Reference Guide. McAfee Application Control 7.0.0

Size: px
Start display at page:

Download "Reference Guide. McAfee Application Control 7.0.0"

Transcription

1 Reference Guide McAfee Application Control 7.0.0

2 COPYRIGHT Copyright 2016 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, , TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Evader, Foundscore, Foundstone, Global Threat Intelligence, McAfee LiveSafe, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee TechMaster, McAfee Total Protection, TrustedSource, VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Application Control Reference Guide

3 Contents 1 Application Control Command Line Interface reference 5 2 Argument details 19 McAfee Application Control Reference Guide 3

4 Contents 4 McAfee Application Control Reference Guide

5 1 Application Control Command Line Interface reference Here are all commands available for Application Control when using the command line interface (CLI). In the OS column, these abbreviations indicate the supported operating systems. L Linux W Windows In the Mode column, these abbreviations indicate the supported mode for the command. E Enabled mode D Disabled mode U Update mode Table 1-1 Command details attr Modifies or lists the Application Control configuration attributes list. sadmin attr add -a sadmin attr add -p sadmin attr add -u sadmin attr add -o parent= filename2 -p filename1 sadmin attr remove -a sadmin attr remove -p sadmin attr remove -u sadmin attr list -a sadmin attr list -p sadmin attr list -u sadmin attr flush -a sadmin attr flush -p L E, D, U McAfee Application Control Reference Guide 5

6 1 Application Control Command Line Interface reference sadmin attr flush -u sadmin attr add -a W (32-bit) E, D, U sadmin attr add -b sadmin attr add -c sadmin attr add -f sadmin attr add -h sadmin attr add -o parent= filename2 -i filename1 sadmin attr add -j sadmin attr add -l sadmin attr add -p sadmin attr add -u sadmin attr add -v (Windows Vista and later) sadmin attr add -o parent= filename2 -p filename1 sadmin attr add -o module= modulename -v filename1 (Windows Vista and later) sadmin attr remove -a sadmin attr remove -b sadmin attr remove -c sadmin attr remove -f sadmin attr remove -h sadmin attr remove -i sadmin attr remove -j sadmin attr remove -l 6 McAfee Application Control Reference Guide

7 Application Control Command Line Interface reference 1 sadmin attr remove -p sadmin attr remove -u sadmin attr remove -v (Windows Vista and later) sadmin attr list -a sadmin attr list -b sadmin attr list -c sadmin attr list -f sadmin attr list -h sadmin attr list -i sadmin attr list -j sadmin attr list -l sadmin attr list -p sadmin attr list -u sadmin attr list -v (Windows Vista and later) sadmin attr flush -a sadmin attr flush -b sadmin attr flush -c sadmin attr flush -f sadmin attr flush -h sadmin attr flush -i sadmin attr flush -j sadmin attr flush -l sadmin attr flush -p sadmin attr flush -u McAfee Application Control Reference Guide 7

8 1 Application Control Command Line Interface reference sadmin attr flush -v (Windows Vista and later) sadmin attr add -a sadmin attr add -h sadmin attr add -o parent= filename2 -i filename1 sadmin attr add -j sadmin attr add -n sadmin attr add -n -y filename1 (Not available on Windows Server 2012) sadmin attr add -p sadmin attr add -u sadmin attr add -v (Windows Vista and later) sadmin attr add -o parent= filename2 -p filename1 sadmin attr add -o module= modulename -v filename1 (Windows Vista and later) sadmin attr remove -a sadmin attr remove -h sadmin attr remove -i sadmin attr remove -j sadmin attr remove -n sadmin attr remove -p sadmin attr remove -u sadmin attr remove -v (Windows Vista and later) W (64-bit) E, D, U 8 McAfee Application Control Reference Guide

9 Application Control Command Line Interface reference 1 sadmin attr list -a sadmin attr list -h sadmin attr list -i sadmin attr list -j sadmin attr list -n sadmin attr list -p sadmin attr list -u sadmin attr list -v (Windows Vista and later) sadmin attr flush -a sadmin attr flush -h sadmin attr flush -i sadmin attr flush -j sadmin attr flush -n sadmin attr flush -p sadmin attr flush -u sadmin attr flush -v (On Windows Vista and later) auth For more information about this command, see Configure memory-protection techniques and Maintain your systems in McAfee Application Control Product Guide for standalone mode. Authorizes an application (executable, installer, or batch file) as a whitelist, or unauthorizes an application by adding to the blacklist. The application might be locally installed, invoked, or installed or invoked from a shared drive. sadmin auth -a -c checksum W E, D, U sadmin auth -a [ -t rule id ] -c checksum sadmin auth -a [ -t rule id ] [ -u ] -c checksum sadmin auth -b -c checksum sadmin auth -b [ -t rule id] -c checksum sadmin auth -r checksum sadmin auth -l McAfee Application Control Reference Guide 9

10 1 Application Control Command Line Interface reference sadmin auth -f begin-upd ate (bu) For more information about this command, see Override Application Control protection in McAfee Application Control Product Guide for standalone mode. Initiates the Update mode to help perform software updates and installations. sadmin begin-update [ workflow-id [ comment ]] sadmin bu [ workflow-id [ comment ]] L, W E, D cert For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Manages certificates for digitally signed files. You can add, remove, or list the certificates in the Application Control certificate store, which is a directory within the install directory <instlall_dir>/ Certificates. sadmin cert add certificate_name sadmin cert add -u certificate_name sadmin cert add -c certificate_content sadmin cert remove SHA1 sadmin cert remove -c certificate_content sadmin cert list sadmin cert list -d sadmin cert list -u sadmin cert list [ -d -u ] sadmin cert flush W E, D, U check For more information about this command, see Override Application Control protection in McAfee Application Control Product Guide for standalone mode. Validates and fixes the attributes of the specified file or files against the file inventory. sadmin check [ -r ] L, W E, D, U sadmin check [ -r ] sadmin check [ -r ] directoryname1... directorynamen sadmin check [ -r ] volumename1... volumenamen config For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Allows you to: Export current configuration settings to a file. sadmin config export filename L, W E, D, U sadmin config import [ -a ] filename sadmin config set name=value 10 McAfee Application Control Reference Guide

11 Application Control Command Line Interface reference 1 Import configuration settings from a file to an existing installation. sadmin config show diag disable enable end-updat e (eu) event For more information about this command, see Configure advanced features in McAfee Application Control Product Guide for standalone mode. Runs diagnostics and offers suggestions on programs and applications to authorize (to perform updates). sadmin diag W E, U sadmin diag fix [ -f ] For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Activates the Disabled mode. Restart the system to make sure that the command is applied. On the Linux platform, if Application Control is in the Enabled mode, system restart is not required to apply this command. However, to uninstall the product, system restart is required. sadmin disable L, W E, U For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Activates the Enabled mode. Restart the system to make sure that the command is applied. Alternatively, restart the Application Control service to apply this command. However, the memory-protection feature will be available only after system restart. sadmin enable L, W D For more information about this command, see How do I deploy Application Control in McAfee Application Control Product Guide for standalone mode. Ends the Update mode and activates the Enabled mode. sadmin end-update sadmin eu L, W U For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Configures the log targets (sinks) for generated events. sadmin event sink L, W E, D, U sadmin event sink eventname sadmin event sink -a { eventname ALL } { sinkname ALL } sadmin event sink -r { eventname ALL } { sinkname ALL } McAfee Application Control Reference Guide 11

12 1 Application Control Command Line Interface reference features For more information about this command, see Configure advanced features in McAfee Application Control Product Guide for standalone mode. Enables, disables, or lists the features on an existing installation. sadmin features [-d] L, W E, D, U sadmin features enable featurename sadmin features disable featurename sadmin features list help help-adva nced license list-soli dified (ls) For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Provides information about basic commands. sadmin help L, W E, D, U sadmin help [ command ] For more information about this command, see Getting started in McAfee Application Control Product Guide for standalone mode. Provides information about advance commands. sadmin help-advanced L, W E, D, U sadmin help-advanced [ command ] For more information about this command, see Getting started in McAfee Application Control Product Guide for standalone mode. Adds or displays licensing information. sadmin license add licensekey L, W D sadmin license list For more information about this command, see How do I deploy Application Control in McAfee Application Control Product Guide for standalone mode. Lists the whitelisted files, directories, and volumes. sadmin list-solidified [ -l ] sadmin ls [ -l ] sadmin list-solidified [ -l ] sadmin ls [ -l ] filename1... filenamen L, W E, D, U sadmin list-solidified [ -l ] directoryname1... directorynamen sadmin ls [ -l ] directoryname1... directorynamen sadmin list-solidified [ -l ] volumename1... volumenamen sadmin ls [ -l ] volumename1... volumenamen For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. 12 McAfee Application Control Reference Guide

13 Application Control Command Line Interface reference 1 list-unso lidified (lu) Lists the files, directories, and volumes that are not whitelisted. sadmin list-unsolidified sadmin lu sadmin list-unsolidified sadmin lu filename1... filenamen sadmin list-unsolidified directoryname1... directorynamen sadmin lu directoryname1... directorynamen sadmin list-unsolidified volumename1... volumenamen sadmin lu volumename1... volumenamen L, W E, D, U lockdown passwd read-prot ect (rp) For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Disables the local command line interface. After lockdown, you can only issue the help, help advanced, status, version, and recover commands. Sets a password for the command line interface. If the password is set, you must verify the password before executing critical commands. Using sadmin passwd -d command removes the password. sadmin lockdown L, W E, D, U sadmin passwd L, W E, D, U sadmin passwd -d For more information about this command, see Configure advanced features in McAfee Application Control Product Guide for standalone mode. Displays or modifies the read-protection rules. You must specify complete file or directory names with this command. For more information about rp command, see Protect the file system components chapter in the McAfee Application Control Product Guide for standalone sadmin read-protect -i sadmin read-protect -e sadmin read-protect -r sadmin read-protect -l sadmin read-protect -f L, W E, D, U For more information about this command, see Protect the file system components in McAfee Application Control Product Guide for standalone mode. McAfee Application Control Reference Guide 13

14 1 Application Control Command Line Interface reference recover Recovers the local command line interface. sadmin recover L, W E, D, U sadmin recover -f skiplist Bypasses a path component from a feature to remove the protection applied by that feature. You can also define skip rules to skip path components from the whitelist. Use caution and take advice from McAfee Support before applying skiplist rules because doing so can affect the core functionality of the product and might make your system vulnerable to security threats. For more information about skiplist rules, see Skip rules for path components chapter in McAfee Application Control Product Guide for standalone mode. sadmin skiplist add -c sadmin skiplist add -d sadmin skiplist add -f sadmin skiplist add -i sadmin skiplist add -r sadmin skiplist add -s sadmin skiplist add -v sadmin skiplist remove -c W E, D, U sadmin skiplist remove -d sadmin skiplist remove -f sadmin skiplist remove -i sadmin skiplist remove -r sadmin skiplist remove -s sadmin skiplist remove -v sadmin skiplist list -c sadmin skiplist list -d sadmin skiplist list -f sadmin skiplist list -i sadmin skiplist list -r sadmin skiplist list -s sadmin skiplist list -v sadmin skiplist flush -c sadmin skiplist flush -d sadmin skiplist flush -f sadmin skiplist flush -i sadmin skiplist flush -r sadmin skiplist flush -s 14 McAfee Application Control Reference Guide

15 Application Control Command Line Interface reference 1 solidify (so) Adds specified files in a directory or system volume to the whitelist. sadmin skiplist flush -v sadmin solidify [ -q -v ] L, W E, D, U sadmin solidify [ -q -v ] sadmin solidify [ -q -v ] directoryname1... directorynamen sadmin solidify [ -q -v ] volumename1... volumenamen status trusted For more information about this command, see How do I deploy Application Control in McAfee Application Control Product Guide for standalone mode. Displays the status of Application Control. You can view the operational mode, operational mode on system restart, connectivity with McAfee epolicy Orchestrator (McAfee epo ), access status, and whitelist status of the local CLI. sadmin status L, W E, D, U sadmin status volumename For more information about this command, see How do I deploy Application Control in McAfee Application Control Product Guide for standalone mode. Identifies a local or remote share as a trusted file path, volume, or directory. You can include, exclude, remove, list, or flush the trusted volumes or directories. sadmin trusted -i pathname1... pathnamen sadmin trusted -e pathname1... pathnamen sadmin trusted -r pathname1... pathnamen L E, D, U sadmin trusted -l sadmin trusted -f sadmin trusted -i volumesetname1... volumesetnamen sadmin trusted -i pathname1... pathnamen sadmin trusted -e volumesetname1... volumesetnamen sadmin trusted -e pathname1... pathnamen sadmin trusted -r volumesetname1... volumesetnamen W E, D, U McAfee Application Control Reference Guide 15

16 1 Application Control Command Line Interface reference sadmin trusted -r pathname1... pathnamen sadmin trusted -l sadmin trusted -f sadmin trusted -u <local or network path> unsolidif y (unso) For more information about this command, see Override Application Control protection in McAfee Application Control Product Guide for standalone mode. Removes specified files from the whitelist. sadmin unsolidify [ -v ] L, W E, D, U sadmin unsolidify [ -v ] updaters sadmin unsolidify [ -v ] directoryname1... directorynamen sadmin unsolidify [ -v ] volumename1... volumenamen For more information about this command, see Maintain your systems in McAfee Application Control Product Guide for standalone mode. Adds, deletes, lists, or flushes programs from the list of authorized updaters. sadmin updaters add [ -d ] { binaryname } sadmin updaters add [ -n ] { binaryname } sadmin updaters add [ -p parent-programname ] { binaryname } sadmin updaters add [ -t rule-id ] { binaryname } sadmin updaters add [ -d ] [ -n ] [ -t rule-id ] [ -p parent-programname ] { binaryname } sadmin updaters remove { binaryname } sadmin updaters remove [ -p parent-programname ] { binaryname } sadmin updaters list sadmin updaters flush L E, D, U sadmin updaters add [ -d ] { binaryname } W E, D, U 16 McAfee Application Control Reference Guide

17 Application Control Command Line Interface reference 1 version write-pro tect (wp) sadmin updaters add [ -l libraryname ] { binaryname } sadmin updaters add [ -n ] { binaryname } sadmin updaters add [ -p parent-binaryname ] { binaryname } sadmin updaters add [ -t rule-id ] { binaryname } sadmin updaters add [ -d ] [ -n ] [ -t rule-id ] [ -l libraryname ] { binaryname } sadmin updaters add [ -d ] [ -n ] [ -t rule-id ] [ -p parent-binaryname ] { binaryname } sadmin updaters add [ -t rule-id ] -u username sadmin updaters remove { binaryname } sadmin updaters remove [ -l libraryname ] { binaryname } sadmin updaters remove [ -p parent-binaryname ] { binaryname } sadmin updaters remove -u username sadmin updaters list sadmin updaters flush For more information about this command, see Override Application Control protection in McAfee Application Control Product Guide for standalone mode. Displays the version of the installed Application Control. sadmin version L, W E, D, U For more information about this command, see How do I deploy Application Control in McAfee Application Control Product Guide for standalone mode. Write-protects specified files including the whitelisted files. You must specify complete file or directory names with this command. sadmin write-protect -i sadmin write-protect -e sadmin write-protect -r sadmin write-protect -l L, W E, D, U McAfee Application Control Reference Guide 17

18 1 Application Control Command Line Interface reference sadmin write-protect -f write-pro tect-reg (wpr) For more information about this command, see Protect the file system components in McAfee Application Control Product Guide for standalone mode. Write-protects specified registry keys including the whitelisted registry keys. sadmin write-protect-reg -i registrykeyname1... registrykeynamen W E, D, U sadmin write-protect-reg -e registrykeyname1... registrykeynamen sadmin write-protect-reg -r registrykeyname1... registrykeynamen sadmin write-protect-reg -l sadmin write-protec t-reg -f For more information about this command, see Protect the file system components in McAfee Application Control Product Guide for standalone mode. 18 McAfee Application Control Reference Guide

19 2 Argument details This table lists the commands with the supported arguments and their description. In the Argument column, the supported arguments for the commands are listed in alphabetical order. You can use -z argument to prevent the system from prompting for the password. This argument can be used in all CLI commands to provide the CLI password (so that the system does not prompt for password). For example, if the CLI password is set and you issue the sadmin wp -i abc.txt command, the system immediately prompts you for the password. Using the -z argument, you can issue the sadmin wp -z <password> -i abc.txt command to provide the password with the issued command. Table 2-1 Argument details Command Argument Description attr -a Always authorizes by file name. This is a deprecated technique. For more information, contact McAfee Support. -b Configures the bypass, restore, list, and flush rules for a component protected using the Mangling technique. This is a deprecated technique. For more information, contact McAfee Support. -c Configures the bypass, restore, list, and flush rules for a component protected using the Critical Address Space Protection technique. -f Bypasses from full crawl attribute. This is a deprecated technique. For more information, contact McAfee Support. -h Adds a binary to MP Compat protection. -i Configures the bypass, restore, list, and flush rules for a binary using the Package Control feature. -j Bypasses a binary from MP Compat protection. -l Configures the bypass, restore, list, and flush rules for a component using the Anti-Debugging technique. This is a deprecated technique. For more information, contact McAfee Support. -n Configures the bypass, restore, list, and flush rules for a component using the mp-nx technique. -y Includes child processes for a component to be bypassed using the mp-nx technique. This argument can only be specified with the -n argument. -o Indicates to specify the DLL module name for a specified process. This argument can be used with -p, -v, and -i arguments. On the Linux platform, use this argument to specify the parent program for the -p attribute. -p Bypasses from process context file operations attribute. McAfee Application Control Reference Guide 19

20 2 Argument details Table 2-1 Argument details (continued) Command Argument Description -u Always unauthorizes by file name. This is a deprecated technique. For more information, contact McAfee Support. -v Bypasses from Forced DLL relocation attribute. auth -a Authorizes a binary using the checksum value. begin-update (bu) -b Bans a binary using the checksum value. -c Specifies the checksum value. -f Flushes all authorized or banned binaries. -l Lists all authorized and banned binaries. -r Removes the authorized or banned binaries. -t Includes the associated tag name for a binary to be banned. -u Authorizes a binary and also provides updater privileges when used with the -a and -c arguments. workflow-id Indicates to specify an ID while switching to the Update mode. This ID can be used for tracking purposes in a change management for ticketing system. comment Indicates to use a descriptive text for the workflow ID. cert -c Specifies the certificate content as trusted. -d Lists all details of the issuer and subject of the certificates added to the system. -u Provides updater privileges to a certificate that is added as a trusted certificate or list the trusted certificates with updater privileges. check -r Fixes any inconsistencies that are encountered. config -a Appends the configuration values. diag -f Applies the diagnosed configuration changes for the restricted programs, such as winlogon.exe and svchost.exe. disable NA NA enable NA NA end-update (eu) NA NA event -a Adds sinks to the specified event. -r Removes sinks from the specified event. features -d Lists all features (including the hidden features). help NA NA help-advanced NA NA license NA NA For more information, contact McAfee Support. list-solidified (ls) -l Lists details of the whitelisted files. list-unsolidified (lu) NA NA lockdown NA NA 20 McAfee Application Control Reference Guide

21 Argument details 2 Table 2-1 Argument details (continued) Command Argument Description passwd -d Removes the password for using Application Control. read-protect (rp) -e Excludes specific components from a read-protected directory, or volume. -f Flushes all components from read protection. -i Includes files, directories, or volumes for read protection. -l Lists the read-protected components. -r Removes read protection applied to files, directories, or volumes. recover -f Forcefully aborts the McAfee epo command and recover the local CLI. skiplist -c Skips path components from the monitoring feature. This command is applicable to Application Control only in Update mode where change are tracked. User mode paths and paths with volume name do not work with this command. Text added with this command is treated as complete component. For example, text can start with a slash (/) and end with a slash (\), dot (.), or null character. No events are generated for files that contain the specified text. Also, the whitelist is not updated for such paths. -d Skips path components from write protection to remove write protection applied to all files in that path. User mode paths and paths with volume name do not work with this command. Text added with this command is treated as complete component. For example, text can start with a forward slash (/) and end with a backward slash (\), dot (.), or null character. -f Skips path components from file operations and the script-auth feature. User mode paths and paths with volume name do not work with this command. Text added with this command is treated as substring in a path. No events are raised and the whitelist is not updated for the skipped path components. Also, script execution control does not work for paths added with this command. -i Skips path components from file operations using the ignore path list. This works similar to the sadmin add -f command. Also, on the Windows 64-bit platform, binaries of pe32 type are also skipped from the deny-exec feature using this skip rule. Restarting the system is necessary to enable this skip rule. User mode paths and paths with volume name do not work with this command. When the path components are specified on Windows 64-bit platforms, even the deny-exec feature is skipped. McAfee Application Control Reference Guide 21

22 2 Argument details Table 2-1 Argument details (continued) Command Argument Description -r Skips registry path components from write protection for registry to remove write protection applied on the registry paths. Text added with this command is treated as complete component. For example, text can start with a forward slash (/) and end with a backward slash (\), dot (.), or null character. -s Removes files present under the specified path component and subdirectories from the whitelist. Network path names cannot be specified with this command. Volume relative rules can also be specified using *\<vol_rel_name>. -v Bypasses volumes from attaching to Application Control. File system, such as NTFS or FAT, can also be specified with this argument. When you specify a volume name with this argument, Application Control is not attached to that volume. Script-auth and deny-exec features are also not effective on the specified volume. Components in that volume are allowed to execute on the system. You can specify a path component using user mode volume names, such as C: and D:. Also, device names, such as \device\harddiskvolume1, and file systems, such as NTFS and FAT, can also be specified. solidify (so) -q Suppresses all output except for errors. status NA NA -v Displays all the processed components. trusted -e Excludes one or more specified paths to the directories or volumes from a list of trusted directories or volumes. -f Removes all directories and volumes from the trusted rule. -i Adds one or more specified paths to the directories or volumes as trusted directories or volumes. -l Lists all trusted directories and volumes. -r Removes the specified directories or volumes from the trusted rule. -u Provides updater privileges to all binaries and scripts in the trusted directories or volumes. unsolidify (unso) -v Displays all the processed components. updaters -d Excludes the child processes of a binary file to be added as an updater from inheriting the updater privileges. -l Includes the library name for an execution file to be added as an updater (for Windows). -n Disables event logging for a file to be added as an updater. -p Adds a file as an updater only when it is started by specified parent process. 22 McAfee Application Control Reference Guide

23 Argument details 2 Table 2-1 Argument details (continued) Command Argument Description version NA NA -t Performs these operations: Includes the tags for a file to be added as an updater. Adds a user with a tag name as an updater. -u Adds a user as an updater (for Windows). write-protect (wp) -e Excludes specific components from a write-protected directory or volume. write-protect-reg (wpr) -f Flushes all components from write protection. -i Write-protects files, directories, or volumes. -l Lists the write-protected components. -r Removes write protection applied to files, directories, or volumes. -e Excludes one or more registry keys from write protection. -f Flushes all registry keys from write protection. Flushing the registry keys from write protection removes all write protection rules applied to the registry keys. -i Write protects registry keys. -l Lists all write-protected registry keys. -r Removes write protection from one or more registry keys. McAfee Application Control Reference Guide 23

24 2 Argument details 24 McAfee Application Control Reference Guide

25 0-00

Reference Guide. McAfee Application Control 8.0.0

Reference Guide. McAfee Application Control 8.0.0 Reference Guide McAfee Application Control 8.0.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other

More information

McAfee Application Control Linux Product Guide. (Unmanaged)

McAfee Application Control Linux Product Guide. (Unmanaged) McAfee Application Control 6.2.0 - Linux Product Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Application Control Windows Product Guide. (Unmanaged)

McAfee Application Control Windows Product Guide. (Unmanaged) McAfee Application Control 8.1.0 - Windows Product Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Application Control Windows Installation Guide. (Unmanaged)

McAfee Application Control Windows Installation Guide. (Unmanaged) McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Application Control and McAfee Change Control Linux Product Guide Linux

McAfee Application Control and McAfee Change Control Linux Product Guide Linux McAfee Application Control and McAfee Change Control 6.3.0 - Linux Product Guide 6.3.0 - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0 Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Application Control 6.2.0

McAfee Application Control 6.2.0 Best Practices Guide McAfee Application Control 6.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Application Control/ McAfee Change Control Administration

McAfee Application Control/ McAfee Change Control Administration McAfee Application Control/ McAfee Change Control Administration Education Services Administration Course The McAfee University McAfee Application Application Control/McAfee Change Control Administration

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision K McAfee Network Security Platform (NS-series Interface Modules Reference Guide) COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

McAfee MVISION Mobile Citrix XenMobile Integration Guide

McAfee MVISION Mobile Citrix XenMobile Integration Guide McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Scripting Guide. McAfee Drive Encryption 7.2.0

Scripting Guide. McAfee Drive Encryption 7.2.0 Scripting Guide McAfee Drive Encryption 7.2.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other

More information

McAfee Network Security Platform

McAfee Network Security Platform Reference Guide Revision I McAfee Network Security Platform NS-series Interface Modules COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Management of Native Encryption 3.0.0

McAfee Management of Native Encryption 3.0.0 Product Guide McAfee Management of Native Encryption 3.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Application Control Windows Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

McAfee Change Control - Installation Guide. McAfee Change Control Command Line Reference Guide

McAfee Change Control - Installation Guide. McAfee Change Control Command Line Reference Guide McAfee Change Control - Installation Guide McAfee Change Control 6.1.0 Command Line Reference Guide ii End User License Agreement BY DOWNLOADING, INSTALLING, COPYING, ACCESSING, OR USING THIS SOFTWARE

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Release Notes. McAfee Active Response Content Update

Release Notes. McAfee Active Response Content Update Release Notes McAfee Active Response Content Update 1.1.0.239 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

Hardware Guide. McAfee MVM3200 Appliance

Hardware Guide. McAfee MVM3200 Appliance Hardware Guide McAfee MVM3200 Appliance COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis,

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Release Notes McAfee Application Control 6.1.0

Release Notes McAfee Application Control 6.1.0 Release Notes McAfee Application Control 6.1.0 About this document New features Known issues Resolved issues Installation instructions Find product documentation About this document Thank you for choosing

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

Product Guide Revision A. McAfee Customer Submission Tool 2.4.0

Product Guide Revision A. McAfee Customer Submission Tool 2.4.0 Product Guide Revision A McAfee Customer Submission Tool 2.4.0 COPYRIGHT Copyright 2016 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee Application Control 8.0.0

McAfee Application Control 8.0.0 Best Practices Guide McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks

More information

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Release Notes - McAfee Deep Defender 1.0

Release Notes - McAfee Deep Defender 1.0 Release Notes - McAfee Deep Defender 1.0 About this document About this release Features Known issues Documentation Before installing McAfee Deep Defender 1.0 Installing McAfee Deep Defender 1.0 About

More information

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Account Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013

Account Management. Administrator Guide. Secure  Gateway (SEG) Service Administrative Guides. Revised August 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature

More information

McAfee Change Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Change Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Change Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Active Response 2.0.0

McAfee Active Response 2.0.0 Product Guide McAfee Active Response 2.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Performance Optimizer 2.1.0

McAfee Performance Optimizer 2.1.0 Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Rogue System Detection 5.0.5

McAfee Rogue System Detection 5.0.5 Product Guide McAfee Rogue System Detection 5.0.5 For use with epolicy Orchestrator 5.1.2, 5.1.3, 5.3.0, 5.3.1, and 5.3.2 Software COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information