Client Proxy interface reference
|
|
- Lorena Lucas
- 5 years ago
- Views:
Transcription
1 McAfee Client Proxy Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page of the Policy Catalog, you can create, import, export, rename, duplicate, delete, view, and edit policies. The Client Proxy policy named McAfee Default is read-only. It can be duplicated and saved with a new name, but it cannot be renamed, deleted, exported, or edited. Table 1 Client Proxy policy options New Policy Import Export Name Owner Opens the Create a new policy dialog box, where you can select an existing policy to use as a template for a new policy and specify a name. Opens the Import Policies dialog box, where you can browse for the.xml file that has the policy you want to import. Opens the Export page, where you have these options: Click the link Opens a new tab in your web browser, where you can view the policy in XML format. Right-click the link, then select Save Link As, choose a folder, and optionally update the file name Downloads the policy to an.xml file. Default file name: Policies_For_McAfee_Client_Proxy_<x.y.z>.xml <x.y.z> specifies the version number of Client Proxy. Opens the policy settings, which you can edit and save. Opens a list of users and groups, where you can select the policy owners and save any changes. 1
2 Table 1 Client Proxy policy options (continued) Assignments Actions Opens the list of nodes, where the policy is assigned. Rename Opens the Rename Policy dialog box, where you specify a new name for the policy. Duplicate Opens the Duplicate Existing Policy dialog box, where you specify a name for the new policy that is based on an existing policy. Delete Opens the Delete Policy dialog box, where you confirm that you want to delete the policy. Export Opens the same page as the Export button. Proxy Servers page Configure the list of proxy servers and rules that the Client Proxy software uses when redirecting network traffic. Table 2 Proxy Servers options Specify how the software selects a proxy server from the list. Select an option: connect to the first accessible Proxy Server based on their order in the list below The software selects the next proxy server from the list that you configure. connect to the Proxy Server which has the fastest response time The software selects the next proxy server from the list that it maintains, which is based on response time. Proxy Server Address Proxy Port HTTP/HTTPS Non-HTTP/HTTPS Redirected Ports Enable Auto proxy switch over Polling interval Specify additional ports that you would like to redirect as HTTP/HTTPS traffic Specifies the IP address or host name of the proxy server. Specifies the port number of the proxy server. The software redirects all traffic sent to ports 80 and 443 to a proxy server. Specifies the port numbers of protocols other than HTTP/HTTPS whose traffic you want redirected. Verify that the proxy server supports these protocols. The software checks the proxy server list at the specified interval to see if a higher priority server is available. If available, the software automatically switches to it. Specifies how often the software checks the proxy server list to see if a higher priority server is available. Range: seconds Recommended value: 60 seconds Specifies the numbers of other ports whose traffic you want redirected like HTTP/ HTTPS traffic. For example, you can redirect requests sent to an application the same as requests sent to a web browser. 2
3 Table 2 Proxy Servers options (continued) Block Traffic on above configured Ports if none of the Proxy servers is reachable Bypass proxy server for local addresses When none of the configured proxy servers can be reached, the software: Selected Blocks all traffic sent to the configured ports and default ports 80 and 443. Deselected Continues to redirect all traffic sent to the configured ports and default ports 80 and 443. Selected The software does not redirect traffic sent to local addresses inside your network. Deselected The software redirects all traffic, including traffic sent to local addresses inside your network, to a proxy server. This setting is selected by default. Client Configuration page Configure the settings that the Client Proxy software uses to redirect web requests based on the location of the endpoint: inside or outside the network or connected to the network by VPN. Table 3 Customer Identifier (McAfee epo) Category Customer Identifier Before configuring this page, download the customer ID.xml file from the Web Gateway or McAfee WGCS server. You must have this information to save the configuration. Table 4 Shared Password (McAfee epo Cloud) Browse Unique Customer ID Shared Password Category Configure Shared Password After you enter the shared password, you must save the new policy for the password to be updated in the system. Allow enough time for this process to complete. Otherwise, authentication fails. Shared Password Reset Customer Credentials Export Customer Credentials Click to locate the.xml file with the customer ID and shared password. Displays the customer ID imported from the XML file. Displays the hashed shared password imported from the XML file. Enter and confirm the password that Client Proxy and McAfee WGCS use to communicate securely. When clicked, opens a warning dialog box, where you can confirm that you want to change the shared password. When clicked, opens a dialog box, where clicking Export Password opens a new tab in the web browser with the password and customer ID displayed in XML format. 3
4 Table 5 Client Configuration options Category Traffic Redirection Settings Redirect network traffic when computer is not connected to corporate network and not working through VPN Always redirect network traffic to proxy servers The software redirects web requests to a proxy server in this case: The user is working outside your organization's network and is not connected to the network by VPN. The software redirects web requests to a proxy server in all cases: The user is working inside your organization's network. The user is working outside your network and is connected by VPN. The user is working outside your network and is not connected by VPN. Corporate Network Detection Detect if MCP is inside the corporate network Select an option: by testing connectivity to epo The software determines whether the endpoint is inside the network by pinging the McAfee epo server. Best practice: We recommend this option. Corporate VPN Detection Active Directory Groups Filter Server Address Server Port Detect if MCP is connected to a corporate VPN Server Address Server Port Regular Expression Include / Exclude by testing connectivity to any of the following corporate servers The software determines whether the endpoint is inside the network by pinging the specified servers on the network. Specifies the IP address or host name of a server on your organization's network. Specifies the port number of the server on your organization's network. Specifies the addresses of one or more VPN servers. The software determines whether the endpoint is connected to the VPN by pinging the servers you specify. Specifies the IP address or host name of a VPN server on your organization's network. Specifies the port number of the VPN server on your organization's network. Specifies the names of one or more Active Directory groups. The software uses the names to filter the groups in the header that it adds to web requests before redirecting them to the proxy server. Format: <domain_name>\\<group_name> Group membership information must not exceed 4096 characters. For each regular expression, select an option: Include Includes the Active Directory name in the header added to the web request. Exclude Excludes the Active Directory name in the header added to the web request. 4
5 Table 5 Client Configuration options (continued) Category Log File Settings (OS X Only) Specifies how much information the software logs to a file. Select an option: Log messages with Error and Critical priority Log messages with Error, Critical, Information, and Warning priority Log all messages (recommended for troubleshooting and debugging) Don't log any messages Log files are located in the following folder on the endpoint running macos: C:\Program Data\McAfee\MCP\Logs Access Protection (Windows Only) Enable access protection Request release key for manual uninstall Users are allowed to: Use Windows Task Manager to disable the software Edit or delete files Change registry values Selected Users can request a release code from an administrator and use it to uninstall the software. Deselected Users must use the Windows uninstall feature to uninstall the software. Best practice: Use a release code to uninstall the software. Bypass List page The Client Proxy software allows web requests that match the items in the bypass list to pass the proxy server and go directly to the Internet. To add items to the bypass list, select them from the Common Catalog instance that is linked to the Client Proxy policy. Table 6 Bypass List options Actions From the drop-down list, select: Add bypass list item Select an item type, then select one or more items from the Common Catalog, and add them to the bypass list. Domain Name Network Address Network Port Process List Edit/View Edit the selected item in the bypass list. Remove Remove the selected items from the bypass list. Show selected rows Only the selected items in the bypass list are shown. 5
6 Block List page Configure the list of processes that the Client Proxy software blocks from accessing the Internet. Table 7 Block List options Allow traffic to go directly to destination Block traffic for all processes (except bypass listed processes) The software allows all processes to access the Internet without going through a proxy server. The software blocks all processes from accessing the Internet (except processes included on the bypass list). Best practice: Use this option as a last resort. It can block system processes from reaching the Internet and prevent normal operation on the endpoint. Block traffic only for the following processes Allows you to configure the names of processes that you want blocked from accessing the Internet and add them to the block list. Copyright 2018 McAfee, LLC McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. 6 0A-00
Client Proxy interface reference
McAfee Client Proxy 2.3.3 Interface Reference Guide (McAfee epolicy Orchestrator) Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI.
More informationClient Proxy interface reference
Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page
More informationMcAfee Client Proxy Product Guide
McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationProduct Guide Revision A. McAfee Client Proxy 2.3.2
Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationProduct overview. McAfee Web Protection Hybrid Integration Guide. Overview
McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee
More informationInstalling Client Proxy software
Revision A McAfee Client Proxy 2.3.4 Installation Guide (McAfee epolicy Orchestrator) Installing Client Proxy software Client Proxy software Client Proxy consists of server and client software, whose deployment
More informationDeploying the hybrid solution
Deployment Guide McAfee Web Protection Hybrid Deploying the hybrid solution A McAfee Web Protection license provides all components needed to set up McAfee Web Gateway and McAfee Web Gateway Cloud Service
More informationInstallation Guide. McAfee Web Gateway Cloud Service
Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Client Proxy Installation Guide
McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,
More informationInterface Reference topics
McAfee Content Security Reporter 2.6.x Interface Reference Guide Interface Reference topics Edit Permission Set page (Permission Sets page) Specify Content Security Reporter permissions and grant user
More informationMcAfee Security-as-a-Service
Troubleshooting Solutions Guide McAfee Security-as-a-Service For use with epolicy Orchestrator 4.6.0 Software This guide provides supplemental information related to installing and using the McAfee Security-as-a-Service
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationProduct Guide. McAfee Web Gateway Cloud Service
Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationManaging Client Proxy
Installation Guide McAfee Client Proxy 2.3.2 Managing Client Proxy You manage McAfee Client Proxy from the McAfee epolicy Orchestrator (McAfee epo ) or McAfee epolicy Orchestrator Cloud (McAfee epo Cloud)
More informationMcAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)
McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee Data Loss Prevention Prevent 11.1.x Release Notes
Revision B McAfee Data Loss Prevention Prevent 11.1.x Release Notes Contents What's new in update 11.1.100 Resolved issues in update 11.1.100 Additional installation information Rating for update 11.1.100
More informationProduct Guide. McAfee Web Gateway Cloud Service
Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee File and Removable Media Protection Product Guide
McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationSCCM Plug-in User Guide. Version 3.0
SCCM Plug-in User Guide Version 3.0 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave
More informationMcAfee Web Gateway Administration
McAfee Web Gateway Administration Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction to the tasks crucial
More informationMcAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationProduct Guide. McAfee Plugins for Microsoft Threat Management Gateway Software
Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationCloud Help for Community Managers...3. Release Notes System Requirements Administering Jive for Office... 6
for Office Contents 2 Contents Cloud Help for Community Managers...3 Release Notes... 4 System Requirements... 5 Administering Jive for Office... 6 Getting Set Up...6 Installing the Extended API JAR File...6
More informationMigration Guide. McAfee Content Security Reporter 2.4.0
Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Content Security Reporter 2.6.x Migration Guide
McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Drive Encryption Administration Course
McAfee Drive Encryption Administration Course Education Services administration course The McAfee Drive Encryption Administration course from McAfee Education Services provides attendees with hands-on
More informationInterface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationStonesoft Management Center. Release Notes Revision B
Stonesoft Management Center Release Notes 6.1.1 Revision B Table of contents 1 About this release...3 System requirements... 3 Build version...4 Compatibility... 5 2 New features...6 3 Enhancements...
More informationMigration Guide. McAfee File and Removable Media Protection 5.0.0
Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee VirusScan and McAfee epolicy Orchestrator Administration Course
McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration
More informationMcAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide
McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee Endpoint Security
Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the
More informationMcAfee epolicy Orchestrator Release Notes
McAfee epolicy Orchestrator 5.9.1 Release Notes Contents About this release What's new Resolved issues Known issues Installation information Getting product information by email Where to find product documentation
More informationWhat s New in Fireware v12.3 WatchGuard Training
What s New in Fireware v12.3 2 What s New in Fireware v12.3 Updates to Networking functionality: SD-WAN actions SD-WAN reporting enhancements NetFlow support Link monitor enhancements Centralized FireCluster
More informationMcAfee Content Security Reporter 2.6.x Installation Guide
McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationMcAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More information8.0 Help for Community Managers Release Notes System Requirements Administering Jive for Office... 6
for Office Contents 2 Contents 8.0 Help for Community Managers... 3 Release Notes... 4 System Requirements... 5 Administering Jive for Office... 6 Getting Set Up...6 Installing the Extended API JAR File...6
More informationMcAfee Change Control Linux Product Guide. (McAfee epolicy Orchestrator)
McAfee Change Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationLiveNX Upgrade Guide from v5.1.2 to v Windows
LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the
More informationPulse Connect Secure. Network Connect and Windows Secure Access Manager (WSAM) Error Messages. Product Release 8.1
Pulse Connect Secure Network Connect and Windows Secure Access Manager (WSAM) Error Messages Product Release 8.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved
More informationDell Client System Update Version 1.0. User s Guide
Dell Client System Update Version 1.0 User s Guide Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential
More informationThis document contains important information about the current release. We strongly recommend that you read the entire document.
Release Notes Revision A McAfee Security Management Center 5.8.3 Contents About this release Resolved issues Installation instructions Upgrade instructions System requirements Build version Compatibility
More informationMcAfee Management for Optimized Virtual Environments AntiVirus 4.5.0
Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.8 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationMcAfee MVISION Endpoint 1811 Installation Guide
McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationRevision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide
Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Android User's Guide v16.2 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationProduct Guide. McAfee Content Security Reporter 2.4.0
Product Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Endpoint Security
Release Notes September Update McAfee Endpoint Security 10.5.4 For use with epolicy Orchestrator Contents Rating Resolved issues Installation instructions Note: If the versions of 10.5.4 is prior to September
More informationInstallation Guide. McAfee Endpoint Security for Servers 5.0.0
Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationInstallation Guide Revision B. McAfee Active Response 2.2.0
Installation Guide Revision B McAfee Active Response 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationAdobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
More informationStonesoft Management Center. Release Notes Revision B
Stonesoft Management Center Release Notes 6.1.0 Revision B Table of contents 1 About this release...3 System requirements... 3 Build version...4 Compatibility... 5 2 New features...6 3 Enhancements...
More informationDevice Set-Up. User s Guide
Device Set-Up User s Guide Contents About this Product... iii Trademarks... iv 1 Getting Started 1.1 System Requirements... 1-1 1.2 Overview of Functions... 1-2 2 Software Installation 2.1 OpenAPI settings...
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS
More informationMcAfee epolicy Orchestrator Release Notes
Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product
More informationUSER GUIDE. Snow Integration Manager. Version 5.5. Release date Document date SNOWSOFTWARE.COM
USER GUIDE Product Snow Integration Manager Version 5.5 Release date 2017-09-27 Document date 2017-10-05 CONTENTS 1 Introduction... 4 1.1 Prerequisites... 4 2 Installation... 5 2.1 New installation...
More informationProduct Guide. McAfee GetSusp
Product Guide McAfee GetSusp 3.0.0.461 COPYRIGHT LICENSE INFORMATION Copyright 2013-2017 McAfee, LLC. YOUR RIGHTS TO COPY AND RUN THIS TOOL ARE DEFINED BY THE MCAFEE SOFTWARE ROYALTY-FREE LICENSE FOUND
More informationMcAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationVeritas Desktop and Laptop Option 9.2
1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.
More informationReference Guide Revision B. McAfee Cloud Workload Security 5.0.0
Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationFieldView. Management Suite
FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.5 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationAirWatch Troubleshooting Guide Revised 23 January 2018
Contents READ ME FIRST (Updated 23 January 2018)... 3 Using this guide:... 3 No resolution found... 3 Deleted/wiped database... 3 Software Requirements, Installation, and Usage... 4 Reinstalling Software...
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for ios User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationTechDirect User's Guide for ProDeploy Client Suite
TechDirect User's Guide for ProDeploy Client Suite Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates
More informationInstallation Guide Revision B. McAfee Cloud Workload Security 5.0.0
Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Application Control/ McAfee Change Control Administration
McAfee Application Control/ McAfee Change Control Administration Education Services Administration Course The McAfee University McAfee Application Application Control/McAfee Change Control Administration
More informationMcAfee Firewall Enterprise and 8.3.x
Release Notes Revision A McAfee Firewall Enterprise 8.2.1 and 8.3.x Scan Engine Update MCV02 Contents About this release Installation instructions Known issues Find product documentation About this release
More information1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017
1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017 Software Version 4.5 Document Revision 1.0 2017 Covene LLC, All Rights Reserved. Covene, the Covene
More informationSecurity Explorer 9.1. User Guide
Security Explorer 9.1 User Guide Security Explorer 9.1 User Guide Explorer 8 Installation Guide ii 2013 by Quest Software All rights reserved. This guide contains proprietary information protected by copyright.
More informationOpenText RightFax 10.5 Connector for HP OXPd MFP Administrator s Guide
OpenText RightFax 10.5 Connector for HP OXPd MFP Administrator s Guide OpenText RightFax 10.5 Connector for HP OXPd MFP Administrator s Guide ii Edition OpenText RightFax 10.5 Connector for HP OXPd MFP.
More informationKYOCERA Net Viewer User Guide
KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationGuide Installation and User Guide - Windows
Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally
More informationMEDIASEAL Encryptor Client Manual
MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.1 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationService Manager. powered by HEAT. Migration Guide for Ivanti Service Manager
Service Manager powered by HEAT Migration Guide for Ivanti Service Manager June 16, 2017 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc.
More informationPrint and Copy Vending
Print and Copy Vending Administrative Guide Print and Copy Vending is an application of Enhanced Locked Print. Read this manual carefully before you use this product and keep it handy for future reference.
More informationXDS Connector. Installation and Setup Guide. Version: 1.0.x
XDS Connector Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: November 2016 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc.,
More informationManage Your Inventory
About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 2 Display Information About Your Inventory, on page 2 Types of Devices in the DNA Center Inventory, on page 6
More informationInstalling a CoreStreet Responder
Entrust Managed Services PKI Installing a CoreStreet Responder Document issue: 1.0 Date of issue: December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationRelease Note (Mar, 2018) Content Manager Version (for Mac) [About Content Manager] [Important Notice] [Main Function of Content Manager]
Release Note (Mar, 2018) Content Manager Version 3.1.4 (for Mac) [About Content Manager] - Content Manager is a content-management system designed for the Optical Disc Archive System (ODS). [Important
More informationMcAfee MVISION Endpoint 1808 Installation Guide
McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Application Control Windows Installation Guide
McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationBLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition
BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint
More informationVector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager
Vector Issue Tracker and License Manager - Administrator s Guide Configuring and Maintaining Vector Issue Tracker and License Manager Copyright Vector Networks Limited, MetaQuest Software Inc. and NetSupport
More informationInterface reference. McAfee Policy Auditor Interface Reference Guide. Add Service Level Agreement page
McAfee Policy Auditor 6.4.0 Interface Reference Guide (McAfee epolicy Orchestrator) Interface reference Add Service Level Agreement page Use this page to add Service Level Agreements. Service Level Agreements
More informationCopyright 2017 Softerra, Ltd. All rights reserved
Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More information