How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

Size: px
Start display at page:

Download "How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018"

Transcription

1 How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018

2 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable Configuration 5 Tenable.io Configuration 6 SecurityCenter Configuration 10 McAfee epo Configuration 12 Download the Connector Extension 13 Install Extensions 14 Permissions 19 DXL Permissions 22 Configure Server 24 Test Connection 28 Schedule Import 29 Schedule Export 36 Run Server Tasks 42 View Dashboards 45 View System Tree 47 View in Tenable.io 49 View in SecurityCenter 51 About Tenable 52

3 Introduction This document describes how to deploy the integration component for Tenable Vulnerability Management and McAfee epo console. With this connector, rich vulnerability data is delivered automatically to your McAfee epo console. In addition to importing vulnerability data, this connector, also, provides: Asset synchronization - Tenable targeted lists are automatically created and updated from your existing epo data. McAfee Data Exchange Layer (DXL) - Support allowing the retrieval of vulnerability data from any device running McAfee DXL protocol in your environment. Tenable has partnered with McAfee to give McAfee epo customers the ability to import Tenable vulnerability data into epo for a consolidated view of their assets and vulnerability state. Tenable created a custom, McAfee-certified application that allows McAfee epo to integrate with Tenable SecurityCenter and Tenable.io. The custom application, which resides on the McAfee epo system, calls to the Tenable.io and SecurityCenter APIs to retrieve vulnerability data. McAfee epo customers have the ability to configure how often the connection is made and the amount of vulnerability data that is imported to meet their specific needs. The application also allows epo customers to export their epo managed systems to Tenable.io or SecurityCenter to be scanned. By simplifying and automating the access to Tenable vulnerability data, epo customers can gain a more complete view of the assets, and the risk to those assets, within their organization. Please any comments and suggestions to support@tenable.com.

4 Integration Requirements The following is required to integrate SecurityCenter or Tenable.io with McAfee epo: McAfee epo version 5.9 or higher McAfee Rogue System Detection (RSD) extension or higher (refer to the McAfee Rogue System Detection Product Guide located at for download and installation instructions) McAfee DXL 3.0 or higher SecurityCenter version or higher, Tenable.io, or both SecurityCenter Security Manager account dedicated for use with McAfee epo Tenable Connection Extension for epo (available for download at filename TenableConnector zip)

5 Tenable Configuration McAfee epolicy Orchestrator configuration is available for both Tenable.io and SecurityCenter. Click the corresponding link to view the configuration steps. Tenable.io Configuration SecurityCenter Configuration

6 Tenable.io Configuration 1. Log in to Tenable.io. 2. Click the user icon in the upper right corner. 3. Click My Account.

7 4. Click the API Keys tab.

8 5. Click the Generate button.

9 Note: These API keys will only be shown once. Copy them and use them for the configuration of epo.

10 SecurityCenter Configuration 1. Log in to SecurityCenter using a previously created administrator account, navigate to Users, and select Users (highlighted below) from the drop-down menu. 2. Click +Add (highlighted below) to create a new user. 3. Enter an account username and password (confirm password). 4. Next, click the Role drop-down under the Membership section and select Security Manager.

11 5. Click the Organization drop-down and select the organization for the account. Click Submit. Note: The SecurityCenter Security Manager account and password will be required during the McAfee epo configuration. McAfee epo will authenticate to SecurityCenter via this account in order to pull the vulnerability assessment data into epo.

12 McAfee epo Configuration View the following pages to complete the configuration. Download Connector Extension Install Extensions Permissions DXL Permissions Configure Server Test Connection Schedule Import Schedule Export Run Server Tasks View Dashboards View System Tree View in SecurityCenter View in Tenable.io

13 Download the Connector Extension Prior to beginning the McAfee epo configuration: 1. Log in to the Tenable Support Portal. 2. Navigate to Downloads > SecurityCenter. 3. Download the Tenable Connector Extension for McAfee epo (TenableConnector zip). 4. Save the file in a location accessible from your McAfee epo console. Note: Before the starting the configuration: 1. Uninstall the existing connector 2. Install the new 1.1 connector Note: When upgrading, change the name of the server. You cannot use the same name that you previously used. It can be adjusted by adding another character or number or completely change the name. Example - if the server was named securitycenterserver, name it securitycenterserver2.

14 Install Extensions 1. Once the Tenable Connector Extension for epo has been downloaded, log in to your McAfee epo console and click the Menu drop-down (highlighted below) in the top left-hand corner. 2. Select Extensions (highlighted below) under the Software section. 3. Click Install Extension (highlighted below).

15 4. Select Choose File (highlighted below) from the Install Extension pop-up window. 5. Navigate to the previously downloaded TenableConnector zip file and click Open (highlighted below).

16 6. Click OK to install the extension. 7. Verify the extension is listed as TenableConnector (as shown below) and click OK.

17 8. Select Tenable Connector (highlighted below) in the left-hand pane to ensure the extension has been installed. In the right-hand pane, verify that the extension is Running (highlighted below). If the extension is not listed as an installed extension or is not running, please contact Tenable Support.

18 Note: The Tenable Connector extension is listed under the Unsigned section in this example. Once signed by McAfee, the extension will be listed under the Signed section.

19 Permissions Once the extension has been installed, permissions will need to be added to the epo user role. To add the permissions: 1. Navigate to Menu > Permissions Sets (highlighted below). 2. Select an existing Permission Set from the list in the left-hand menu, or select New Permission Set (highlighted below) to create a new set of permissions.

20 3. Once a new permission set is created or selected, scroll down and click Edit next to the Tenable role (highlighted below). Note: The Tenable role will not appear in the list until the Tenable Connector Extension for epo has been installed.

21 4. Select the Run Permission for Tenable Command and Queries radio button and click Save (highlighted below) to finalize the setting.

22 DXL Permissions 1. Navigate to Menu > Server Settings (highlighted below) under Configuration. 2. Select DXL Topic Authorization in the left-hand menu.

23 3. Configure Permissions as desired for environment.

24 Configure Server After the Tenable permission is set: 1. Navigate to Menu > Registered Servers (highlighted below) under the Configuration section. 2. Select New Server.

25 3. Click the Server Type drop-down and select Tenable Import or Tenable Export. Enter a descriptive name for the server and click Next. Note: The Tenable Import option imports vulnerability data to epo. The Tenable Export option exports assets as a target group.

26 4. Enter the SecurityCenter or Tenable.IO settings. See Table 1 Registered Server Configuration for a description of each field. Enter the username and password for SecurityCenter or enter access and secret keys for Tenable.IO. Table 1 - Registered Server Configuration Tenable SecurityCenter Settings Import Server Type IP Address Port Number Access Key Secret Key User Name Description Client type is either Tenable.io or SecurityCenter IP address of the Tenable SecurityCenter instance Port number used to connect to Tenable SecurityCenter (443 default) Access Key is the username for Tenable.io Secret Key is the password for Tenable.io Username of the Security Manager account created in Tenable SecurityCenter

27 Password Import Results Debug Mode Password of the Security Manager account created in Tenable SecurityCenter Selects the amount of data (in days) to import from Tenable SecurityCenter Enables debug mode. Leave unchecked unless specified by Tenable Support

28 Test Connection Test Connection Click Test Connection to verify that McAfee epo can successfully connect to Tenable.IO or SecurityCenter using the information provided above. If the connection is successful, it will display Tenable connection successful (highlighted below). If you receive the success message, click Save. If the connection fails, please verify the information entered above is correct. If the problem persists, contact Tenable Support. Note: Only one Tenable SecurityCenter type is allowed at any given time. To make changes, either edit the configured server or delete it and recreate it.

29 Schedule Import Once the registered server has been configured: 1. Navigate to Menu > Server Tasks (highlighted below) under the Automation section. 2. In the Quick Find search box, type Tenable and click Apply.

30 3. Click Edit (highlighted below) on the action for Tenable Import.

31 4. Set the Schedule status to Enabled (default is disabled) and click Next.

32 5. Click the Select the Server Name drop-down and select the previously configured registered server. Click Next.

33 6. Schedule the frequency the Server Task should run and click Next. See Table 2 Server Task Builder for a description of each option.

34 Table 2 Server Task Builder Server Task Builder Settings Schedule Type Start Date End Date Schedule Description Click the drop-down to select the frequency that log data will be collected from Tenable SecurityCenter. Options include: Hourly, Daily, Weekly, Monthly, Yearly, and Advanced. If Advanced is selected, you will be presented with the option to enter Cron Syntax instead of the scheduled start time. The date that log collection will begin The date the log collection will end. To allow log collection to recur indefinitely, check the No end date radio button instead of setting an end date. Click the drop-down to set the log collection to begin at a specific time by selecting at, or select between to have the log collection only run between a certain time period.

35 7. Once the schedule is configured, you will be presented with a Summary of the server task. Verify all the settings are correct and click Save.

36 Schedule Export 1. In the Quick Find search box, type Tenable and click Apply. 2. Click Edit (highlighted below) on the action for Tenable Export.

37 3. Set the Schedule status to Enabled (default is disabled) and click Next.

38 4. Click the Select the Server Name drop-down and select the previously configured registered server. Click Next.

39 5. Schedule the frequency the Server Task should run and click Next. See Table 2 Server Task Builder for a description of each option.

40 6. Once the schedule is configured, you will be presented with a Summary of the server task. Verify all the settings are correct and click Save.

41

42 Run Server Tasks 1. Click the Menu drop-down in the top left-hand corner and select Server Tasks (highlighted below) under the Automation section. 2. To run the extension, select the Tenable Import Task from the list of Server Tasks and click Run.

43 3. To view the task status, click on the Tenable Import Task. It will display the status of the task on the Server Task Log Information screen as shown below. Click Close to return to the Server Task Log screen.

44 4. The configuration is now complete and the task will run on the previously configured automated schedule.

45 View Dashboards Once a server task has completed and vulnerability data has been collected from Tenable SecurityCenter, the results can be viewed within McAfee epo dashboards. To view the dashboards: 1. Click on the Menu drop-down in the top left-hand corner and select Dashboards (highlighted below) in the Reporting section. 2. Click the drop-down to the left of Dashboard Actions (highlighted below) and select Tenable Dashboard to display the vulnerability data collected from SecurityCenter. Clicking the dropdown arrow (highlighted below) in the top left-hand corner of each widget gives you the option

46 to Refresh the information within that widget or to display it Full Screen.

47 View System Tree 1. Click on the Menu drop-down in the top left-hand corner and select System Tree (highlighted below) in the Systems section. 2. Select a Managed Host from the System Tree. 3. If there is data on the Managed Host, it will be displayed on the Tenable Vulnerability

48 Details tab (highlighted below) of the selected host.

49 View in Tenable.io 1. Click on the Scans option in the top menu. 2. Click the Target Groups option in the left navigation menu.

50 3. Click the User tab. The epo export will be listed here.

51 View in SecurityCenter 1. Click on the Assets option in the top menu. 2. The exported epo results are displayed in the Asset list.

52 About Tenable Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail, and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments

More information

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator HOW-TO GUIDE Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments

More information

Tenable.io for Thycotic

Tenable.io for Thycotic How-To Guide Tenable.io for Thycotic Introduction This document describes how to deploy Tenable.io for integration with Thycotic Secret Server. Please email any comments and suggestions to support@tenable.com.

More information

Nessus Manager Registration Process

Nessus Manager Registration Process Nessus Manager Registration Process These instructions are provided to help managers of Nessus Manager to get started in using the software. You will need to retrieve the Activation Code from your Tenable

More information

How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018

How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018 How-to Guide: Tenable.io for Lieberman RED Last Revised: August 14, 2018 Table of Contents Introduction 3 Integrations 4 Windows Integration 5 SSH Integration 11 Database Integration 17 Additional Information

More information

PVS Subscription Registration Process

PVS Subscription Registration Process PVS Subscription Registration Process Create Your Tenable Support Portal Account 1. Click on the provided link to create your account. If the link does not work, please cut and paste the entire URL into

More information

How to Add, Deactivate, or Edit a Contact

How to Add, Deactivate, or Edit a Contact How to Add, Deactivate, or Edit a Contact Add Contact (Add account option only available to the Primary Contact for the account) 1. Log in to the Tenable Support Portal with authorized credentials: https://support.tenable.com/

More information

How to Register for Training

How to Register for Training How to Register for Training We have created a Training Console to help you manage your Tenable training from the Tenable Support Portal. You will be able to enroll in On Demand Training Course(s) or Certification

More information

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018 How-to Guide: Tenable Nessus for BeyondTrust Last Revised: November 13, 2018 Table of Contents Welcome to Nessus for BeyondTrust 3 Integrations 4 Windows Integration 5 SSH Integration 10 API Configuration

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Tenable for Palo Alto Networks

Tenable for Palo Alto Networks How-To Guide Tenable for Palo Alto Networks Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with Palo Alto Networks next-generation firewalls (NGFW).

More information

How to Transition from Nessus to SecurityCenter Reports

How to Transition from Nessus to SecurityCenter Reports HOW-TO GUIDE How to Transition from Nessus to SecurityCenter Reports Using SecurityCenter for continuous network monitoring and vulnerability assessment will give you a greatly expanded set of features

More information

Tenable for Google Cloud Platform

Tenable for Google Cloud Platform How-To Guide Tenable for Google Cloud Platform Introduction This document describes how to deploy Tenable SecurityCenter Continuous View (Security Center CV ) for integration with Google Cloud Platform.

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure. Last Updated: May 16, 2018

How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure. Last Updated: May 16, 2018 How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure Last Updated: May 16, 2018 Table of Contents How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure 1 Introduction

More information

McAfee Security-as-a-Service

McAfee Security-as-a-Service Troubleshooting Solutions Guide McAfee Security-as-a-Service For use with epolicy Orchestrator 4.6.0 Software This guide provides supplemental information related to installing and using the McAfee Security-as-a-Service

More information

Tenable for ServiceNow. Last Updated: March 19, 2018

Tenable for ServiceNow. Last Updated: March 19, 2018 Tenable for ServiceNow Last Updated: March 19, 2018 Table of Contents Tenable for ServiceNow 1 Introduction 3 Integration Requirements 4 Integration Configuration 5 Set up a Query in SecurityCenter 5 Configure

More information

Services. This document. describes how comments and. it is in. Tenable.io and. Tenable.io

Services. This document. describes how comments and. it is in. Tenable.io and. Tenable.io Tenable.io for Amazon Web Services Introduction This document describes how to deploy Tenable.io for integration with Amazon Web Services (AWS). Please email any comments and suggestions to support@tenable.com.

More information

McAfee Security Connected Integrating epo and MFECC

McAfee Security Connected Integrating epo and MFECC McAfee Security Connected Integrating epo and MFECC Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Value Add 12 FOR INTERNAL AND CHANNEL USE ONLY Rev 1

More information

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just

More information

McAfee Security Connected Integrating epo and MVM

McAfee Security Connected Integrating epo and MVM McAfee Security Connected Integrating epo and MVM Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Optional Configuration Steps for McAfee Risk Advisor 2.7.2

More information

Tenable Nessus Customer Loyalty Program to Purchase PVS Subscription

Tenable Nessus Customer Loyalty Program to Purchase PVS Subscription Tenable Nessus Customer Loyalty Program to Purchase PVS Subscription Tenable is providing an opportunity for current Nessus customers to purchase a subscription to Tenable s Passive Vulnerability Scanner

More information

McAfee Advanced Threat Defense Release Notes

McAfee Advanced Threat Defense Release Notes Revision B McAfee Advanced Threat Defense 4.2.0 Release Notes Contents About this release New features and enhancements Resolved issues Installation information Known issues Find product documentation

More information

McAfee Vulnerability Manager 7.0.1

McAfee Vulnerability Manager 7.0.1 McAfee Vulnerability Manager 7.0.1 The McAfee Vulnerability Manager quarterly release brings important functionality to the product without having to wait for the next major release. This technical note

More information

Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program

Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program RSA ARCHER GRC Platform Implementation Guide Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program Wesley Loeffler, RSA Engineering Last Modified:

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018 Tenable.io Evaluation Workflow Last Revised: August 22, 2018 Table of Contents Welcome 3 Part One 4 Create User(s) and Group(s) 5 Create Target Group(s) 6 Create Exclusion Lists 7 Create an External Scan

More information

McAfee Security Connected Integrating EPO and MAM

McAfee Security Connected Integrating EPO and MAM McAfee Security Connected Integrating EPO and MAM Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Value Add 7 FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Deploying the hybrid solution

Deploying the hybrid solution Deployment Guide McAfee Web Protection Hybrid Deploying the hybrid solution A McAfee Web Protection license provides all components needed to set up McAfee Web Gateway and McAfee Web Gateway Cloud Service

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

McAfee Red and Greyscale

McAfee Red and Greyscale epolicy Orchestrator version 4.0 Quick Reference Card Product Updates DAT File Updates Database server McAfee Download Site 1 2 4 Threat Notification epolicy Orchestrator Server and Master Repository 6

More information

Moving from McAfee SecurityCenter to McAfee epo Cloud

Moving from McAfee SecurityCenter to McAfee epo Cloud Introduction Dashboard and drilldown Dashboards shares many similarities with SecurityCenter. There are also differences in the way that and SecurityCenter present your security options. This overview

More information

How-to Guide: Tenable Applications for Splunk. Last Revised: August 21, 2018

How-to Guide: Tenable Applications for Splunk. Last Revised: August 21, 2018 How-to Guide: Tenable Applications for Splunk Last Revised: August 21, 2018 Table of Contents Overview 3 Components 4 Tenable Add-on (TA-tenable) 5 Source and Source Types 6 CIM Mapping 7 Tenable App for

More information

How to Set up Transformation Station

How to Set up Transformation Station How to Set up Transformation Station Transformation Station allows for the transfer of policy information directly into a company s website. The user name and password for the Company s website are stored

More information

How-to Guide: JIRA Plug-in for Tenable.io. Last Revised: January 29, 2019

How-to Guide: JIRA Plug-in for Tenable.io. Last Revised: January 29, 2019 How-to Guide: JIRA Plug-in for Tenable.io Last Revised: January 29, 2019 Table of Contents Welcome to JIRA Plug-in for Tenable.io 3 Prerequisites 4 Custom Fields Created in JIRA 5 Install 10 Configure

More information

Tenable.sc-Tenable.io Upgrade Assistant Guide, Version 2.0. Last Revised: January 16, 2019

Tenable.sc-Tenable.io Upgrade Assistant Guide, Version 2.0. Last Revised: January 16, 2019 Tenable.sc-Tenable.io Upgrade Assistant Guide, Version 2.0 Last Revised: January 16, 2019 Table of Contents Welcome to the Tenable.sc-Tenable.io Upgrade Assistant 3 Get Started 4 Environment Requirements

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Integrate Saint Security Suite. EventTracker v8.x and above

Integrate Saint Security Suite. EventTracker v8.x and above EventTracker v8.x and above Publication Date: June 6, 2018 Abstract This guide provides instructions to configure Saint Security Suite to send crucial events to EventTracker Enterprise by means of syslog.

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Tripwire App for QRadar Documentation

Tripwire App for QRadar Documentation Tripwire App for QRadar Documentation Release 1.0.0 Tripwire, Inc. April 21, 2017 CONTENTS 1 Introduction 1 2 Tripwire Enterprise 2 2.1 Features............................................. 2 2.2 Prerequisites..........................................

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Nessus v6 SCAP Assessments. November 18, 2014 (Revision 1)

Nessus v6 SCAP Assessments. November 18, 2014 (Revision 1) Nessus v6 SCAP Assessments November 18, 2014 (Revision 1) Table of Contents Overview... 3 Standards and Conventions... 3 Abbreviations... 3 Simple Assessment Procedure... 3 XCCDF Certified vs. Lower-Tier

More information

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration

More information

Digital Defense Frontline VM 6.0

Digital Defense Frontline VM 6.0 RSA ARCHER GRC Platform Implementation Guide Digital Defense Jeffrey Carlson, RSA Partner Engineering Last Modified: October 16 th, 2017 Solution Summary Digital Defense

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

July 18, (Revision 3)

July 18, (Revision 3) 3D Tool 2.0 User Guide July 18, 2011 (Revision 3) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security,

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

McAfee Firewall Enterprise

McAfee Firewall Enterprise Release Notes Revision A McAfee Firewall Enterprise 7.0.1.03 Scan Engine Update MCV04 Contents About this release Installation instructions Known issues Find product documentation About this release This

More information

TaxAct Professional Reports User Guide

TaxAct Professional Reports User Guide TaxAct Professional Reports User Guide For tax year 2017 V 1.0 Thank you for choosing TaxAct Professional Editions. Accessible from your TaxAct Account (Practice Manager) or from within your Professional

More information

TaxAct Professional Reports User Guide

TaxAct Professional Reports User Guide TaxAct Professional Reports User Guide For tax year 2018 V 1.0 Thank you for choosing TaxAct Professional Editions. Accessible from your TaxAct Account (Practice Manager) or from within your Professional

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2)

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2) SecurityCenter 5.0 SCAP Assessments May 28, 2015 (Revision 2) Table of Contents Overview... 3 Standards and Conventions... 3 Abbreviations... 3 Simple Assessment Procedure... 4 XCCDF Certified vs. Lower-Tier

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

McAfee Drive Encryption Administration Course

McAfee Drive Encryption Administration Course McAfee Drive Encryption Administration Course Education Services administration course The McAfee Drive Encryption Administration course from McAfee Education Services provides attendees with hands-on

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Modern Vulnerability Management The IT landscape today is changing and because of that, vulnerability management needs to change too. IT environments today are filled with both

More information

SmartPay Express User Guide

SmartPay Express User Guide SmartPay Express User Guide Table of Contents INTRODUCTION... 4 SmartPay Express Overview... 4 System Requirements... 5 Trusted Sites... 5 Available Resources... 7 Additional Resources... 7 LOGGING IN...

More information

Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide

Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide Due to technical issues with AWS, Nessus Enterprise for AWS is currently not available for purchase. To protect your AWS cloud infrastructure, please purchase Nessus Cloud http://www.tenable.com/products/

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

SailPoint IdentityIQ 6.4

SailPoint IdentityIQ 6.4 RSA Ready Implementation Guide for Administrative Interoperability Partner Information Last Modified: May 13, 2015 Product Information Partner Name SailPoint Web Site www.sailpoint.com Product Name IdentityIQ

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

McAfee Firewall Enterprise and 8.3.x

McAfee Firewall Enterprise and 8.3.x Release Notes Revision A McAfee Firewall Enterprise 8.2.1 and 8.3.x Scan Engine Update MCV02 Contents About this release Installation instructions Known issues Find product documentation About this release

More information

Reporter User Guide RapidFire Tools, Inc. All rights reserved Ver 4T

Reporter User Guide RapidFire Tools, Inc. All rights reserved Ver 4T Reporter User Guide 2017 RapidFire Tools, Inc. All rights reserved 20171102 Ver 4T Contents Overview... 3 Components of the Reporter... 3 Reporter Appliance... 3 Network Detective Application... 3 Diagnostic

More information

Data Breach Risk Scanning and Reporting

Data Breach Risk Scanning and Reporting Data Breach Risk Scanning and Reporting 2017. SolarWinds. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document

More information

Integration with McAfee DXL

Integration with McAfee DXL DEPLOYMENT GUIDE Integration with McAfee DXL Visibility into Network Changes and Faster Threat Containment Using Outbound APIs 2017 Infoblox Inc. All rights reserved. Integration with McAfee DXL November

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision M McAfee Network Security Platform 8.1 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product> RSA ARCHER GRC Platform Implementation Guide 2.4.1 Wesley Loeffler, RSA Engineering Last Modified: April 25 th, 2018 2.4 Solution Summary The & Archer integration connects

More information

Integrate Microsoft ATP. EventTracker v8.x and above

Integrate Microsoft ATP. EventTracker v8.x and above EventTracker v8.x and above Publication Date: August 20, 2018 Abstract This guide provides instructions to configure a Microsoft ATP to send its syslog to EventTracker Enterprise. Scope The configurations

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

USM Anywhere AlienApps Guide

USM Anywhere AlienApps Guide USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,

More information

McAfee Enterprise Security Manager 9.5.2

McAfee Enterprise Security Manager 9.5.2 Release Notes McAfee Enterprise Security Manager 9.5.2 Contents About this release New features for 9.5.2 Known and resolved issues Upgrade instructions Find product documentation About this release This

More information

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1)

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1) SecurityCenter 4.8.x Upgrade Guide December 16, 2014 (Revision 1) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...

More information

Risk Intelligence. Quick Start Guide - Data Breach Risk

Risk Intelligence. Quick Start Guide - Data Breach Risk Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment

More information

Comodo Device Manager Software Version 4.0

Comodo Device Manager Software Version 4.0 Comodo Device Manager Software Version 4.0 End User Guide Guide Version 4.0.112316 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Device Manager...

More information

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn

More information

IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab

IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab Description In this session, the attendee will have the opportunity to install SPC Enterprise, configure external data connections,

More information

K2 ServerSave Installation and User Guide

K2 ServerSave Installation and User Guide K2 ServerSave Installation and User Guide Chapter 1: Introduction 1.1 What is K2 ServerSave? Welcome to the K2 ServerSave Server Edition User Guide. This guide briefly describes the K2 ServerSave Application

More information

Brightspace Platform Release Notes

Brightspace Platform Release Notes Brightspace Platform 10.7.5 Release Notes 1 5. Enroll a learner to this course. 6. Impersonate the learner you enrolled and navigate to the Org home page. 7. Under the My Courses widget, click View All

More information

Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003

Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003 Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003 This article refers to Microsoft Exchange Server 2003. As of April 8, 2014, Microsoft no longer issues security updates for

More information

Manage and Generate Reports

Manage and Generate Reports Report Manager, page 1 Generate Reports, page 3 Trust Self-Signed Certificate for Live Data Reports, page 4 Report Viewer, page 4 Save an Existing Stock Report, page 7 Import Reports, page 7 Export Reports,

More information

MIDIAX ONLINE BACKUP INSTALLATION

MIDIAX ONLINE BACKUP INSTALLATION MIDIAX ONLINE BACKUP INSTALLATION http://midiax.com/backup/onlinebackup.htm Online Backup & Recovery Manager is a tool for configuring automatic file and folder backups for storage in the cloud. After

More information

POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo New Deployments Only Windows Deployment

POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo New Deployments Only Windows Deployment POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo 5.0.1 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process

More information

Style Report Enterprise Edition

Style Report Enterprise Edition INTRODUCTION Style Report Enterprise Edition Welcome to Style Report Enterprise Edition! Style Report is a report design and interactive analysis package that allows you to explore, analyze, monitor, report,

More information

Publishing and Subscribing to Cloud Applications with Data Integration Hub

Publishing and Subscribing to Cloud Applications with Data Integration Hub Publishing and Subscribing to Cloud Applications with Data Integration Hub 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product

More information

Zoom App for Canvas. User Guide

Zoom App for Canvas. User Guide Zoom App for Canvas User Guide Only a Canvas user who has a Zoom account with the same email address as their Canvas email address is authorized to use Zoom within Canvas. If Zoom does not have a user

More information

Integrate Cb Defense. EventTracker v8.x and above

Integrate Cb Defense. EventTracker v8.x and above EventTracker v8.x and above Publication Date: June 18, 2018 Abstract This guide helps you in configuring Cb Defense with EventTracker to receive Cb Defense events. In this guide, you will find the detailed

More information

McAfee Content Security Reporter 2.6.x Product Guide

McAfee Content Security Reporter 2.6.x Product Guide McAfee Content Security Reporter 2.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

This quick reference guide is designed for consumers of the Program Dashboard and provides details on how to: Log in

This quick reference guide is designed for consumers of the Program Dashboard and provides details on how to: Log in This quick reference guide is designed for consumers of the Program Dashboard and provides details on how to: Log in Filter data using input controls Access the Dashboard Access Collibra/ Definitions Glossary

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information

Redtail Integration. Establishing the Redtail Connection. 1. From the Applications dropdown, choose Setup.

Redtail Integration. Establishing the Redtail Connection. 1. From the Applications dropdown, choose Setup. In this user guide, we will demonstrate how to integrate your Redtail service into the emoney platform. This will allow the Advisor to import and link clients currently in Redtail into emoney. Establishing

More information

Integrate Akamai Web Application Firewall EventTracker v8.x and above

Integrate Akamai Web Application Firewall EventTracker v8.x and above Integrate Akamai Web Application Firewall EventTracker v8.x and above Publication Date: May 29, 2017 Abstract This guide helps you in configuring Akamai WAF and EventTracker to receive events. In this

More information

User Guide. Global Ethernet Services - Performance Report

User Guide. Global Ethernet Services - Performance Report Global Ethernet Services - Performance Report User Guide Contents: Service Overview... 3 Service Features... 3 Access the Ethernet Performance Report... 4 Characteristics of the Performance Report... 6

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Milestone Systems. Quick guide: Register software license codes on Milestone Customer Dashboard. Milestone Customer Dashboard

Milestone Systems. Quick guide: Register software license codes on Milestone Customer Dashboard. Milestone Customer Dashboard Milestone Systems Quick guide: Register software license codes on Milestone Customer Dashboard Milestone Customer Dashboard Introduction to this guide This quick guide introduces Milestone partners how

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information