/client/ASCI VirusScan Enterprise 8.5i 83, AntiSpyware Enterprise Module GroupShield for Microsoft Exchange Host Intrusion Prevention 7.0, Modifications to improve your averages Reduce the number of events Use event filtering to eliminate events you consider insignificant. Decrease ASCI Decrease the interval setting (that is, increase the number of ASCI per day). Calculating data for your environment Use this task and the following table to list the products in your environment and record the results of your own testing. Task List all managed products in your environment. From your testing, add the number of daily events for each product. 3 Calculate the number of events per client: for each product, divide the number of daily events by the number of client systems in your environment. 4 Calculate the number of events per client per ASCI: divide the number of events per client by the the number of ASCI per day. NOTE: If you conduct testing on only a portion of your network, you must extrapolate the events received to the number of nodes you anticipate deploying to. For example, if you test on 0 systems and receive 5 events in a day, on 000 systems you would receive 500 events. Calculations for your environment Product Daily events Events/client Events/client/ASCI VirusScan Enterprise 8.5i AntiSpyware Enterprise Module 8.7 Host Intrusion Prevention 7.0 GroupShield for Lotus Domino GroupShield for Microsoft Exchange 6.0 LinuxShield NetShield for NetWare PortalShield SiteAdvisor Enterprise 7

8 Calculating Hardware Requirements Managed systems per server Recommendations for events per client per ASCI McAfee recommends < 5 events per client per ASCI. Use this formula to calculate the number of client events per ASCI in your environment: Total number of events / number of client systems / ASCI per day (4/ASCI) With your environment set up according to this recommendation, you can use the the chart and table under Managed systems per server to calculate the number of client systems your server can manage with a given response time. Managed systems per server The data in the following chart and tables shows how many client systems each type of server can manage, with a required response time. For each server class, McAfee provides recommendations for: The number of client systems a two-processor server can support. The number of client systems a four-processor server can support. The number of client systems an eight-processor server can support. The response time in hours for each server, according to the number of supported client systems. These recommendations are conservative, based on test results that were significantly higher, in order to accommodate instances of increased load. The calculations here are for an environment with <99 events per client per ASCI. For best performance, McAfee recommends an environment with <5 events per client per ASCI. Although data is provided for one to eight-hour response times, McAfee recommends a response time no longer than six hours. Number of client systems that can be managed by number of processors Table : Client systems managed by epolicy Orchestrator 4.5 Required response time (hours) processor epo server with 4 processor SQL server 4 processor epo server with 8 processor SQL server 8 processor epo server with 6 processor SQL server 34,00 50,400 5,00 8

9 Calculating Hardware Requirements Managed systems per server Required response time (hours) processor epo server with 4 processor SQL server 68,400 0,600 36,800 7,000 05,00 39,400 73,600 4 processor epo server with 8 processor SQL server 00,800 5,00 0,600 5,000 30,400 35, ,00 8 processor epo server with 6 processor SQL server 04,400 56,600 08,800 6,000 33,00 365,400 47,600 Table : CPU usage of epolicy Orchestrator 4.5 and database server Required response time (hours) processor epo server with 4 processor SQL server 4 processor epo server with 8 processor SQL server 8 processor epo server with 6 processor SQL server ~40% ~0% ~0% ~5% ~8% ~5% Agent Handler scalability epolicy Orchestrator 4.5 introduced the term Agent Handler. The Agent Handler is a component of the epo server for managing agents. With multiple Agent Handlers distributed with epolicy Orchestrator, the server can manage more systems on the same network site. Table 3: Client systems managed by epolicy Orchestrator 4.5 with hour ASCI Number of distributed Agent Handlers One-processor Agent Handler Four-processor SQL server One-processor Agent Handler Eight-processor SQL server One-processor Agent Handler Sixteen-processor SQL server 8,800 30,600 3,400 59,400 6,00 63, ,000 90,000 93, ,600 84,600, ,400 8,800 09,800 9

10 Calculating Hardware Requirements Managed systems per server Due to the bottleneck on the database server, McAfee recommends: Distributing up to three Agent Handlers to epolicy Orchestrator for a network site if the database server has eight processors or less. Distributing up to four Agent Handlers if the database server has sixteen processors. If the ASCI value is more than one hour, multiply the number of client systems by your ASCI value. 0

11 Bandwidth Usage This section identifies and describes the network traffic generated by epolicy Orchestrator and its components in a managed environment. It also covers product tuning information to help you balance bandwidth resources with the needs of the product. Use this information when customizing your deployment strategies and policy settings, to maximize network efficiency and ensure that you do not exceed the bandwidth limitations of your environment. Contents Bandwidth requirements for initial deployment Bandwidth requirements to deploy managed products Bandwidth recommendations for repository distribution Bandwidth requirements for initial deployment When implementing epolicy Orchestrator in your environment, you must distribute agents, components, and security products to manage and protect the systems on the network. Agent deployment and bandwidth During the initial setup of the managed environment, deploying the agent generates enough network traffic that we recommend planning the deployment. Although the installation package for the agent is smaller than those of other products (such as VirusScan Enterprise), the agent must be deployed to each client system you want to manage. This table shows the total bandwidth used on an epo server, client system, and database server for agent 4.0 deployment. Table 4: Agent 4.0 deployment Agent deployment Total (MB) Tx (MB) Rx (MB) epo server Client system Database server Actual deployment The first and most expensive use of bandwidth occurs when the agent installation package is deployed to client systems. You can deploy the agent installation package from the epolicy Orchestrator console to sites, groups, or systems in the System Tree. Regardless of the method you use, deploying the agent installation package over the network generates traffic to each system.

12 Bandwidth Usage Bandwidth requirements to deploy managed products Base the agent deployment on the number of client systems you plan to manage, their location in the network topology, and the amount of bandwidth you have available between the epo server and these systems. McAfee recommends deploying agents: In stages Do not push network utilization over 80% at any time for a given segment of resources. To individual sites or groups This is especially important if you have more bandwidth-limiting factors such as slower connections between geographic locations. Location of network impact Agent-deployment traffic occurs directly between the epo server and the systems to which the agent is deployed. Bandwidth requirements to deploy managed products Deploying security products such as VirusScan Enterprise to client systems can be the most bandwidth-intensive part of setting up a managed environment. Like the agent, security software must be installed on each system you plan to manage. This table shows the total bandwidth (in megabytes) used to deploy specific managed products, as well as the data transmitted and received by the epo server, a client system, and the database server. Table 5: Product deployment Product Deployment epo server Client system Database server Total (MB) Tx (MB) Rx (MB) Total (MB) Tx (MB) Rx (MB) Total (MB) Tx (MB) Rx (MB) epo Agent VirusScan Enterprise 8.7i AntiSpyware Enterprise Module Host Intrusion Prevention Rogue System Sensor Methods to minimize impact when deploying products To minimize traffic generated by deploying products, consider these suggestions: Deploy the product to segments of the System Tree, rather than all systems at once. For example, schedule the deployment task to run for one group at a time. Use randomization intervals to distribute the deployment to a group over a period of time. Schedule the deployment task to run at local time, which is the default setting. This is helpful if your enterprise has offices in different time zones. Create and configure distributed repositories to localize network traffic during product deployment. Before running the deployment task, replicate the deployment package from the master repository to the distributed repositories. The deployment task generates traffic

13 Bandwidth Usage Bandwidth recommendations for repository distribution between the agent and the nearest repository only. However, after an installation, the agent sends properties to the server. Updating from the closest distributed repository localizes the traffic for product deployment. Bandwidth recommendations for repository distribution If the epo server is managing systems across the Wide Area Network (WAN), McAfee recommends that you create distributed repositories on each Local Area Network (LAN) for client updates. McAfee recommends that you create at least one distributed repository per LAN. Number of distributed repositories Systems in LAN Network Bandwidth (LAN),000,000 3,000 4,000 5,000 0,000 0,000 30, Mbps Gbps 3 Recommendations for the server If WAN bandwidth is 6 Mbps, approximately two distributed repositories are updated per minute. McAfee recommends following these steps to avoid network bandwidth saturation. Create an incremental replication task for each distributed repository in each LAN. According to bandwidth (WAN) in Mbps, set each task to run sequentially at the minimum of the minutes of the corresponding randomization interval, to avoid overlap. Bandwidth (WAN) 6 Mbps 5 Mbps 4 Mbps 3 Mbps Mbps Mbps Randomization interval (minutes) Recommendations for each client Add the local distributed repository to the repository list in the agent policy. Select the respository by Ping Time. 3

14 Bandwidth Usage Bandwidth recommendations for repository distribution 3 Create an agent update task with a randomization interval according to this table. Table 6: Recommended interval (minutes) for Gbps network bandwidth Systems in LAN Distributed repositories in LAN 3, , , , , , , , Table 7: Recommended interval (minutes) for 00 Mbps network bandwidth Systems in LAN Distributed repositories in LAN 3 4 5, , , , ,

15 Concurrent Users In epolicy Orchestrator, the epo server is able to handle multiple user (http) requests. McAfee has calculated the results of the average page load time versus the number of concurrent user requests with data of 00,000 managed nodes plus 3,000,000 events and 00,000 RSD Detected System Properties. This data has been calculated for each of the following default dashboards: epo Summary for 4.5 Audit Product Deployment Executive Dashboard RSD Summary Contents Concurrent users and the effect on dashboard page loading Concurrent users and the effect on dashboard page loading Page load time is the time it takes the epo server to respond to a user request to fully load the dashboard in the web browser. Test scenario A number of users concurrently launched a specific dashboard. When the dashboard was fully loaded, each user refreshed the dashboard immediately and repeated this 0 times. Test specifications epo server specifications Four-processor.0 GHz Xeon Core system 4 GB RAM 8 GB RAM Windows 003 Enterprise R SP 3-bit Systems in System Tree 00,000 SQL server specifications Eight-processor 3.0 GHz Xeon Core system Windows 003 Enterprise R SP 64-bit MS SQL 005 Enterpise SP 64-bit Events in database: 3,000,000,000,000 VirusScan Enterprise 8.7i events RSD Detected Systems,000,000 AntiSpyware Enterprise 8.7i events 00,000 5

16 Concurrent Users Concurrent users and the effect on dashboard page loading,000,000 Host Intrusion Prevention 7.0 events 0,000,000 SiteAdvisor Enterprise.0 events The following chart shows the average page load time for each default dashboard, versus the number of concurrent users. Results Each dashboard is fully loaded within eight seconds, under the condition of 00 concurrent loads of the same dashboard. 6

17 Database Sizing When planning for hardware purchase, an important factor to consider is the amount of storage space you will need. Beyond the initial installation of epolicy Orchestrator to a server, the portion of your environment that experiences the most growth is the database. Consider the data in these tables to plan appropriately for your database storage needs. Table 8: epolicy Orchestrator 4.5 installation size Requirement Size (MB) Database Database transaction log Total Table 9: Database size requirements Requirement For a client system For an event Size (KB) Calculating database size requirements To calculate the size of the database, use this formula: Installed database size + (number of x client system size) + (number of events generated x event size). For example, in an environment with,000 and 0,000 events, the calculation is 7.07 MB + (,000 x 66.4KB) + (0,000 x.35kb) = 33.07MB. The following table lists the size of the database, based on the number of events generated and the number of client systems being managed. Use this data to plan appropriately for your storage needs. Table 0: Database size by number of events and client systems Events,000 5,000 Database size (MB) 0,000 5,000 0,000 5, ,37.07, , ,7.07 6, , ,384.3, , ,84.3 6, , ,397.39, , , , , ,40.55, , , , , ,43.7,73.7 4,03.7 5,33.7 6, , ,436.87, , , , , ,450.03, , , , , ,463.9, , , , , ,476.36, , , , , ,489.5, , , ,

18 Database Sizing Events,000 5,000 0,000 5,000 0,000 5,000 Database size (MB) 00, ,50.68, ,0.68 5, , , ,55.84, ,5.84 5, , , ,59.00, ,9.00 5, , , ,54.6,84.6 4,4.6 5,44.6 6, , ,555.3, ,55.3 5, , , ,568.48, , , , , ,58.64, ,8.64 5, , , ,594.80, , , , , ,607.96, , , , , ,6.,9. 4,. 5,5. 6,8. 00, ,634.8, ,34.8 5, ,

Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved

Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ========================================================== Release date:

More information

Release Notes - McAfee Deep Defender 1.0

Release Notes - McAfee Deep Defender 1.0 Release Notes - McAfee Deep Defender 1.0 About this document About this release Features Known issues Documentation Before installing McAfee Deep Defender 1.0 Installing McAfee Deep Defender 1.0 About

More information

Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved

Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix 904321 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ==========================================================

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

McAfee Solidcore Platform Support Matrix Version (Nov 16, 2011)

McAfee Solidcore Platform Support Matrix Version (Nov 16, 2011) McAfee Solidcore Platform Support Matrix Version 5.1.2 (Nov 16, 2011) COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

========================================================== Release date: December 03, This release was developed and tested with:

========================================================== Release date: December 03, This release was developed and tested with: Release Notes for McAfee(R) Security (TM) for Lotus Domino, version 7.5 on Microsoft Windows. Rollup1 Copyright (C) 2012 McAfee, Inc. All Rights Reserved ==========================================================

More information

Release Notes for McAfee(R) VirusScan Enterprise for Linux Version Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved

Release Notes for McAfee(R) VirusScan Enterprise for Linux Version Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved Release Notes for McAfee(R) VirusScan Enterprise for Linux Version 1.9.0 Hotfix 872066 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ============================================================ Release

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee. Deployment and User Guide. epo 4 / Endpoint Encryption

McAfee. Deployment and User Guide. epo 4 / Endpoint Encryption McAfee Deployment and User Guide epo 4 / Endpoint Encryption 1 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Change Control Using Change Reconciliation and Ticket-based Enforcement

McAfee Change Control Using Change Reconciliation and Ticket-based Enforcement 6.0.0 Using Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform

Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform version 7.0.1.02 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager BoxNet Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide. McAfee epolicy Orchestrator software D R A F T

Installation Guide. McAfee epolicy Orchestrator software D R A F T Installation Guide McAfee epolicy Orchestrator 4.6.0 software COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee epolicy Orchestrator 4.5 Reporting Guide

McAfee epolicy Orchestrator 4.5 Reporting Guide McAfee epolicy Orchestrator 4.5 Reporting Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Provisioning SDK Guide McAfee Cloud Identity Manager version 3.5 COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Product Guide. McAfee Performance Optimizer 2.2.0

Product Guide. McAfee Performance Optimizer 2.2.0 Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Jive Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Performance Optimizer 2.1.0

McAfee Performance Optimizer 2.1.0 Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Policy Auditor Installation Guide

McAfee Policy Auditor Installation Guide McAfee Policy Auditor 6.4.0 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Agent 4.5 Product Guide

McAfee Agent 4.5 Product Guide McAfee Agent 4.5 Product Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee epo Deep Command 1.0.0

McAfee epo Deep Command 1.0.0 Product Guide McAfee epo Deep Command 1.0.0 For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Red and Greyscale

McAfee Red and Greyscale epolicy Orchestrator version 4.0 Quick Reference Card Product Updates DAT File Updates Database server McAfee Download Site 1 2 4 Threat Notification epolicy Orchestrator Server and Master Repository 6

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0 Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision K McAfee Network Security Platform (NS-series Interface Modules Reference Guide) COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Network Security Platform

McAfee Network Security Platform Reference Guide Revision I McAfee Network Security Platform NS-series Interface Modules COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Data Loss Prevention Endpoint 10.0

McAfee Data Loss Prevention Endpoint 10.0 Release Notes Revision A McAfee Data Loss Prevention Endpoint 10.0 Hotfix 10.0.330 For use with McAfee epolicy Orchestrator Contents About this release What's new Installation instructions Known issues

More information

McAfee Agent 5.6.x Product Guide

McAfee Agent 5.6.x Product Guide McAfee Agent 5.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Scalability Guidelines

Scalability Guidelines Version 2.0, Service Pack 5.2, March 29, 2005 Overview Introduction This document provides hardware and software recommendations for deploying SiteProtector 2.0, Service Pack 5.2, as follows: small deployment

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

Virtualizing Agilent OpenLAB CDS EZChrom Edition with VMware

Virtualizing Agilent OpenLAB CDS EZChrom Edition with VMware Virtualizing Agilent OpenLAB CDS EZChrom Edition with VMware Technical Overview Abstract This technical overview describes the considerations, recommended configurations, and host server requirements when

More information