McAfee Endpoint Security for Servers Product Guide

Size: px
Start display at page:

Download "McAfee Endpoint Security for Servers Product Guide"

Transcription

1 McAfee Endpoint Security for Servers Product Guide

2 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone, McAfee LiveSafe, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, True Key, TrustedSource, VirusScan are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Endpoint Security for Servers Product Guide

3 Contents 1 Product overview 5 Overview Key features How it works What is smart scheduling? 9 How smart scheduling works Components of McAfee Endpoint Security for Servers How is CPU load calculated? About threshold value of Auto Scaling Group and Virtual Machine Scale Set The role of McAfee Agent The role of Cloud Workload Security Examples of smart scheduling Endpoint Security for Servers vs. Endpoint Security Threat Prevention Configure smart scheduling settings 15 Add scan task to the Smart Scheduler task list Configure the Smart Scheduler time slot Assign the on-demand scan client task Best practices for improved performance Best practices for configuring Smart Scheduler Catalog list Best practices for configuring Smart Scheduler time slot Best practices for configuring CPU threshold value Best practices for configuring scheduling intervals Best practice for monitoring CPU load in AWS environment Frequently asked questions 19 McAfee Endpoint Security for Servers Product Guide 3

4 Contents 4 McAfee Endpoint Security for Servers Product Guide

5 1 Product 1 overview Contents Overview Key features How it works Overview McAfee Endpoint Security for Servers is a software that monitors and controls the CPU load of the cloud platform. It works with McAfee Endpoint Security Threat Prevention (Windows and Linux) to minimize the performance impact of resource-intensive tasks like on-demand scan. Endpoint Security for Servers schedules resource-intensive tasks depending on the CPU load of the cloud platform, then protects your environment based on the settings you configure. Resource-intensive tasks are scheduled so that at any time, the CPU load does not significantly exceed the specified threshold limit. Endpoint Security for Servers reduces management overhead by allowing you to use the same on-demand scan task across virtual systems. You can use McAfee epolicy Orchestrator (McAfee epo ) to configure, manage, and enforce your policies. Once configured, you can use queries and dashboards to track the activities and threat detections. Key features Endpoint Security for Servers minimizes the performance impact of on-demand scans on the virtual environment through Smart Scheduler. Smart Scheduler The Smart Scheduler schedules the tasks in an intelligent way such that the CPU Utilization value of the cloud platform is maintained below the threshold value, which is defined in the Smart Scheduler page. The scheduling of tasks in an intelligent way enables Endpoint Security for Servers to minimize the performance impact on the virtual environment. As part of this feature, scheduling is provided by McAfee Agent, and CPU Utilization of the cloud platform is monitored by McAfee Cloud Workload Security. As part of McAfee Agent Smart Scheduler Extension and above, two new UI pages (Smart Scheduler Catalog and Smart Scheduler) are introduced in McAfee epo where you can add resource-intensive tasks and a time slot for smart scheduling. McAfee Endpoint Security for Servers Product Guide 5

6 1 Product overview How it works How it works When you add tasks to the task list in the smart scheduling interface, Smart Scheduler sends information about the selected tasks to the agent. When an on-demand scan task is created and the Smart Scheduler settings are configured for the task: 1 Smart Scheduler instructs the agent to disable regular scheduling and enable smart scheduling for the on-demand scan task. 2 During the smart scheduling time slot, Smart Scheduler asks Cloud Workload Security for the CPU Utilization value of the cloud platform. Cloud Workload Security then sends the CPU Utilization value of the cloud platform to the Smart Scheduler from the database. The threshold value for Auto Scaling Group and Virtual Machine Scale Set is defined in Amazon Web Services (AWS) and Microsoft Azure environment respectively. If the threshold value for scale-out in the auto scaling policy is not defined in the AWS or Microsoft Azure environment, then the threshold value defined in McAfee epo Smart Scheduler page is considered. For more information on threshold values of Auto Scaling Group and Virtual Machine Scale Set, refer to About threshold value of Auto Scaling Group and Virtual Machine Scale Set on page Based on the difference in the configured threshold value and the current CPU Utilization value of the cloud platform, Smart Scheduler decides the number of systems that can run the on-demand scan within the configured threshold. 4 During the allocated time, Smart Scheduler gets the CPU Utilization value of the cloud platform every minute from Cloud Workload Security. Smart Scheduler then makes sure that the CPU Utilization value of the cloud platform is under the threshold value before instructing the agent to trigger the on-demand scans. 6 McAfee Endpoint Security for Servers Product Guide

7 Product overview How it works 1 5 When the CPU Utilization value of the cloud platform meets or exceeds the threshold, Smart Scheduler waits until the load decreases, then instructs the agent to trigger on-demand scans. 6 At the end of the time slot assigned for smart scheduling, if any systems were not scanned, they have priority during the next smart scheduling time slot (daily, weekly, or monthly, as configured). Best practice: Configure the time slot with enough time to run the on-demand scan on all your virtual machines. Otherwise, the scanning might be postponed for some VMs. McAfee Endpoint Security for Servers Product Guide 7

8 1 Product overview How it works 8 McAfee Endpoint Security for Servers Product Guide

9 2 What 2 is smart scheduling? Smart Scheduler runs resource-intensive client tasks based on the priority and availability of resources on the cloud platform. The cloud platform can be overloaded when resource-intensive tasks run on all virtual machines at the same time. This can cause the cloud platform to crash and all of its virtual machines to become unresponsive. When the feature is configured, resource-intensive tasks are scheduled so that the CPU Utilization of the cloud platform does not significantly exceed the specified threshold limit. Contents How smart scheduling works Components of McAfee Endpoint Security for Servers How is CPU load calculated? About threshold value of Auto Scaling Group and Virtual Machine Scale Set The role of McAfee Agent The role of Cloud Workload Security Examples of smart scheduling Endpoint Security for Servers vs. Endpoint Security Threat Prevention How smart scheduling works When you add tasks to the task list in the smart scheduling interface, Smart Scheduler sends information about the selected tasks to the agent. Smart Scheduler Allows you to configure the Smart Scheduler time slot on a day-to-day and time-to-time basis for the client tasks that are qualified for smart scheduling. Smart Scheduler Catalog Lists the number of client tasks that an administrator created and allows you to add tasks for smart scheduling. Smart Scheduler client service (McAfee Agent service) Gets the request from Smart Scheduler and executes the smart scheduling tasks. Components of McAfee Endpoint Security for Servers Each component performs specific functions to keep your environment protected. epolicy Orchestrator A management platform that communicates with the agent, manages the Endpoint Security Threat Prevention and Endpoint Security for Servers configuration, and reports on malware discovered in your virtual environment. Hypervisor A virtual operating platform that runs multiple guest operating systems concurrently on a hosted system and manages the execution of those guest operating systems. McAfee Endpoint Security for Servers Product Guide 9

10 2 What is smart scheduling? How is CPU load calculated? McAfee Agent A client-side component that communicates with McAfee epo and applies policies to each VM. Endpoint Security Threat Prevention Software that checks for viruses, spyware, unwanted programs, and other threats by scanning items automatically when users access them or on demand at any time. Cloud Workload Security Data center security software that helps you discover, import, manage, and secure your VMware vcenter virtual infrastructure using McAfee epo. VMware vcenter Console that manages the ESXi servers, which host the guest VMs that require protection. Smart Scheduler Service that enables resource-intensive tasks to run based on the priority and availability of the resources on the hypervisor. Auto Scaling Group Comprises of EC2 instances that serve as a logical partitioning of Amazon Web Services cloud platform for numerous purposes such as instance scaling and management. Virtual Machine Scale Set Comprises of identical and load balanced virtual machines that provide high availability to the applications hosted in Microsoft Azure. Citrix XenServer A hypervisor developed by Citrix Systems, to create and manage virtualized server infrastructure. Microsoft Hyper-V Server A hypervisor developed by Microsoft Corporation, that can run virtual machines System Central Virtual Machine Manager (SCVMM) A management tool, developed by Microsoft to efficiently manage Microsoft Hyper-V. It has two components, SCVMM server and SCVMM console, that you would require to register a Microsoft Hyper-V cloud account. How is CPU load calculated? You can schedule resource-intensive tasks while maintaining the CPU Utilization value below the threshold value only when the CPU Utilization value of the cloud platform is calculated before triggering any task. During the allocated time, Smart Scheduler gets the CPU Utilization value of the cloud platform every minute from Cloud Workload Security. If the threshold value for Auto Scaling Group and Virtual Machine Scale Sets is not defined in the AWS or Microsoft Azure environment, then the threshold value defined in McAfee epo Smart Scheduler page is consumed. For more information, refer to About threshold value of Auto Scaling Group and Virtual Machine Scale Set on page 11. Based on the difference in the configured threshold value and the current CPU Utilization value of the cloud platform, the Smart Scheduler decides the number of systems that can run the resource-intensive tasks within the configured threshold. 10 McAfee Endpoint Security for Servers Product Guide

11 What is smart scheduling? About threshold value of Auto Scaling Group and Virtual Machine Scale Set 2 About threshold value of Auto Scaling Group and Virtual Machine Scale Set For Auto Scaling Groups and Virtual Machine Scale Sets, the Cloud Workload Security consumes the threshold value defined in the Amazon Web Services and Microsoft Azure environment. Amazon Web Services In Amazon Web Services (AWS) environment, each Auto Scaling Group has a different threshold value and the AWS administrator the threshold value. The Cloud Workload Security provides the CPU Utilization and the threshold value of the Auto Scaling Group to the Smart Scheduler. The values received from the Cloud Workload Security allow the Smart Scheduler to decide the number of instances that can run the on-demand scan while maintaining the CPU Utilization value below the threshold value. If the threshold value for Auto Scaling Group is not defined in the AWS environment, then the threshold value defined in the McAfee epo Smart Scheduler page is consumed. Microsoft Azure In Microsoft Azure environment, each Virtual Machine Scale Set has a different threshold value and the Azure administrator defines the threshold value. The Cloud Workload Security provides the CPU Utilization and the threshold value of each Virtual Machine Scale Set to the Smart Scheduler. The values received from the Cloud Workload Security allow the Smart Scheduler to decide the number of instances that can run the on-demand scan while maintaining the CPU Utilization value below the threshold value. In Microsoft Azure, you can configure multiple profiles with different threshold value defined in each policy. The Cloud Workload Security considers the highest threshold value among all the profiles configured for the Virtual Machine Scale Set. If the threshold value for Virtual Machine Scale Set is not defined in the Microsoft Azure environment, then the threshold value defined in the McAfee epo Smart Scheduler page is consumed. The role of McAfee Agent The agent triggers the resource-intensive tasks on the request from Smart Scheduler. It performs these actions: Gets the information about tasks that are enabled for smart scheduling. Disables the regular schedule of the task and enables smart scheduling for the task. Runs the task on the request from Smart Scheduler. Updates the status of the task to Smart Scheduler. The role of Cloud Workload Security Cloud Workload Security sends critical information to Smart Scheduler at every sync of the registered cloud account, which enables Smart Scheduler to make intelligent decisions. Cloud Workload Security sends this information to Smart Scheduler: The list of VMs or instances that are available in the registered cloud account Updates on addition or removal of VMs or instances McAfee Endpoint Security for Servers Product Guide 11

12 2 What is smart scheduling? Examples of smart scheduling The CPU load of the cloud platform in percentage (maximum load value that was reported in the last minute) Power status of the VMs or instances Cloud Workload Security calculates the CPU utilization value and retrieves the threshold value of the Auto Scale Group and Virtual Machine Scale Set from the Amazon Web Services and Microsoft Azure cloud platform every minute. These values are stored in the database. Examples of smart scheduling Typical scenarios where smart scheduling is used describe how smart scheduling functions. Scenario 1 The number of managed client systems on the hypervisor is 100. An on-demand scan task is assigned to these 100 client systems and is added to the Smart Scheduler Catalog. The Smart Scheduler time slot is configured for the on-demand scan to run between 12:00 a.m. and 3:00 a.m. everyday. On the Schedule page, Schedule type for the on-demand scan task is configured as Daily. Specify threshold value for the hypervisors % is set as 80. Every day at 12:00 a.m., if the CPU Utilization value of the hypervisor is below 80 percent, the on-demand scan task is triggered on a few client systems, depending on the availability of the hypervisor resources. The CPU Utilization value of the hypervisor is calculated every minute and Smart Scheduler triggers the on-demand scan task until the CPU Utilization of the hypervisor reaches 80 percent. Smart Scheduler then waits until the load goes down. In this manner, Smart Scheduler makes sure that the CPU Utilization value of the hypervisor does not significantly exceed the specified threshold value. At 3:00 a.m., if the on-demand scan is completed on only 90 systems, the 10 unscanned systems have priority to run the on-demand scan at the next smart scheduling time slot. Scenario 2 The number of managed client systems on the hypervisor is 1,000. An on-demand scan task is assigned to these 1,000 client systems and is added to the Smart Scheduler Catalog. The Smart Scheduler time slot is configured for the on-demand scan to run between 12:00 a.m. and 3:00 a.m. every Sunday. On the Schedule page, Schedule type for the on-demand scan task is configured as Weekly. Specify threshold value for the hypervisors % is set as 80. Every Sunday at 12:00 a.m., if the CPU Utilization value of the hypervisor is below 80 percent, the on-demand scan task is triggered on a few client systems, depending on the availability of the hypervisor resources. The CPU Utilization value of the hypervisor is calculated every minute and Smart Scheduler triggers the on-demand scan task until the CPU Utilization of the hypervisor reaches 80 percent. Smart Scheduler then waits until the load goes down. 12 McAfee Endpoint Security for Servers Product Guide

13 What is smart scheduling? Endpoint Security for Servers vs. Endpoint Security Threat Prevention 2 In this manner, Smart Scheduler makes sure that the CPU Utilization value of the hypervisor does not significantly exceed the specified threshold value. At 3:00 a.m., if the on-demand scan is completed on only 900 systems, the 100 unscanned systems have priority to run the on-demand scan at the next smart scheduling time slot. Scenario 3 The number of managed client systems on the cloud platforms such as Amazon Web Services or Microsoft Azure is 1,000. An on-demand scan task is assigned to these 1,000 client systems and is added to the Smart Scheduler Catalog. The Smart Scheduler time slot is configured for the on-demand scan to run between 12:00 a.m. and 3:00 a.m. every Sunday. On the Schedule page, Schedule type for the on-demand scan task is configured as Weekly. The threshold value for the Auto Scaling Group or Virtual Machine Scale Set is defined in the Amazon Web Services or Microsoft Azure environment. If an auto scaling policy is not defined, then the threshold value defined in McAfee epo Smart Scheduler page is consumed. Every Sunday at 12:00 a.m., if the CPU Utilization value of the cloud platform is below the threshold value, which is configured in the AWS or Microsoft Azure environment, the on-demand scan task is triggered on a few client systems, depending on the availability of the instances in the Auto Scaling Group or virtual machines in the Virtual Machine Scale Set. The CPU Utilization value of the cloud platform is calculated every minute and the Smart Scheduler triggers the on-demand scan task until the CPU Utilization of the cloud platform reaches the threshold value defined in the AWS or Microsoft Azure environment. Smart Scheduler then waits until the load goes down. In this manner, Smart Scheduler makes sure that the CPU Utilization value of the cloud platform does not significantly exceed the specified threshold value. At 3:00 a.m., if the on-demand scan is completed on only 900 systems, the 100 unscanned systems have priority to run the on-demand scan at the next smart scheduling time slot. Endpoint Security for Servers vs. Endpoint Security Threat Prevention Endpoint Security for Servers works with Endpoint Security Threat Prevention to minimize the performance impact of resource-intensive tasks. Here is the difference between Endpoint Security for Servers and Endpoint Security Threat Prevention. Endpoint Security for Servers When Smart Scheduler is configured for resource-intensive tasks, it checks the CPU Utilization value of the cloud platform before the task is triggered on virtual machines. Later, it schedules the client tasks so that the CPU Utilization value of the cloud platform does not significantly exceed the specified threshold limit. In this way, the CPU Utilization value of the cloud platform is controlled. Endpoint Security Threat Prevention When resource-intensive tasks are scheduled on virtual machines, the agent triggers the tasks on all client systems at the specified time period. It does not check the load on the cloud platform to prevent overloading. In AWS and Microsoft Azure environments, new instances or virtual machines are created automatically when the CPU load increases beyond the threshold value. McAfee Endpoint Security for Servers Product Guide 13

14 2 What is smart scheduling? Endpoint Security for Servers vs. Endpoint Security Threat Prevention 14 McAfee Endpoint Security for Servers Product Guide

15 3 Configure 3 smart scheduling settings Contents Add scan task to the Smart Scheduler task list Configure the Smart Scheduler time slot Assign the on-demand scan client task Best practices for improved performance Add scan task to the Smart Scheduler task list Configure your on-demand scan task on the Smart Scheduler Catalog page, so that it is added to the Smart Scheduler task list for smart scheduling. Before you begin The Smart Scheduler extension is installed on the McAfee epo server. An on-demand scan task is created on the McAfee epo server. Task 1 Log on to McAfee epo as an administrator. 2 Select Menu Policy Smart Scheduler Catalog, select Endpoint Security Threat Prevention from the Products drop-down list, then select a scan task from the Task Type drop-down list. 3 Select an on-demand scan task to add it to the Smart Scheduler task list. 4 From Actions, select Save. The selected task is added to the Smart Scheduler task list. Configure the Smart Scheduler time slot Set your Smart Scheduler time slot on a day-to-day and time-to-time basis, so that the resource-intensive tasks are scheduled according to the Smart Scheduler time slot. Before you begin The Smart Scheduler extension is installed on the McAfee epo server. McAfee Endpoint Security for Servers Product Guide 15

16 3 Configure smart scheduling settings Assign the on-demand scan client task Task 1 Log on to McAfee epo as an administrator. 2 Select Menu Configuration Smart Scheduler. 3 Select a day and time to run Smart Scheduler. Smart Scheduler always considers the local system time for scheduling the tasks and not the McAfee epo server time. 4 Next to Specify the CPU threshold value for hypervisor %, configure the CPU threshold value for smart scheduling. The default value is 80 percent. The threshold value is inversely proportional to the time required to execute the tasks. The higher the threshold value, the quicker the tasks complete. This value is considered by default for VMware virtual environment. In Amazon Web Services and Microsoft Azure environment, this value is considered only when no auto scaling policy is configured for the Auto Scaling Group and Virtual Machine Scale Set. Assign the on-demand scan client task To enable smart scheduling for the task, you must assign the on-demand scan task to your virtual machines. Before you begin The McAfee Agent and Endpoint Security Threat Prevention are installed on the target virtual system. The Smart Scheduler settings for the task have been configured. Task 1 Log on to McAfee epo as an administrator. 2 Select Menu Policy Client Task Assignments, then click the Assigned Client Tasks tab. 3 From System Tree, select a group, then click Actions New Client Task Assignment. 4 Configure these settings, then click Next. Product Select Endpoint Security Threat Prevention. Task Type Select Custom On-demand Scan or Policy Based On-Demand Scan. Task Name If you selected Custom On-demand Scan, select the name of the task you used when you created the on-demand scan client task. If you selected Policy Based On-Demand Scan, select On-Demand Scan - Full Scan or On-Demand Scan - Quick Scan. 5 On the Schedule tab, specify the schedule for running the client task (Schedule type, Effective period, and Start time), then click Next. 16 McAfee Endpoint Security for Servers Product Guide

17 Configure smart scheduling settings Best practices for improved performance 3 Under Schedule type, select Daily, Weekly, or Monthly: Daily Define the interval Every Days. Weekly Define the interval Every weeks. Monthly Select the months. Depending on the number of months you select, the task is triggered on all VMs those many times in a year. Smart Scheduler might not run the task only during the selected months. For example, if you select January and March, the Smart Scheduler makes sure that the task is triggered twice in a year on all VMs. But it does not guarantee that the task is triggered only in January and March. Best practice: Configure schedule type as Daily or Weekly for best results. 6 Review the settings on the Summary tab, then click Save to assign the task. 7 To assign the task immediately, send an agent wake-up call to the client systems. The on-demand scan client task is assigned to systems in the selected group in the System Tree. Best practices for improved performance Contents Best practices for configuring Smart Scheduler Catalog list Best practices for configuring Smart Scheduler time slot Best practices for configuring CPU threshold value Best practices for configuring scheduling intervals Best practice for monitoring CPU load in AWS environment Best practices for configuring Smart Scheduler Catalog list Improve the performance of your enterprise systems once the Smart Scheduler Catalog list is configured. When adding an on-demand scan task to the Smart Scheduler Catalog list, add only one on-demand scan task for a group of VMs, so that no multiple scans are running on the VMs at the same time. Best practices for configuring Smart Scheduler time slot Improve the performance of your enterprise systems once the Smart Scheduler time slot is configured. When configuring the Smart Scheduler time slot: Make sure to configure enough time slot to run the on-demand scan on all your virtual machines. Otherwise, the scanning might be postponed for some VMs. Make sure that there are no other resource-intensive tasks configured to run during the same time slot. Running multiple resource-intensive tasks impacts the performance of the virtual machines. We recommend that you configure the time slot in such a way that the hypervisor/hypervisors is not busy handling resource-intensive tasks during the Smart Scheduler time slot. Best practices for configuring CPU threshold value Improve the performance of your enterprise systems once the CPU threshold value is configured. We recommend that you configure the CPU threshold to be an approximate value of 30% higher from the current CPU Utilization value for smart scheduling resource-intensive tasks. However, the threshold value should not exceed 80%. McAfee Endpoint Security for Servers Product Guide 17

18 3 Configure smart scheduling settings Best practices for improved performance Best practices for configuring scheduling intervals Improve the performance of your enterprise systems once the scheduling interval is configured for a task. When configuring the smart scheduling intervals for a task, configure schedule type as Daily or Weekly for best results. Best practice for monitoring CPU load in AWS environment Improve the performance of your enterprise systems by introducing detailed monitoring in the AWS environment. The AWS CloudWatch service retrieves CPU Utilization metrics from the AWS environment. By default, the basic monitoring option is enabled that allows the CloudWatch to retrieve data from the AWS environment every 300 seconds. As a best practice, you can enable CloudWatch detailed monitoring in the AWS environment to ensure that the Smart Scheduler receives detailed information about the CPU Utilization of an Auto Scaling Group. When detailed monitoring is enabled, the CloudWatch retrieves the data in every 60 seconds. 18 McAfee Endpoint Security for Servers Product Guide

19 4 Frequently 4 asked questions Here are the answers to some of the most frequently asked questions relating to the security implications of using Endpoint Security for Servers. What are the supported client tasks for smart scheduling? Smart Scheduler enables you to set periodic resource-intensive tasks for smart scheduling like on-demand scan. Smart Scheduler supports these types of on-demand scans for smart scheduling: Endpoint Security Threat Prevention On-demand scan Full Scan Endpoint Security Threat Prevention On-demand scan Quick Scan Endpoint Security Threat Prevention Custom on-demand scan McAfee Agent AMCore Content Package What are the supported scheduling intervals for scheduling the resource-intensive tasks? Smart Scheduler supports these intervals for scheduling the resource-intensive tasks: Daily Weekly Monthly Best practice: Configure schedule type as Daily or Weekly for best results. I configured an on-demand scan task for smart scheduling. How does smart scheduling work during vmotion? During an on-demand scan, if a VM moves from one hypervisor to another hypervisor of the same vcenter account, the same scan continues. In this case, Smart Scheduler does not consider the CPU Utilization of the hypervisor, where the VM is moved. Does Smart Scheduler use the McAfee epo server time or local system time to schedule resource-intensive tasks? Smart Scheduler always uses the local system time for scheduling the tasks and not the McAfee epo server time. What are the minimum and maximum CPU threshold value that I should configure for resource-intensive tasks? We recommend that you configure the CPU threshold to be an approximate value of 30% higher from the current CPU Utilization value for smart scheduling resource-intensive tasks. However, the threshold value should not exceed 80%. McAfee Endpoint Security for Servers Product Guide 19

20 4 Frequently asked questions I moved a few VMs from one group to another in the System Tree. I deployed McAfee Agent on a few unmanaged VMs. If I add a resource-intensive task for smart scheduling, how quickly does Smart Scheduler implement the task? Smart Scheduler considers the resource-intensive task for smart scheduling within 30 minutes after configuring the Smart Scheduler settings. I configured an on-demand scan task for smart scheduling. How do I disable Smart Scheduler for the task and how does the existing task behave after disabling the feature? You can disable smart scheduling for the task by deselecting the task from the Smart Scheduler Catalog page in McAfee epo. Once the feature is disabled, the regular scheduling happens for the task based on the settings you configured for that task. How do I check if an on-demand scan task was missed for any systems and how do I fix this? You can run these reports from Queries & Reports on McAfee epo to find the systems on which the on-demand scan was missed. Endpoint Security Threat Prevention: Systems Not Completed a Full Scan in the Last 7 Days Endpoint Security Threat Prevention: Systems Not Completed a Full Scan in the Last Month To run an on-demand scan immediately on the unscanned systems: 1 Select the unscanned systems from the McAfee epo System Tree. 2 From Actions, select Agent Run Client Task Now. 3 Select the on-demand scan task and click Run Task Now. The task is immediately triggered on the systems ignoring the Smart Scheduler time slot. Which features are provided by Endpoint Security Threat Prevention and Endpoint Security for Servers? Here is the list of features that are supported by Endpoint Security Threat Prevention and Endpoint Security for Servers to protect the virtual and physical systems. Support for... Endpoint Security Threat Prevention On-access scanning On-demand scanning Clean infected file Delete and quarantine infected files Access protection Exploit prevention Dynamic Application Containment (DAC) Real Protect behavioral detection Prevent on-demand scanning storm X Prevent DAT update storm X Low impact to VM density with on-demand scanning X Execution of resource-intensive tasks based on the CPU load of the cloud platform X Endpoint Security for Servers 20 McAfee Endpoint Security for Servers Product Guide

21 Frequently asked questions 4 Support for... Endpoint Security Threat Prevention Time period-based task execution X Physical servers X Virtual servers Public Cloud Endpoint Security for Servers Do we need the configured user to have vcenter admin privileges to use Endpoint Security for Servers? No, but the configured user should have the read access and should be able to collect all the details from Vcenter. Can Cloud Workload Security fetch the threshold value for CPU Utilization in different vendor environments? Yes. The Cloud Workload Security can fetch the threshold value in Microsoft Azure and Amazon Web Services environments. Does the Cloud Workload Security fetch the threshold value for CPU Utilization of the Auto Scaling Group in epolicy Orchestrator? No. The threshold value is picked from the Amazon Web Services (AWS) environment, where the AWS administrator defines the threshold value. If no auto scaling policy is defined in the AWS environment, then the threshold value defined in the McAfee epo Smart Scheduler page is consumed. Does the Cloud Workload Security fetch the threshold value for CPU Utilization of the Virtual Machine Scale Sets in epolicy Orchestrator? No. The threshold value is picked from the Microsoft Azure environment, where the Microsoft Azure administrator defines the threshold value. If no auto scaling policy is defined in the Microsoft Azure environment, then the threshold value defined in the McAfee epo Smart Scheduler page is consumed. How do I register a Citrix XenServer or Microsoft Hyper-V cloud account? You can register a Citrix XenServer or Microsoft Hyper-V cloud account only through the Registered Cloud Account page on McAfee epo. McAfee Endpoint Security for Servers Product Guide 21

22 4 Frequently asked questions 22 McAfee Endpoint Security for Servers Product Guide

23 0-00

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0 Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Mobile Citrix XenMobile Integration Guide

McAfee MVISION Mobile Citrix XenMobile Integration Guide McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Agent 5.6.x Product Guide

McAfee Agent 5.6.x Product Guide McAfee Agent 5.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Product Guide. McAfee Content Security Reporter 2.4.0

Product Guide. McAfee Content Security Reporter 2.4.0 Product Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Application Control and McAfee Change Control Linux Product Guide Linux

McAfee Application Control and McAfee Change Control Linux Product Guide Linux McAfee Application Control and McAfee Change Control 6.3.0 - Linux Product Guide 6.3.0 - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision K McAfee Network Security Platform (NS-series Interface Modules Reference Guide) COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Performance Optimizer 2.2.0

Product Guide. McAfee Performance Optimizer 2.2.0 Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Network Security Platform

McAfee Network Security Platform Reference Guide Revision I McAfee Network Security Platform NS-series Interface Modules COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Content Security Reporter Product Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Product Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

McAfee Content Security Reporter 2.6.x Product Guide

McAfee Content Security Reporter 2.6.x Product Guide McAfee Content Security Reporter 2.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide

McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide COPYRIGHT Copyright 009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee MVISION Endpoint 1808 Product Guide

McAfee MVISION Endpoint 1808 Product Guide McAfee MVISION Endpoint 1808 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

Release Notes - McAfee Deep Defender 1.0

Release Notes - McAfee Deep Defender 1.0 Release Notes - McAfee Deep Defender 1.0 About this document About this release Features Known issues Documentation Before installing McAfee Deep Defender 1.0 Installing McAfee Deep Defender 1.0 About

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

McAfee Performance Optimizer 2.1.0

McAfee Performance Optimizer 2.1.0 Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Agent Product Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Product Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.1 Product Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Policy Auditor Installation Guide

McAfee Policy Auditor Installation Guide McAfee Policy Auditor 6.4.0 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee Application Control Windows Installation Guide. (Unmanaged)

McAfee Application Control Windows Installation Guide. (Unmanaged) McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Change Control and McAfee Application Control 6.1.4

McAfee Change Control and McAfee Application Control 6.1.4 Installation Guide McAfee Change Control and McAfee Application Control 6.1.4 For use with epolicy Orchestrator 4.6.0-5.1.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Change Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Change Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Change Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Endpoint 1811 Product Guide

McAfee MVISION Endpoint 1811 Product Guide McAfee MVISION Endpoint 1811 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision F McAfee Network Security Platform 9.1 (Virtual IPS Administration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Cloud Workload Security Installation Guide. (McAfee epolicy Orchestrator)

McAfee Cloud Workload Security Installation Guide. (McAfee epolicy Orchestrator) McAfee Cloud Workload Security 5.1.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Mobile Threat Detection Android App Product Guide

McAfee MVISION Mobile Threat Detection Android App Product Guide McAfee MVISION Mobile Threat Detection Android App 1809.4.7.0 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Account Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013

Account Management. Administrator Guide. Secure  Gateway (SEG) Service Administrative Guides. Revised August 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature

More information

Hardware Guide. McAfee MVM3200 Appliance

Hardware Guide. McAfee MVM3200 Appliance Hardware Guide McAfee MVM3200 Appliance COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis,

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes September Update McAfee Endpoint Security 10.5.4 For use with epolicy Orchestrator Contents Rating Resolved issues Installation instructions Note: If the versions of 10.5.4 is prior to September

More information

McAfee Threat Intelligence Exchange Installation Guide

McAfee Threat Intelligence Exchange Installation Guide McAfee Threat Intelligence Exchange 2.3.0 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information