McAfee. Deployment and User Guide. epo 4 / Endpoint Encryption
|
|
- Philip Hutchinson
- 6 years ago
- Views:
Transcription
1 McAfee Deployment and User Guide epo 4 / Endpoint Encryption 1
2 McAfee, Inc. McAfee, Inc Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) For more information regarding local McAfee representatives please contact your local McAfee office, or visit: COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. Attributions Refer to the product Release Notes.
3 Contents Preface... 4 About This Guide... 4 Audience... 4 Conventions... 4 Contact information... 4 epo Endpoint Encryption Deployment and Reporting... 6 Endpoint Encryption Integration to epolicy Orchestrator... 6 The Endpoint Encryption Reports... 6 Setting up Deployment and Reporting in epolicy Orchestrator... 7 Location of the files on the CD... 7 Endpoint Encryption Install Sets... 8 Summary... 8 Gather the files to prepare the Pkgcatalog.z file... 9 Edit the Pkgcatalog.xml file... 9 Create the pkgcatalog.z file using eposign.exe Create the deployment zip file and check it in Create the deployment task Running Reports Endpoint Encryption for Files and Folders Reports Endpoint Encryption for PC Adding the reports to the Dashboard... 14
4 Preface Preface About This Guide This guide provides information on configuring Endpoint Encryption deployment and reporting through the epolicy Orchestrator. Audience This information is intended primarily for network administrators who are responsible for their company s security program, and assumes the customer has used epolicy Orchestrator. Conventions This guide uses the following conventions: Bold Condensed All words from the interface, including options, menus, buttons, and dialog box names. Courier The path of a folder or program; text that represents something the user types exactly (for example, a command at the system prompt). Italic Emphasis or introduction of a new term; names of product manuals. Blue A web address (URL); a live link. Note Supplemental information; for example, an alternate method of executing the same command. Caution Important advice to protect your computer system, enterprise, software installation, or data. Contact information Download Site Product Upgrades (Valid grant number required) Security Updates (DATs, engine) HotFix and Patch Releases For Security Vulnerabilities (Available to the public) For Products (ServicePortal account and valid grant number required) Product Evaluation McAfee Beta Program Technical Support KnowledgeBase Search McAfee Technical Support ServicePortal (Logon credentials required) Customer Service Web 4
5 Preface Phone US, Canada, and Latin America toll-free: VIRUS NOor Monday Friday, 8 a.m. 8 p.m., Central Time Professional Services Enterprise Small and Medium Business 5
6 epo Endpoint Encryption Deployment and Reporting Endpoint Encryption Integration to epolicy Orchestrator Version 4 of epolicy Orchestrator allows the administrator to deploy Endpoint Encryption for Files and Folders and Endpoint Encryption for PC. It also includes the ability to report the encryption status of machines that have Endpoint Encryption installed. WARNING: The epolicy Orchestrator is not compatible with versions 4.x of Endpoint Encryption (formerly SafeBoot). The Endpoint Encryption Reports Endpoint Encryption for Files and Folders (EEFF) Version Check This report will check each machine and report on whether or not Endpoint Encryption for Files and Folders is installed. The report also displays which version is running. Endpoint Encryption for PC (EEPC) Installed Version This report will check each machine and report on whether or not Endpoint Encryption for PC is installed. The report also displays the Endpoint Encryption for PC version and whether or not the client is active (running). Summary This report checks all machines and their encryption status, e.g. is the machine fully encrypted (i.e. are all drives fully encrypted). It also displays the number of drives in an each encrypted state, e.g. full encryption, partially encrypted, in progress and not encrypted. * NOTE: The In Progress status indicates a machine that is in the process of either decrypting, or, encrypting. 6
7 Drive Check This report lists all machines that have Endpoint Encryption for PC installed including the encryption status of each drive. It also reports on machines that do not have EEPC installed by placing Unknown in the Drive and Encryption columns. Setting up Deployment and Reporting in epolicy Orchestrator This section explains how to configure deployment and reporting of Endpoint Encryption on the epolicy Orchestrator. Follow these steps whether you are deploying or reporting on either Endpoint Encryption for Files and Folders or Endpoint Encryption for PC. Location of the files on the CD The reporting configuration files The sbde5.zip and sbce3.zip files contain the report configuration for Endpoint Encryption for PC (sbde5) and Endpoint Encryption for Files and Folders (sbce3) respectively. They are located on the CD at the following locations: EPO\Endpoint Encryption for Files and Folders\EPO4\Sbce3.zip EPO\Endpoint Encryption for PC\EPO4\Sbde5.zip Installing the extensions To run the Endpoint Encryption reports you must first install the extensions (the reporting zip files). 1. From the epolicy Orchestrator Console, click the Configuration button. 2. Click the Extensions button on the toolbar. 3. Click the Install Extension option at the bottom left of the console. 4. Click the Browse button and locate the zip file. 5. Select the file and click Open. 6. Click the Ok button to install the extension. Files required to build the pkgcatalog.z file The paths below contain the files on the CD required to build the pkgcatalog.z file. 7
8 Endpoint Encryption for Files and Folders Files Use these files to configure deployment and reporting for Endpoint Encryption for Files and Folders: \epo\endpoint Encryption for Files and Folders\Package folder contains the ce-detect.mcs, the pkgcatalog.xml and the eposign.exe files. Endpoint Encryption for PC Files Use these files to configure deployment and reporting for Endpoint Encryption for PC: \epo\endpoint Encryption for PC\Package folder contains the dedetect.mcs, the pkgcatalog.xml and the eposign.exe files. Endpoint Encryption Install Sets Before completing your Endpoint Encryption install set you must ensure that the Perform installation silently and Automatically restart machine options are checked. If they are not then the install to the client machine will fail. See the Create Installation Set screenshot below. Figure 1 The Endpoint Encryption Create Installation Set screenshot Summary 1. Ensure the report configuration files have been installed. 2. Prepare the Endpoint Encryption install set. 3. Gather the files to prepare the pkgcatalog.z file. 4. Edit the pkgcatalog.xml file. 5. Create the pkgcatalog.z file using eposign.exe. 6. Create the deployment zip file and check it in. 8
9 7. Verify the Endpoint Encryption deployment zip file has been checked in. 8. Create the deployment task. Gather the files to prepare the Pkgcatalog.z file Follow these steps to consolidate the necessary files into the epolicy Orchestrator deployment format. You will require the following files: Eposign.exe pkgcatalog.xml Detection scripts (ce-detect.mcs - Endpoint Encryption for Files and Folders or de-detect.mcs Endpoint Encryption for PC) Endpoint Encryption Install set, e.g. SBDE.exe (Filename determined by Administrator) 1. Create the install set from the Endpoint Encryption Manager. Refer to the Endpoint Encryption for Files and Folders Administration Guide or the Endpoint Encryption for PC Administration Guide for further details. 2. Create a folder on the server c:\ drive and call it Deployment. The Deployment folder becomes a working directory and contains subsequent Endpoint Encryption packages that you create. You may create this directory in a location of your choice and name it as you wish. This guide uses the example of the c:\deployment. NOTE: Each package created should be unique and must not overwrite the existing version. The Deployment folder should therefore contain a uniquely named sub folder for each package, e.g. 0001, 0002, Package1 or Package2, etc. The example used here is Copy the eposign.exe file from the CD, to the Deployment folder on the c:\ drive. 4. Create a new subfolder within the Deployment folder, e.g Copy the pkgcatalog.xml and detection scripts from the CD, to the Deployment subfolder, e.g. \Deployment\ Copy the Endpoint Encryption install set to the \Deployment\0001 subfolder. Edit the Pkgcatalog.xml file Follow these steps to edit the pkgcatalog.xml file: NOTE: You must add the unique code to the <ProductID> </ProductID> line in the file. In this example, it is 0001; however, you could name it anything within the four character limit. See the Endpoint Encryption for Files and Folders pkgcatalog.xml example below. 9
10 Finally, keep the product names <ProductName> </ProductName> in the XML file a minimal length. If they are too long they will push out the tables in the epolicy Orchestrator. See the example below, highlighted in yellow. You must also ensure you edit the <InstallCommand> </InstallCommand> line with the correct Endpoint Encryption install filename and include the /silent command. See the example below, highlighted in yellow. - <PkgCatalog> - <ProductPackage> <ProductID>SBCE </ProductID> <ProductName>EEFF</ProductName> <ProductDescription>0</ProductDescription> - <ProductDetection> - <DetectionScript> <Name>ce-detect.mcs</Name> </DetectionScript> <ProductVersion>3.0.0</ProductVersion> <PlatformID>WNTW:4:0:4 WNTS W2KW W2KS WXPHE WXPW WXPS WVST</PlatformID> </ProductDetection> <ConflictSoftwareList /> - <LangPackage> <Priority>1</Priority> <PackageType>Install</PackageType> <LangID>0000</LangID> <InstallType>command</InstallType> <InstallCommand>SbCe.exe /silent</installcommand> <MaxReboot>1</MaxReboot> <RebootReturnCode>0</RebootReturnCode> </LangPackage> - <Translation> <TranslationID /> - <TranslationItem> <LangID /> <TranslationString /> </TranslationItem> </Translation> </ProductPackage> </PkgCatalog> 1. Open the pkgcatalog.xml in the c:\deployment\0001 file using Notepad. 2. Edit the Product ID and add the unique number to the name, for example, if the product ID is <ProductID>SBCE 3000</ProductID> then change this to include the unique number for the package, for example, <ProductID>SBCE </ProductID>. Follow these steps with a new four-character code each time you create a package. This ensures that all future packages are unique. WARNING: You must not change the Product ID other than add the four character unique ID at the end, otherwise, reporting will fail. See the example above. 10
11 3. Edit the <InstallCommand> </InstallCommand> line with the file name of the Endpoint Encryption install set and include the /silent command, otherwise the install will fail. NOTE: you can also edit the product name from Endpoint Encryption for Files and Folders to EEFF for Sales depending on who the deployment is targeted at, for example. This name will appear on the epolicy Orchestrator and will help identify the deployment package. 4. Save the pkgcatalog.xml file. Create the pkgcatalog.z file using eposign.exe Follow these steps to create the epolicy Orchestrator deployment format, i.e. the pkgcatalog.z file. You must run this command from a Command prompt. 1. Click on the Start option followed by Run. 2. Enter Cmd in the Open dialog box and click the Ok button. 3. Type cd \deployment at the command prompt. 4. From the c:\deployment directory enter the following Eposign command: eposign c:\deployment\0001\pkgcatalog.xml.mcs /a 5. This will take the files from the c:\deployment\0001 folder and roll them into the pkgcatalog.z file. Create the deployment zip file and check it in The deployment zip file contains the detection scripts, the pkgcatalog.xml, the Endpoint Encryption install file and the pkgcatalog.z file. 1. Create a zip file from the detection scripts, the pkgcatalog.xml, the Endpoint Encryption install file and the pkgcatalog.z file stored in the c:\deployment\0001 folder. 2. From the epolicy Orchestrator Console, click the Software button. 3. Click the Check In Package button. 4. Click the Browse button and locate the deployment zip file created at step Select the zip file and click the Open button. 6. Click the Next button. 7. Click the Save button to save check in the zip file. 11
12 Check the Endpoint Encryption files has been checked in Follow these steps to verify the Endpoint Encryption file appears in the epo Repository. 1. From the epolicy Orchestrator Console click on the Software button. This will display the contents of the master repository. 2. Scroll down the list to verify the Endpoint Encryption file is there. Create the deployment task 1. From the epolicy Orchestrator Console, click the Systems button. 2. Click the Client Tasks option. 3. Click New Task. This will start the Client Task Builder screen. 4. Enter a name and description (optional) for the task. 5. Select the Product Deployment (McAfee Agent) as the Type. 6. Click Next to continue. 7. From the Configuration window select the target platform and product to be deployed. 8. Click Next to continue. 9. Set your required schedule options for this deployment. 10. Ensure the Enable option is checked. NOTE: this task will run at the next agent server communication for the relevant agents. If you wish to run the task sooner, then click the Schedule type and select Run immediately. WARNING: To complete the installation, all Endpoint Encryption products require a reboot when deployed. If CE and DE are deployed simultaneously, when one product reboots, the CMA may forget what it was doing; this will result in the second product not being deployed until the deployment task runs again. Therefore, all deployment tasks involving Endpoint Encryption products should be set to run on a regular basis. 11. Click the Next button to continue. 12. Click the Save button to save this deployment task or choose the Back button to change the Schedule, Configuration or Description. 12
13 Running Reports epo Endpoint Encryption Deployment and Reporting Endpoint Encryption for Files and Folders Reports Installed Version This report will check each machine and report on whether or not Endpoint Encryption for Files and Folders is installed. It also displays which version is running. 1. Click the Reporting button from the main toolbar. 2. Click EEFF Installed Version from the left hand Queries menu. 3. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report. Endpoint Encryption for PC Installed Version This report will check each machine and report on whether or not Endpoint Encryption for PC is installed. It also displays the Endpoint Encryption for PC version and whether (or not) the client is active (running). 1. Click the Reporting button from the main toolbar. 2. Click EEPC Installed Version from the left hand Queries menu. 3. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report Summary This report checks all machines and their encryption status, e.g. is the machine fully encrypted (i.e. are all drives fully encrypted). It also displays the number of drives in an each encrypted state, e.g. full encryption, partially encrypted, in progress* and not encrypted. * NOTE: The In Progress status indicates a machine that is in the process of either decrypting, or, encrypting. 1. Click the Reporting button from the main toolbar. 2. Click EEPC Install Summary from the left hand Queries menu. 3. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report. 13
14 Drive Check This report lists all machines that have Endpoint Encryption for PC installed including the encryption status of each drive. It also reports on machines that do not have DE installed by placing Unknown in the Drive and Encryption columns. 1. Click the Reporting button from the main toolbar. 2. Click EEPC Drive Check from the left hand Queries menu. 3. Click the Run button. The report will appear as a pie chart. Click on the pie chart to view the detail of this report. Adding the reports to the Dashboard Version 4.0 of epolicy Orchestrator allows the administrator to report on the status of Endpoint Encryption for Files and Folders and Endpoint Encryption for PC. These admin reports can be made accessible from the Dashboard option. Note: You must have installed the reporting extensions to complete this procedure. See Installing the extensions. Add them as buttons on the Dashboard toolbar: 1. Select the Dashboard option. 2. Click the Options drop down button. 3. Select the Manage Dashboards option. 4. Click the report from the My Dashboards left hand column, e.g. Endpoint Encryption for Files and Folders or Endpoint Encryption for PC. 5. Click the Make Active button (bottom right). This will add the report to the Dashboard toolbar. 14
15 Figure 2 The Dashboard with Endpoint Encryption Reports for PC WARNING: The epolicy Orchestrator is not compatible with versions 4.x of Endpoint Encryption (formerly SafeBoot). 15
McAfee SiteAdvisor Enterprise 3.5.0
Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationRelease Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved
Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix 904321 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ==========================================================
More informationRelease Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved
Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ========================================================== Release date:
More informationInstallation Guide. McAfee Web Gateway. for Riverbed Services Platform
Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationFirewall Enterprise epolicy Orchestrator
Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationRelease Notes - McAfee Deep Defender 1.0
Release Notes - McAfee Deep Defender 1.0 About this document About this release Features Known issues Documentation Before installing McAfee Deep Defender 1.0 Installing McAfee Deep Defender 1.0 About
More informationTotal Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More information========================================================== Release date: December 03, This release was developed and tested with:
Release Notes for McAfee(R) Security (TM) for Lotus Domino, version 7.5 on Microsoft Windows. Rollup1 Copyright (C) 2012 McAfee, Inc. All Rights Reserved ==========================================================
More informationProduct Guide. McAfee Plugins for Microsoft Threat Management Gateway Software
Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationRelease Notes for McAfee(R) VirusScan Enterprise for Linux Version Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved
Release Notes for McAfee(R) VirusScan Enterprise for Linux Version 1.9.0 Hotfix 872066 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ============================================================ Release
More informationMcAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide
McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide COPYRIGHT Copyright 009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Rogue Database Detection For use with epolicy Orchestrator Software
McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationMcAfee Change Control Using Change Reconciliation and Ticket-based Enforcement
6.0.0 Using Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee epolicy Orchestrator 4.5 Reporting Guide
McAfee epolicy Orchestrator 4.5 Reporting Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMigration Guide. McAfee File and Removable Media Protection 5.0.0
Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationInstallation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform
Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform version 7.0.1.02 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be
More informationMcAfee Data Protection for Cloud 1.0.1
Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Cloud Identity Manager
Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Boot Attestation Service 3.5.0
Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationBoot Attestation Service 3.0.0
Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Cloud Identity Manager
IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Cloud Identity Manager
BoxNet Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Host Intrusion Prevention 8.0
Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,
More informationMcAfee MVISION Endpoint 1808 Installation Guide
McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Cloud Identity Manager
WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationInstallation Guide. McAfee epolicy Orchestrator software D R A F T
Installation Guide McAfee epolicy Orchestrator 4.6.0 software COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee Cloud Identity Manager
Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Cloud Identity Manager
Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Change Control and McAfee Application Control 8.0.0
Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are
More informationBest Practices Guide. Amazon OpsWorks and Data Center Connector for AWS
Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active
More informationMcAfee Solidcore Platform Support Matrix Version (Nov 16, 2011)
McAfee Solidcore Platform Support Matrix Version 5.1.2 (Nov 16, 2011) COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee File and Removable Media Protection 6.0.0
Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the
More informationMcAfee Endpoint Security
Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the
More informationMcAfee MVISION Endpoint 1811 Installation Guide
McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Management for Optimized Virtual Environments AntiVirus 4.5.0
Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel
More informationMcAfee Cloud Identity Manager
EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee epo Deep Command 1.0.0
Product Guide McAfee epo Deep Command 1.0.0 For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Cloud Identity Manager
Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Cloud Identity Manager
Provisioning SDK Guide McAfee Cloud Identity Manager version 3.5 COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.5.0
Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Change Control and McAfee Application Control 6.1.4
Installation Guide McAfee Change Control and McAfee Application Control 6.1.4 For use with epolicy Orchestrator 4.6.0-5.1.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.
More informationMcAfee Client Proxy Installation Guide
McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,
More informationMcAfee epolicy Orchestrator Software
User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationData Loss Prevention Discover 11.0
Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Cloud Identity Manager
Jive Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Endpoint Security Threat Prevention Installation Guide - macos
McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee File and Removable Media Protection Installation Guide
McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationInstallation Guide. McAfee Web Gateway Cloud Service
Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Desktop Firewall
McAfee Desktop Firewall Installation Guide Revision 1.0 version 8.0 COPYRIGHT 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationInstallation Guide. McAfee Endpoint Security for Servers 5.0.0
Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)
McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Agent 4.5 Product Guide
McAfee Agent 4.5 Product Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationMcAfee Endpoint Security Threat Prevention Installation Guide - Linux
McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationAddendum. McAfee Virtual Advanced Threat Defense
Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or
More informationMcAfee Management of Native Encryption 3.0.0
Product Guide McAfee Management of Native Encryption 3.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Content Security Reporter 2.6.x Migration Guide
McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMigration Guide. McAfee Content Security Reporter 2.4.0
Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationProduct Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6
Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Application Control Windows Installation Guide
McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationCONFIGURATION GUIDE. VirusScan Enterprise VERSION 7.0. For use with epolicy Orchestrator versions 2.5 and 2.5.1
CONFIGURATION GUIDE VirusScan Enterprise VERSION 7.0 For use with epolicy Orchestrator versions 2.5 and 2.5.1 COPYRIGHT 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication
More informationMcAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide
McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)
McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationArchiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides
Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks
More informationInstallation Guide Revision B. McAfee Cloud Workload Security 5.0.0
Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationReference Guide Revision B. McAfee Cloud Workload Security 5.0.0
Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Policy Auditor 6.2.2
Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationMcAfee epolicy Orchestrator 5.9.1
Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright
More informationMcAfee Investigator Product Guide
McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationMcAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS
More informationMcAfee Endpoint Upgrade Assistant 2.3.x Product Guide
McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Client Proxy Product Guide
McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationMcAfee Network Security Platform 8.3
Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)
McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationReference Guide. McAfee Security for Microsoft Exchange 8.6.0
Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationProduct Guide. McAfee SiteAdvisor Enterprise 3.5 Patch2
Product Guide McAfee SiteAdvisor Enterprise 3.5 Patch2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee MVISION Mobile epo Extension Product Guide
McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Content Security Reporter 2.6.x Installation Guide
McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationProduct Guide Revision A. McAfee Client Proxy 2.3.2
Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide
McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee Network Security Platform 8.1
Revision M McAfee Network Security Platform 8.1 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee VirusScan and McAfee epolicy Orchestrator Administration Course
McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration
More informationMcAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee MER for EPO 3.1 Walkthrough Guide. About this guide This guide provides information on how to use McAfee MER for EPO 3.1.
McAfee MER for EPO 3.1 Walkthrough Guide About this guide This guide provides information on how to use McAfee MER for EPO 3.1. 2 1. Scope: The MER for epo tool runs MER (Minimum Escalations Requirements)
More informationProduct Guide Revision A. Endpoint Intelligence Agent 2.2.0
Product Guide Revision A Endpoint Intelligence Agent 2.2.0 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationResolution: The DataChannel servlet no longer stops working, regardless of the state of the DataChannel extension.
Hotfix version 1 Build 4.5.3.1026 McAfee epolicy Orchestrator 4.5 This document is a supplement to the McAfee epolicy Orchestrator 4.5 Patch 3 Release Notes in the release package, and details fixes included
More informationMcAfee Performance Optimizer 2.1.0
Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Application Control Windows Installation Guide. (Unmanaged)
McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active
More informationProduct Guide. McAfee Performance Optimizer 2.2.0
Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationCloud Workload Discovery 4.5.1
Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More information