McAfee Endpoint Security Installation Guide. (Unmanaged)

Size: px
Start display at page:

Download "McAfee Endpoint Security Installation Guide. (Unmanaged)"

Transcription

1 McAfee Endpoint Security Installation Guide (Unmanaged)

2 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone, McAfee LiveSafe, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, True Key, TrustedSource, VirusScan are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Endpoint Security Installation Guide

3 Contents 1 Installation overview 5 Which type of installation do you need? Installation and upgrade workflow Planning your installation 7 Products that you can upgrade Compatibility with other virus-detection and firewall products Compatibility with other McAfee products System requirements 9 4 Pre-installation tasks 11 Preparing your system Preconfiguring the product Export custom settings to import ESConfigTool command-line options Install and upgrade the software 15 Upgrade McAfee Agent Install the software with the wizard Install the software from the command line Installation (SetupEP) command-line options Post-installation tasks 21 Verify the installation Test malware detection Test Real Protect scanning Remove the software 23 Remove the software from systems locally Troubleshoot installations and upgrades 25 Customer support information Resolving Firewall issues with Adaptive mode Resolving McAfee error codes and messages Resolving Windows error messages Checking installation log files Checking Real Protect log file entries Using the MER tool for troubleshooting McAfee Endpoint Security Installation Guide 3

4 Contents 4 McAfee Endpoint Security Installation Guide

5 1 Installation 1 overview McAfee Endpoint Security includes an installation wizard to assist with installing and upgrading the software on Windows systems. In the wizard, you can select one or more of these modules to install: McAfee Endpoint Security Threat Prevention McAfee Endpoint Security Firewall McAfee Endpoint Security Web Control McAfee Endpoint Security Adaptive Threat Protection (ATP) Requires Threat Prevention. McAfee Endpoint Security Platform (the McAfee Endpoint Security Common module) is automatically installed with any Endpoint Security module. Contents Which type of installation do you need? Installation and upgrade workflow Which type of installation do you need? Whether you are installing the software for the first time or upgrading a previous version, the workflow is similar. Install the software for the first time If the product isn't installed, download the software and run the installation wizard. The wizard provides options for setting up the product. Upgrade a previous version of the software If the product is installed, confirm that it can be upgraded to Endpoint Security Then download the software and run the installation wizard. Specify whether to save custom settings. By default, the settings are saved. See also Products that you can upgrade on page 7 Installation and upgrade workflow Upgrades are similar to installing the software for the first time. 1 (Upgrade only) Confirm that your upgrade path is supported. 2 (Upgrade only, optional) If you plan to save your custom settings, review and revise them as needed. McAfee Endpoint Security Installation Guide 5

6 1 Installation overview Installation and upgrade workflow 3 Upgrade McAfee Agent, if needed. Endpoint Security requires McAfee Agent or later (version is recommended). Endpoint Security automatically upgrades version 4.0 and later of the agent to a supported version during product upgrades. You can also upgrade the agent manually. 4 Copy the product installation file to the system. Depending on how you purchased the product, you might need to download the file from a download site or copy it from a disc. 5 Run the installation wizard to install or upgrade the product. 6 Verify that the client software is installed and up to date. 7 (Upgrade only) If you saved your custom settings, verify that they were saved. See also Products that you can upgrade on page 7 6 McAfee Endpoint Security Installation Guide

7 2 Planning 2 your installation Contents Products that you can upgrade Compatibility with other virus-detection and firewall products Compatibility with other McAfee products Products that you can upgrade If an earlier, supported version of one or more Endpoint Security product modules is installed in your environment, you can upgrade to version 10.6 and optionally save your custom settings. You can upgrade these existing products: Endpoint Security 10.2.x or 10.5.x Existing product versions are removed before the new versions are installed. Supported legacy products Custom settings are saved by default. You can choose not to save them. Existing product versions are removed before the new versions are installed. McAfee VirusScan Enterprise 8.8 McAfee SiteAdvisor Enterprise 3.5 Endpoint Security Adaptive Threat Protection 10.5 Existing product version is removed before the new version is installed. McAfee Endpoint Security Threat Intelligence 10.2 Existing product version is removed before the new version is installed. See KB87476 for more information about recommended software upgrade paths. Best practices for product compatibility The installation wizard validates that the installation doesn't fail, but doesn't perform additional upgrade compatibility testing. Follow these best practices to minimize product compatibility issues on systems where you install Endpoint Security. For optimal performance and protection, upgrade all Endpoint Security modules to the same version. Some earlier versions of Endpoint Security were susceptible to injections from third-party DLLs that created issues with product removal and upgrades. Endpoint Security 10.6 makes a due-diligence effort to enable earlier versions to trust well known injectors, but that intelligence is static and limited. To minimize potential issues when upgrading a previous version of Endpoint Security, run the McAfee SysPrep tool to detect and allow trusted third-party software to inject into McAfee processes. See also Preparing your system on page 11 McAfee Endpoint Security Installation Guide 7

8 2 Planning your installation Compatibility with other virus-detection and firewall products Compatibility with other virus-detection and firewall products You don't need to uninstall existing virus-detection and firewall products on systems before installing Endpoint Security. The installation wizard detects these products and resolves most conflicts automatically. Best practice: For information about how to troubleshoot compatibility issues between Endpoint Security and third-party applications, see KB If the Windows firewall is enabled The wizard does not disable the Windows firewall automatically to prevent conflicts. If incompatible virus detection or firewall software is installed The wizard tries to uninstall the software. If it can't, it prompts the user to cancel the installation, uninstall the incompatible software manually from the Windows Control Panel, then resume the installation where it left off. Best practice: See KB85522 for a list of the software products uninstalled automatically. If you have incompatible software that does not appear on this list, manually uninstall it before installing Endpoint Security. If Common Event Enabler (CEE)/Common AntiVirus Agent (CAVA) is running CEE/CAVA is a framework running on a Windows platform that enables third-party anti-virus engines to scan files stored on a Dell EMC Celerra, VNXe, VNX, Unity, or VMAX enas/nas array. You can install Endpoint Security with CAVA support by using a command-line option. The CAVA option disables the blocking cache in the On-Access Scanner (OAS), increases the number of OAS scanning threads to 200, and enables network scanning. These setting changes are needed for OAS to scan all files from CAVA. You can specify a different number of scanning threads during or after installation. See KB88973 for more information. When upgrading from a previous version of Endpoint Security with CAVA, you must use the CAVA command-line option. Otherwise, the installation removes CAVA from the upgraded system. Compatibility with other McAfee products Check for compatibility with existing McAfee products on systems where you plan to install the software, then follow instructions for resolving conflicts. If McAfee Client Proxy is installed Web Control disables itself automatically if it detects a web gateway appliance or if McAfee Client Proxy is installed and in redirection mode. If McAfee Application Control and McAfee Change Control are running The system stops responding (hangs) when memory protection features in McAfee Application Control, McAfee Change Control 8.x or 7.x, and Endpoint Security or Host Intrusion Prevention are running at the same time. Best practice: Disable Application Control and Change Control memory protection features and use the Endpoint Security or Host Intrusion Prevention memory protection features. For full Application Control and Change Control memory protection recommendations, see PD To run Endpoint Security with Application Control and Change Control on a system: Installation order Install Endpoint Security first, then Application Control and Change Control. If already installed Disable the Memory Protection and Script As Updater features in Application Control and Change Control. See KB81465 for more information. 8 McAfee Endpoint Security Installation Guide

9 3 3 System requirements Systems must have specific hardware and software to run McAfee Endpoint Security. Review the requirements before installing the product software to make sure that your installation is successful. System and hardware requirements This release supports deploying Endpoint Security to Windows operating systems. For a complete list of current system requirements, see KB Supported and unsupported browsers Product installation and Web Control features have been verified to function correctly on most versions of popular browsers. URL installation requires one of the supported browsers and an Internet connection. Microsoft Internet Explorer, version 11 Version 10 is supported only on Windows Vista. Google Chrome Doesn't support the Show Balloon option in Web Control. Mozilla Firefox, version 56 and later Safari See KB Microsoft Edge isn't supported. Because Chrome and Firefox release new versions frequently, Web Control might not work with a new update. A Web Control patch is released as soon as possible to support the changes from Google or Mozilla. For the latest information about browsers that Web Control supports, see KB Supported versions of McAfee Agent You have installed McAfee Agent 4.0 or later on your system. Endpoint Security requires McAfee Agent or later (version is recommended). Endpoint Security automatically upgrades version 4.0 and later of the agent to a supported version during product upgrades. You can also upgrade the agent manually. See also Products that you can upgrade on page 7 Upgrade McAfee Agent on page 15 McAfee Endpoint Security Installation Guide 9

10 3 System requirements 10 McAfee Endpoint Security Installation Guide

11 4 Pre-installation 4 tasks Contents Preparing your system Preconfiguring the product Export custom settings to import Preparing your system These tasks help you identify and resolve potential issues before they occur. See KB88288 for more information about performing these and other recommended quick start tasks before installing the product. Evaluate system readiness. Make sure your systems meet requirements See KB82761 for a listing of operating systems for Endpoint Security. Check whether Updates or Hotfixes are necessary to support operating system changes or updates. Make sure that other products are compatible with Endpoint Security Check for compatibility issues with other products running on systems. Determine required anti-virus and firewall exclusions. Make sure that the software you want to upgrade is supported See KB87476 for more information about recommended software upgrade paths. Review settings you want to save If you plan to save custom settings when you upgrade, review your settings and update them as needed. Run McAfee SysPrep Run the McAfee SysPrep tool to detect and allow trusted third-party software to inject into McAfee processes, which ensures that the injectors work together with Endpoint Security. This allows third-party software to function, while allowing McAfee to maintain a trust boundary. McAfee SysPrep is available from the Downloads tab of the ServicePortal: McAfee SysPrep adds third-party injectors to the McAfee Trusted Store, which ensures that the injectors work together with Endpoint Security. Run this tool to: Automatically update the McAfee Trust store for third-party injectors that McAfee recognizes and that exist on the system. McAfee SysPrep sends Event ID 1095 for these injectors and writes them to the logs. Identify any unknown injectors and determine if they are signed or unsigned. McAfee SysPrep sends Event 1092 for these injectors and writes them to the logs. See KB89860 for more information about using McAfee SysPrep. See also System requirements on page 3 Compatibility with other McAfee products on page 8 Compatibility with other virus-detection and firewall products on page 8 McAfee Endpoint Security Installation Guide 11

12 4 Pre-installation tasks Preconfiguring the product Preconfiguring the product You can customize settings for product features before installing your software. Preconfigure custom settings when you need to meet specific requirements. For example, preconfigure port exclusions to ensure that vital communications are not blocked when Firewall is installed, or preconfigure settings required for compliance with security regulations. Overview of preconfiguration process Export settings to a file, then import them during a command-line installation. This is useful when you want to install the software on a new system with custom settings. 1 Customize the settings required for your system. 2 Export the settings using ESConfigTool with command-line options. 3 Import the settings using SetupEP with command-line options. Best practices McAfee preconfigures features with default settings that protect systems in medium-risk environments. These settings ensure that systems can access important websites and applications until there is time to customize the settings. When customizing product features, make sure to configure: Where and how systems get updates. How often and what time of day systems check for updates. Access to required websites and applications without interruption. If you migrate or save settings from legacy products, settings included in a custom package take precedence over legacy settings. In these cases, the custom settings are applied instead of the legacy settings. Export custom settings to import Export preconfigured settings to a file that you can import when you install the software. Use ESConfigTool to do this. Before you begin Make sure that Endpoint Security is installed on a system. This tool exports all settings for the selected product modules to a location that you specify. ESConfigTool is located in the Endpoint Security Platform folder (C:\Program Files\McAfee\Endpoint Security \Endpoint Security Platform, by default). 12 McAfee Endpoint Security Installation Guide

13 Pre-installation tasks Export custom settings to import 4 Task For option definitions, run ESConfigTool with no options: ESConfigTool.exe 1 Configure your settings, then save them to a file. 2 Using the ESConfigTool command line, export the settings to create <file_name> and save this file to a folder that is not protected by McAfee. ESConfigTool.exe /export <file_name> [/module <TP FW WC ESP> ] The folder containing ESConfigTool is protected, so the export location should be a different, writable location. Example: ESConfigTool.exe /export C:\ENS\firewall.policy /module FW This example exports the Firewall settings to C:\ENS\firewall.policy. 3 Using the SetupEP utility, install Endpoint Security and import <file_name>. setupep.exe <options> /import <file_name> /module <FW TP WC ESP> Example: setupep.exe ADDLOCAL="fw,tp,wc" /import C:\ENS\firewall.policy /module FW This example installs Endpoint Security Firewall, Threat Prevention, Web Control product modules, and the Endpoint Security Common module, which installs automatically. It also imports settings from the firewall.policy file and applies them to the Firewall module. See also Installation (SetupEP) command-line options on page 16 ESConfigTool command-line options Use these options with the ESConfigTool utility to create a file of preconfigured settings that you can import during installation of Endpoint Security. Open a Command Prompt window, then run the ESConfigTool command using the appropriate command-line options. Options are not case-sensitive. Example ESConfigTool.exe /export C:\ENS\preconfigured.policy /module TP FW Exports settings for Threat Prevention and Firewall to the file C:\ENS\preconfigured.policy. Basic options ESConfigTool.exe /export <file_name> [/module <TP FW WC ESP> ] [/unlock <password> ] [/plaintext ] McAfee Endpoint Security Installation Guide 13

14 4 Pre-installation tasks Export custom settings to import Option /export <file_path_and_name> Definition Saves settings to a file with the specified name and location. Example: /export C:\My Programs\Endpoint\preconfigured.policy Exports settings to the file preconfigured.policy in the C:\My Programs\Endpoint folder. Save this file to a folder that is not protected by McAfee. The folder containing ESConfigTool is protected, so the export location should be a different, writable location. /module <TP FW WC ESP> Specifies which product module settings to export. TP Threat Prevention FW Firewall WC Web Control ESP Resources shared by product modules. Example: /module TP FW WC ESP Exports settings for all product modules. /unlock <password> /plaintext Sets the password for unlocking the client UI. Specifies descriptive comments in human-readable format. See also Installation (SetupEP) command-line options on page McAfee Endpoint Security Installation Guide

15 5 Install 5 and upgrade the software Contents Upgrade McAfee Agent Install the software with the wizard Install the software from the command line Upgrade McAfee Agent Endpoint Security requires McAfee Agent or later (version is recommended). Endpoint Security automatically upgrades version 4.0 and later of the agent to a supported version during product upgrades. You can also upgrade the agent manually. Task 1 Download the McAfee Agent client package from the download site. 2 Unzip the McAfee Agent package and locate the FramePkg_Upd.exe file. 3 Right-click FramePkg_UPD.exe, then select Run as administrator. Install the software with the wizard The installation wizard automates much of the process for installing and upgrading the product. Before you begin Make sure that your system meets all requirements. Task 1 Download the Endpoint Security.zip file, unzip the contents of the file, then double-click setupep.exe. If you purchase the product online, you receive an with instructions and a URL for downloading the product. 2 On the License Agreement page, click Accept. 3 Resolve any conflicts detected by the wizard. The wizard tries to remove conflicting virus-detection and firewall software products automatically. If it can't, it prompts you to remove them manually, then prompts you to restart the system. If you restart the system immediately, installation resumes afterward. If you restart the system later, run the installation wizard again at your earliest convenience. McAfee Endpoint Security Installation Guide 15

16 5 Install and upgrade the software Install the software from the command line See KB85522 for a list of the software products removed automatically. 4 On the Install Options page, select each module to install. Install with the default settings, or select options to customize your installation. The Endpoint Security Platform (Common module) installs automatically with the first module you install. 5 (Upgrade only) Select whether to save your settings. 6 Click Install. A dialog box shows the progress of the installation and notifies you when it is complete. You can cancel the installation at any time, if needed. 7 Click Finish to close the wizard. Best practice: Restart the system after installing this release of the product. 8 (Upgrade only) If you saved your custom settings, verify that they were saved. See also Compatibility with other virus-detection and firewall products on page 8 Install the software from the command line You can run the installation wizard from the command line, which lets you select additional options, such as silent installation. By default, installation is interactive. Before you begin Make sure that your system meets all requirements. For silent installation, the wizard displays no feedback. All information is available in logs. For interactive command-line installation, the wizard displays a progress window and allows you to cancel the installation, if needed. All information is available in logs. Task 1 Copy the product files to the system where you want to install it. Depending on how you purchased the product, you might need to download product files from a download site or copy them from a disc. 2 Open a Command Prompt window, navigate to the folder where you copied the files, then type this command and any applicable parameters, which are not case-sensitive: setupep.exe /parameters Type setupep.exe /help for a complete list of command-line options for the SetupEP utility. Best practice: Restart the system after installing this release of the product. Installation (SetupEP) command-line options Use these options with the standalone installation utility (SetupEP) to install the product from a command line. Open a Command Prompt window, then run the SetupEP command using the appropriate command-line options. Options are not case-sensitive. 16 McAfee Endpoint Security Installation Guide

17 Install and upgrade the software Install the software from the command line 5 Example setupep.exe INSTALLDIR="D:\My Programs" /l"d:\my Log Files" Installs the product files to a folder on drive D under My Programs and saves the installation log files to a folder under My Log Files. Basic options setupep.exe ADDLOCAL="fw,tp,wc" [INSTALLDIR="install_path"][/qn][/qb][/qb!][/ l*v"install_log_path"] All options setupep.exe ADDLOCAL="fw,tp,wc" [/CAVA="<number of scanning threads>"] [INSTALLDIR="install_path"][/qn][/qb][/qb!][/l"install_log_path"][/ l*v"install_log_path"] [/CAVA="number_of_scanning_threads"] [/import <file_name>] [/ module <TP FW WC ESP>] [/nopreservesettings] [/override"program_name"] [/policyname <name>] [/quarantinefolder="directory path"] [/unlock <password>]/cava="<number of scanning threads>" Option ADDLOCAL="tp,fw,wc" Definition Selects the product modules to install: tp Threat Prevention fw Firewall wc Web Control fw,tp,wc Install all three modules. The shared Endpoint Security Platform (Common module) is also installed automatically when any product module is installed. Example: ADDLOCAL="tp,wc" Installs Threat Prevention, Web Control, and Common. CAVA="number_of_scanning_threads" ADDLOCAL="tp,fw,wc" CAVA="number_of_scanning_threads" Installs Endpoint Security with support for the Common AntiVirus Agent (CAVA). Used with ADDLOCAL. Requires Threat Prevention. Disables the blocking cache in the On-Access Scanner (OAS), increases the number of OAS scanning threads to 200, and enables network scanning, to ensure the OAS scans all files from CAVA. Optionally, you can specify a different number of scanning threads. See KB88973 for more information. When upgrading from a previous version of Endpoint Security with CAVA, you must use the CAVA command-line option. Otherwise, the installation removes CAVA from the upgraded system. McAfee Endpoint Security Installation Guide 17

18 5 Install and upgrade the software Install the software from the command line Option INSTALLDIR="install_path" /log"install_log_path" or / l"install_log_path" /l*v"install_log_path" /qn or /quiet /qb! or /passive /qb Definition Specifies where to install the product files on the system. The installation wizard creates an Endpoint folder at the specified location and installs the product to this folder. Example: INSTALLDIR="D:\Installed Programs" Installs the product modules under D:\Installed Programs\Mcafee\Endpoint Security. By default, product files are installed in the folder C: \Program Files\McAfee\Endpoint Security. Specifies where to save the installation log files for tracking installation events. The installation wizard creates an Endpoint folder at the specified location and saves the log files to this folder. Example: /l"d:\log Files" Installs the product log files under D:\Log Files. By default, log files are saved in the Windows System TEMP folder C:\windows\Temp\McAfeeLogs. *v Specifies verbose (more descriptive) logging entries. Specifies how the users can interact with the installation wizard: qn Hide all installation notifications (silent mode). Users have no interaction. qb! Show only a progress bar without a Cancel button. Users cannot cancel the installation while it is in progress (passive mode). qb Show only a progress bar with a Cancel button. Users can cancel the installation while it is in progress, if needed. /import <file_name> /module <TP FW WC ESP> Imports settings from the specified file. Example: /import mysettings Imports settings from the file called mysettings. Applies imported settings to the specified product modules. TP Threat Prevention FW Firewall WC Web Control ESP Resources shared by product modules. Example: /import mysettings /module TP FW Imports settings from the file called mysettings to Threat Prevention and Firewall. 18 McAfee Endpoint Security Installation Guide

19 Install and upgrade the software Install the software from the command line 5 Option /nocontentupdate Definition Does not automatically update product content files on the system as part of the installation process. Content files include the latest AMCore, Exploit Prevention, and Adaptive Threat Protection content files required for Endpoint Security. Update content files to ensure that the system is fully protected. If you don't update them during installation, schedule an update as soon as possible. /nopreservesettings /override"program_name" /policyname <name> /quarantinefolder="directory path" /unlock <password> Does not save your product settings when upgrading to Endpoint Security. By default, settings are preserved. Overrides and removes the specified conflicting products during installation. Assigns the specified settings to systems where the product is installed. Specifies the location of the Quarantine folder where detected threats are placed. The folder path is limited to 190 characters. Example: /quarantinefolder="d:/reports" Creates a Quarantine folder at D:\reports\Quarantine. By default, the Quarantine folder is located in the folder <SYSTEM_DRIVE>\Quarantine. Sets the password for unlocking the client UI. See also Checking installation log files on page 29 Compatibility with other virus-detection and firewall products on page 8 Export custom settings to import on page 12 McAfee Endpoint Security Installation Guide 19

20 5 Install and upgrade the software Install the software from the command line 20 McAfee Endpoint Security Installation Guide

21 6 Post-installation 6 tasks Contents Verify the installation Test malware detection Test Real Protect scanning Verify the installation Verify that the products were installed successfully and the system is up to date. If you saved settings from legacy products, verify that your settings were saved correctly. Task 1 Open the Windows Control Panel and verify that the name of each product you selected to install appears and that version 10.6 is installed. McAfee Endpoint Security Firewall McAfee Endpoint Security Threat Prevention McAfee Endpoint Security Web Control McAfee Endpoint Security Platform McAfee Endpoint Security Adaptive Threat Protection 2 Open the installation log file and make sure that no errors or failure messages appear. By default, the installation wizard installs the installation log files in the user Temp folder as %Temp% \McAfeeLogs (for example, C:\Users\username\AppData\Local\Temp\McAfeeLogs). 3 Open the Endpoint Security Client, then click Update Now to make sure that the system is up to date. If your system is up to date, the page displays No Updates Available and the date and time of the last update. 4 (Upgrade only) If you upgraded legacy products with saved settings, check the client Settings page for each product module to verify that legacy settings were saved. Test malware detection Test the virus-detection feature of Threat Prevention by downloading the EICAR Standard AntiVirus Test File to the local system. Although it is designed to be detected as a virus, the EICAR test file is not a virus. McAfee Endpoint Security Installation Guide 21

22 6 Post-installation tasks Test Real Protect scanning Task 1 Download the EICAR file from this location: If installed properly, Threat Prevention interrupts the download and displays a threat detection dialog box. 2 Click OK. If not installed properly, Threat Prevention does not detect the virus or interrupt the download process. In this case, use Windows Explorer to delete the EICAR test file from the client computer, then reinstall the product and test the new installation. Test Real Protect scanning Test that the Real Protect scanning features in Adaptive Threat Protection are installed correctly and that systems can communicate with the McAfee cloud for detections. Before you begin Real Protect can connect to McAfee GTI to send queries to the domain: realprotect1.mcafee.com. This test uses password-protected files to check Real Protect client and cloud-based detections. Although they are designed to be detected as threats, they are harmless. Download the test files to a different location each time you run this test. Real Protect does not detect the files on subsequent attempts to run them from the same location. See KB88828 for information about testing the Real Protect scanning features. Task 1 On the client system, download the compressed test file from this location: KB The password for the.zip file is clean. Password protection ensures that the.zip file is not blocked if you send it in an . 2 Navigate to the folder where you downloaded the file, then unzip the file. 3 To test client detections, double-click RP-S TestFile.exe. If Real Protect client scanning is functioning correctly in Endpoint Security, it detects the file and prevents the file from running. 4 To test cloud detections, double-click RP-Ds TestFile.exe. The RP-D TestFile.exe must run for a minute for the detection to trigger. If Real Protect cloud scanning is functioning correctly in Endpoint Security, it detects the file and prevents the file from running. If Real Protect does not detect the file and prevent it from running, check the Adaptive Threat Protection Activity log file and troubleshoot the problem, then run the test again. See also Checking Real Protect log file entries on page McAfee Endpoint Security Installation Guide

23 7 7 Remove the software Remove the software from systems locally Remove client software on a system by using the Windows Control Panel. You might do this for testing or before reinstalling the client software. Reinstall the client software as soon as possible. When it is uninstalled, the system is not protected against threats. Task 1 On the system, open the Windows Control Panel, then go to the Uninstall Programs screen. 2 In the list of programs, select each product module in this order, then click Uninstall. McAfee Endpoint Security Adaptive Threat Protection McAfee Endpoint Security Firewall McAfee Endpoint Security Threat Prevention McAfee Endpoint Security Web Control Endpoint Security Platform (Common module) is uninstalled automatically with the last product module. You can't uninstall it while other product modules are installed. 3 If prompted, enter a password for each module. By default, no password is required. 4 Wait for the wizard to report that it has uninstalled the support components. If you do not see a notification, check the Event Log to verify that the Common module was removed successfully. 5 If no other McAfee products are installed, select McAfee Agent in the Uninstall Programs screen of the Windows Control Panel, then click Uninstall. See also Installation (SetupEP) command-line options on page 16 McAfee Endpoint Security Installation Guide 23

24 7 Remove the software Remove the software from systems locally 24 McAfee Endpoint Security Installation Guide

25 8 Troubleshoot 8 installations and upgrades Contents Customer support information Resolving Firewall issues with Adaptive mode Resolving McAfee error codes and messages Resolving Windows error messages Checking installation log files Checking Real Protect log file entries Using the MER tool for troubleshooting Customer support information Check these resources for information about installing and using the product. McAfee websites Visit the ServicePortal to find the complete library of Technical Articles about McAfee products. Go to support.mcafee.com, click Knowledge Center, then select Product Documentation from the Knowledge Base list. See the online McAfee community for information about installing, migrating, and integrating Endpoint Security with other McAfee security products. Also provides links to related documentation. Technical Support articles General product information: KB86704 A consolidated, up-to-date list of common questions and answers about using Endpoint Security. KB82450 Known issues in Endpoint Security. KB88788 Known issues in Endpoint Security Adaptive Threat Protection. Installation issues: KB87791 Processes that Endpoint Security installs. KB89239 Installation fails in the presence of third-party applications because of untrusted DLL injections. KB87096 Installation fails, or fields do not populate, because of missing root certificates. KB85033 Installation fails to install if user access to the user temp folder is restricted. Compatibility issues: KB73182 Troubleshooting compatibility issues between Endpoint Security and third-party applications. McAfee Endpoint Security Installation Guide 25

26 8 Troubleshoot installations and upgrades Resolving Firewall issues with Adaptive mode Resolving Firewall issues with Adaptive mode If applications aren't working correctly after installing Endpoint Security Firewall, and you didn't preconfigure custom Firewall rules, Firewall might be blocking those applications. To resolve this problem, enable Adaptive mode. This allows Endpoint Security Firewall to create client rules automatically, so that necessary applications and websites are not blocked while preserving minimum protection against vulnerabilities. Adaptive mode analyzes events, then if the activity is considered regular and needed for business, Firewall creates client rules. By enabling Adaptive mode, you can gather the information you need for tuning your protection settings. When tuning is complete, turn off Adaptive mode. Best practice: To be fully protected by Firewall, turn off Adaptive mode after updating your policies. You can enable Adaptive mode from the Firewall Settings page in one of these ways: Click Firewall on the main Endpoint Security status page, then click Advanced and select Adaptive mode. From the Action menu, select Settings, then click Firewall on the Settings page, then click Advanced and select Adaptive mode. Best Practice: For information about troubleshooting blocked third-party applications, see KB Resolving McAfee error codes and messages Error messages are displayed by programs when an unexpected condition occurs that can't be fixed by the program itself. Use this list to find an error message, an explanation of the condition, and any action you can take to correct it. Depending on how you launched the installation wizard, it displays a description of the error or an error code. Message Description Solution Conflicting McAfee product(s) found. Administrator rights required. Error code: Displays temporarily in Windows Defender Security Center after a restart. The installation wizard detected one or more conflicting McAfee products on the system that it can't remove automatically. Error code: You must have administrator rights to run the installation wizard. Uninstall the conflicting products, then try installing again. Log on as an administrator, then launch the installation wizard. Invalid Package. Error code: Removal failed. Error code: Invalid package found. Please verify that you have a valid package. The installation wizard couldn't remove a previous version of this product (such as a beta version) or a legacy product (such as VirusScan Enterprise or SiteAdvisor Enterprise) from the system. Download a valid package file, then try installing the product again. Remove these products manually before installing Endpoint Security. Contact Technical Support if the issue persists. 26 McAfee Endpoint Security Installation Guide

27 Troubleshoot installations and upgrades Resolving McAfee error codes and messages 8 Message Description Solution Installer failed to launch. Error code: The installation wizard was not able to launch. Error code: Contact Technical Support. Restart required Error code: Restart required Error code: Restart pending Error code: The installation wizard requires a system restart to continue the installation. The installation wizard requires a system restart to complete the installation. A system restart from a previous installation or removal operation is pending. Restart the system to continue with the installation. Restart the system to complete the installation. Restart the system to continue with the installation. Incompatible software removal failed. Error code: The installation wizard tried and failed to remove one or more incompatible software products it detected on the system. Remove these products manually before installing Endpoint Security. Installation failed. Error code: Installation canceled. Error code: Migration failed. Error code: Your system is not protected. Your previous security software was uninstalled, but the installer was interrupted before McAfee Endpoint Security was installed. Call McAfee support for assistance as soon as possible. The installation wizard was interrupted before it finished installing Endpoint Security. It made no changes to your system. The user canceled the installation before it completed. The installation wizard made no changes to the user's system. The installation wizard tried to migrate settings from a legacy product, but it encountered an error. Error code: 16029, 16030, The installation wizard was interrupted before Endpoint Security was installed. Your previous software was uninstalled, but no other changes were made to your system. Run the installation wizard again at a later time. Run the installation wizard again. Run the installation wizard again at a later time. To protect your system against threats, contact Technical Support as soon as possible. Your system is not fully protected. The installer could not install [product name]. Call McAfee support for assistance. Error code: One or more Endpoint Security product modules failed to install. Your previous software was uninstalled. To fully protect your system against threats, call Technical Support as soon as possible. Policy import failed. Error code: The installation wizard installed Endpoint Security successfully, but couldn't import the specified policy. Check that you selected the proper data to import. Contact Technical Support if the issue persists. McAfee Endpoint Security Installation Guide 27

28 8 Troubleshoot installations and upgrades Resolving Windows error messages Message Description Solution Policy import failed. Error code: Installation failed and then rollback failed. Installation canceled and then rollback failed. The installation wizard couldn't import the specified policy. Error code: The installation wizard couldn't install Endpoint Security or roll back the changes it made to the user's system. Error code: The installation was canceled before it completed. The installation wizard couldn't roll back the changes it made to the user's system. Check that you selected the proper data to import. Contact Technical Support if the issue persists. Check the installation logs on the system and contact Technical Support for assistance. Check the installation logs on the system and contact Technical Support for assistance. Another installation wizard is already running. Endpoint Security Platform is not running! Error code: 1618 Another installation is already in progress. The system tray icon also is gray with a red exclamation point. An unknown third-party injection into McAfee code might have been detected. Complete that installation before proceeding with the new installation. See KB88029 for information about troubleshooting this error. Resolving Windows error messages Windows displays these error messages when an unexpected condition occurs. Use this information to find an explanation of the condition and a solution. Message Description Solution Installation failed. Threat service has stopped. Restart it now. The installation wizard couldn't install Endpoint Security. It made no changes to the user's system. After restarting a system, this message appears in the Virus & threat protection page in Windows Defender Security Center. Threat Prevention tries to send the Endpoint Security security status to the Security Center service. This fails because the Security Center service is not in a running state immediately after a restart. After about two minutes, when the Security Center service is in a running state, Threat Prevention successfully sends the security status and the message no longer appears. See MsiExec.exe and InstMsi.exe Error Messages for descriptions of specific error codes. If the issue persists, contact Technical Support. Ignore this message when displayed temporarily after a restart. The security status is automatically corrected about two minutes after the restart. 28 McAfee Endpoint Security Installation Guide

29 Troubleshoot installations and upgrades Checking installation log files 8 Checking installation log files The installation wizard tracks details about installation, uninstallation, and migration in log files that you can use to verify results and troubleshoot problems. Default location of installation log files By default, the installation wizard saves the installation log files in the User TEMP folder %Temp% \McAfeeLogs: C:\Users\username\AppData\Local\Temp\McAfeeLogs, by default Changing the location of installation log files Use one of these command-line options to change the location for the log files: /log"install_log_path" /l"install_log_path" /l*v"install_log_path" where: "install_log_path" Specifies where to save the installation log files. The installation wizard creates an Endpoint folder at the specified location and saves the log files to this folder. *v Specifies verbose (more descriptive) logging entries. Example /l"d:\log Files" Installs the product log files under D:\Log Files\EndPoint\. Installation and migration log files Check these log files for details about installation and migration. Log file name McAfee_<module>_Install_< %timestamp%>.log McAfee_<Module>_Bootstrapper_< %timestamp%>.log McAfee_Endpoint_BootStrapper_< %timestamp%>.log McAfee_<Module>_CustomAction _Install_<%timestamp%>.log McAfee_Endpoint _CompetitorUninstaller.log McAfee_Endpoint_Security _Migration_xxx.log Type of information Installation log for each product module. Bootstrapper for each product module. Bootstrapper for the Master installation wizard (SetupEP) on self-managed systems. MSI Custom Action for each product module. Removal of incompatible virus-protection and firewall products. Removal of legacy products. Example: McAfee_Endpoint_Security_Migration_McAfee VirusScan Enterprise_8.8_ log McAfee Endpoint Security Installation Guide 29

30 8 Troubleshoot installations and upgrades Checking Real Protect log file entries Log file name McAfee_<module>_Migration_Plugin.log McAfee_ESP_Migration_Plugin.log Type of information Preserve and restore status of migrated legacy settings, per module. Example: McAfee_TP_Migration_Plugin.log Legacy settings migrated to the Common Options policy. Uninstallation log files Check these log files for details about removing the product. Log file name McAfee_<Module>_UnInstall<%timestamp%>.log McAfee_<Module>_CustomAction_Uninstall< %timestamp%>.log McAfee_CommonUninst<%timestamp%>.log McAfee_ Common_VScore_Uninstall<%timestamp %>.log McAfee_ Firewall_FireCore_Uninstall< %timestamp%>.log McAfee_ ThreatPrevention_Caspercore _Uninstall<%timestamp%>.log McAfee_ ThreatPrevention_ELAM_AVDriver _Uninstall<%timestamp%>.log McAfee_ ThreatPrevention_EP_Uninstall< %timestamp%>.log Type of information Uninstallation log for each product module. MSI Custom Action for each product module for uninstallation. Uninstallation log for Common module (which is uninstalled with last product module). Log for VSCore driver removal by Common module. Log for FireCore driver removal by Common module. Log for CasperCore driver removal by Threat Prevention. Log for ELAM driver removal by Threat Prevention. Log for Exploit Prevention removal by Threat Prevention. Checking Real Protect log file entries Each time Real Protect completes a scan of a file, it creates an entry in the AdaptiveThreatProtection_Activity.log with an ID that indicates the result of the scan. You can use the ID to verify that scans completed successfully or troubleshoot issues with Real Protect. See KB88828 for information about testing the Real Protect scanning features. Real Protect ID Description 0 Process found with clean reputation 1 Process found with unknown reputation 2 Time out 3 Unknown failure 4 Unsupported version of Real Protect 5 Not enough events 6 Point product request does not scan 7 Phase 1 remediation is over 8 Process terminated 9 No network detected 30 McAfee Endpoint Security Installation Guide

31 Troubleshoot installations and upgrades Using the MER tool for troubleshooting 8 Real Protect ID Description 10 Process was spikey and was not scanned 11 Process is cached with unknown reputation See also Test Real Protect scanning on page 22 Using the MER tool for troubleshooting The MER (Minimum Escalation Requirements) tool collects McAfee data from Endpoint Security and other McAfee products on your computer. Technical Support uses this data to analyze and resolve your problem. The information collected by the MER tool includes: Registry details Event logs File version details Process details Files McAfee provides two versions of MER: WebMER runs on the client computer. See How to use MER tools with supported McAfee products. MER tool for McAfee epo uses McAfee epo to run the MER tool on client computers. See How to use the MER tool for McAfee epo. McAfee Endpoint Security Installation Guide 31

32 8 Troubleshoot installations and upgrades Using the MER tool for troubleshooting 32 McAfee Endpoint Security Installation Guide

33 0-00

McAfee Endpoint Security Installation Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Installation Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes 10.5.3 Contents About this release What's new Resolved issues Installation information Known issues Getting product information by email Where to find product documentation About this release

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security Threat Prevention Product Guide - Windows

McAfee Endpoint Security Threat Prevention Product Guide - Windows McAfee Endpoint Security 10.6.0 - Threat Prevention Product Guide - Windows COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0 Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Application Control Windows Installation Guide. (Unmanaged)

McAfee Application Control Windows Installation Guide. (Unmanaged) McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

Endpoint Intelligence Agent 2.2.0

Endpoint Intelligence Agent 2.2.0 Release Notes Endpoint Intelligence Agent 2.2.0 Revision A Contents About this release New features Resolved issues Installation instructions Known issues Find product documentation About this release

More information

Installation Guide Revision B. McAfee Active Response 2.2.0

Installation Guide Revision B. McAfee Active Response 2.2.0 Installation Guide Revision B McAfee Active Response 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Application Control and McAfee Change Control Linux Product Guide Linux

McAfee Application Control and McAfee Change Control Linux Product Guide Linux McAfee Application Control and McAfee Change Control 6.3.0 - Linux Product Guide 6.3.0 - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee VirusScan Enterprise for Storage 1.3.0

McAfee VirusScan Enterprise for Storage 1.3.0 Product Guide McAfee VirusScan Enterprise for Storage 1.3.0 For use with epolicy Orchestrator 5.3.x and 5.9.x Software COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Threat Intelligence Exchange Installation Guide. (McAfee epolicy Orchestrator)

McAfee Threat Intelligence Exchange Installation Guide. (McAfee epolicy Orchestrator) McAfee Threat Intelligence Exchange 2.2.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Threat Intelligence Exchange Installation Guide

McAfee Threat Intelligence Exchange Installation Guide McAfee Threat Intelligence Exchange 2.3.0 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Product Guide. McAfee Performance Optimizer 2.2.0

Product Guide. McAfee Performance Optimizer 2.2.0 Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Deploying the hybrid solution

Deploying the hybrid solution Deployment Guide McAfee Web Protection Hybrid Deploying the hybrid solution A McAfee Web Protection license provides all components needed to set up McAfee Web Gateway and McAfee Web Gateway Cloud Service

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Application Control 6.2.0

McAfee Application Control 6.2.0 Best Practices Guide McAfee Application Control 6.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Agent 5.6.x Product Guide

McAfee Agent 5.6.x Product Guide McAfee Agent 5.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

Product Guide Revision A. Endpoint Intelligence Agent 2.2.0

Product Guide Revision A. Endpoint Intelligence Agent 2.2.0 Product Guide Revision A Endpoint Intelligence Agent 2.2.0 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Active Response 2.0.0

McAfee Active Response 2.0.0 Product Guide McAfee Active Response 2.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Threat Intelligence Exchange Product Guide. (McAfee epolicy Orchestrator)

McAfee Threat Intelligence Exchange Product Guide. (McAfee epolicy Orchestrator) McAfee Threat Intelligence Exchange 2.2.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Endpoint 1808 Product Guide

McAfee MVISION Endpoint 1808 Product Guide McAfee MVISION Endpoint 1808 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes September Update McAfee Endpoint Security 10.5.4 For use with epolicy Orchestrator Contents Rating Resolved issues Installation instructions Note: If the versions of 10.5.4 is prior to September

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Performance Optimizer 2.1.0

McAfee Performance Optimizer 2.1.0 Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Firewall Enterprise and 8.3.x

McAfee Firewall Enterprise and 8.3.x Release Notes Revision A McAfee Firewall Enterprise 8.2.1 and 8.3.x Scan Engine Update MCV02 Contents About this release Installation instructions Known issues Find product documentation About this release

More information

McAfee Agent Product Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Product Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.1 Product Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Application Control Windows Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Product Guide. McAfee SiteAdvisor Enterprise 3.5 Patch2

Product Guide. McAfee SiteAdvisor Enterprise 3.5 Patch2 Product Guide McAfee SiteAdvisor Enterprise 3.5 Patch2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision M McAfee Network Security Platform 8.1 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information