Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Size: px
Start display at page:

Download "Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0"

Transcription

1 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0

2 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone, McAfee LiveSafe, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, True Key, TrustedSource, VirusScan are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Cloud Workload Security Installation Guide

3 Contents 1 Installation of Cloud Workload Security 5 Cloud Workload Security packages and McAfee suites Requirements Installing the Cloud Workload Security extension Download and install the extension manually Install the extension through Software Manager Configure a deployment task for Linux group of systems Extension list on McAfee epo Uninstall the extensions Configuring cloud accounts and your security products 9 Register an AWS cloud account Create an AWS user Create a user permission policy Assign the policy to a user Register an AWS account Configuring Microsoft Azure cloud accounts Create an application in the Microsoft Azure console Create an application using PowerShell script Finding Subscription ID, Tenant ID, and Client ID Configure client key Set delegated permissions Assign the application to your subscription Register a Microsoft Azure account Register a VMware vsphere account from the Accounts pane Register a McAfee Network Security Manager account Download the Virtual Probe Install the Virtual Probe Configuring your security products and viewing reports McAfee Cloud Workload Security Installation Guide 3

4 Contents 4 McAfee Cloud Workload Security Installation Guide

5 1 Installation of Cloud Workload Security McAfee Cloud Workload Security is packaged in public, hybrid, and private variants to support different cloud vendor accounts. Install any of these Cloud Workload Security extensions on the McAfee epolicy Orchestrator (McAfee epo ) server to deploy and configure your McAfee products based on your requirements. Contents Cloud Workload Security packages and McAfee suites Requirements Installing the Cloud Workload Security extension Uninstall the extensions Cloud Workload Security packages and McAfee suites Cloud Workload Security is packaged in public, hybrid, and private variants to support different cloud vendor accounts. Table 1-1 Cloud Workload Security packages Cloud Workload Security variant Supported cloud vendors Package names Cloud Workload Security for Public cloud Cloud Workload Security for Private cloud Cloud Workload Security for Hybrid cloud AWS and Microsoft Azure VMware vsphere VMware vsphere, AWS, and Microsoft Azure Cloud_Workload_Security_Public_5.0.0 Cloud_Workload_Security_Private_5.0.0 Cloud_Workload_Security_Hybrid_5.0.0 Cloud Workload Security package includes a license extension. You must install the license extension to enable traffic discovery, traffic assessment, traffic visualization, and Network Security account registration. Requirements To install the Cloud Workload Security extension, make sure that you have the compatible versions of McAfee epo, McAfee Agent, and browsers. Component Version McAfee epo 5.3.3, 5.9 (EPO590HF ), and McAfee Agent Browsers and later. For more information, see KB Google Chrome 62.0 and later Internet Explorer 11 McAfee Cloud Workload Security Installation Guide 5

6 1 Installation of Cloud Workload Security Installing the Cloud Workload Security extension Installing the Cloud Workload Security extension You can install the Cloud Workload Security extension with the Software Manager utility on McAfee epo, or by downloading and installing the extension from the McAfee download site. Download and install the extension manually Download and install the Public Cloud Security package on the McAfee epo server. 1 From the McAfee download site ( use your grant number and select your suite. 2 From the products listed, select and download Common UI 1.3 and your Cloud Workload Security variant. 3 Log on to the McAfee epo server as an administrator. 4 Select Menu Software Extensions Install Extension. 5 Browse to and select the extension file, then click OK. Install Common UI 1.3 first, then install Cloud Workload Security. The Install Extension page displays the extension names and version details. Install the extension through Software Manager Use McAfee epo Software Manager to install the Cloud Workload Security extension. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Software, then click Software Manager. 3 From Software (by Label) Messaging & Web Security, select Common UI 1.3 on McAfee epo and then click Check In All. 4 From Software (by Label) Endpoint Security, select your Cloud Workload Security 5.0 variant and then click Check In All. Configure a deployment task for Linux group of systems Create a deployment task to remove the Assurance Information module Linux client from target systems in the System Tree. 1 From the System Tree, select the Assigned Client s tab. 2 Select Actions New Client Assignment. 3 Select Product as McAfee Agent, and Type as Product Deployment. 4 Select a name for your task and click Create New. 5 Select the Target Platforms as Linux, Products and Components as Assurance Information Module , and Action as Remove. 6 Click Save. 6 McAfee Cloud Workload Security Installation Guide

7 Installation of Cloud Workload Security Uninstall the extensions 1 Extension list on McAfee epo After installing the Cloud Workload Security extension, you can see these extensions by selecting Menu Extensions McAfee Data Center Security. CWS License extension Data Center Assessment Data Center Visualization vsphere Connector Data Protection for Cloud Data Center Metering AWS Connector MDCC Azure Connector Uninstall the extensions Remove Cloud Workload Security software extensions from the McAfee epo server in the Extensions. Delete your cloud account from the McAfee epo server by selecting Menu Configuration Registered Servers, and selecting Actions Delete. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Software Extensions. 3 In the left pane, select Data Center Security group, then select the extensions in this order and click Remove. 1 CWS License extension 6 Data Center Assessment 2 Data Center Visualization 7 vsphere Connector 3 Data Protection for Cloud 8 Data Center Metering 4 AWS Connector 9 MDCC 5 Azure Connector Delete your cloud account from the McAfee epo server by selecting Menu Configuration Registered Servers, and selecting Actions Delete. McAfee Cloud Workload Security Installation Guide 7

8 1 Installation of Cloud Workload Security Uninstall the extensions 8 McAfee Cloud Workload Security Installation Guide

9 2 Configuring 2 cloud accounts and your security products You must register your cloud accounts with McAfee epo to establish a connection with the McAfee epo server. McAfee epo then discovers, imports, and displays the cloud asset information on a single page. After registering the cloud accounts on the Cloud Workload Security visualization page, you can view: Virtual networks and firewall (security group) information of your virtual machines in Cloud Workload Security. Imported VMs and virtualization properties on the McAfee epo System Tree. Security products installed on every virtual instance. Contents Register an AWS cloud account Configuring Microsoft Azure cloud accounts Register a VMware vsphere account from the Accounts pane Register a McAfee Network Security Manager account Configuring your security products and viewing reports Register an AWS cloud account You must register your AWS cloud accounts on McAfee epo. Cloud Workload Security offers three levels of privileges when registering an AWS account. You can configure your AWS account according to your requirements. Create an AWS user On the Amazon Web Services management console, create an AWS user with Access Key ID and Secret Access Key configured. 1 Log on to your Amazon Web Services management console. 2 Select IAM to load the Identity and Access Management (IAM) dashboard. 3 From the Users section, click Create New Users. 4 Type a name for the user and select Generate an access key for each user. 5 Click Create. 6 Click Download Credentials and save the CSV file. These credentials contain both the Access Key ID and the Secret Access Key. McAfee Cloud Workload Security Installation Guide 9

10 2 Configuring cloud accounts and your security products Register an AWS cloud account Create a user permission policy Create a policy with minimum required permissions for a user to use Cloud Workload Security. 1 Log on to your Amazon Web Services management console. 2 From the Policies section, click Create New Policy. 3 From Create Policy, click Create Your Own Policy. 4 Type a name and description. 5 Configure your AWS account using policies based on the required privilege. Policy for EC2 discovery/visibility These set of rules will allow you to create an AWS user with limited privilege user permission policy to discover EC2 assets and read firewall rules. { } "Version": " ", "Statement": [ { "Effect": "Allow", "Action": "ec2:describe*", "Resource": "*" } ] Policy for remediation of Security Groups These set of rules will allow you to create an AWS user with the privileges for the remediation of Security Groups. { } "Version": " ", "Statement": [ { "Sid": "", "Effect": "Allow", "Action": [ "ec2:authorizesecuritygroupegress", "ec2:authorizesecuritygroupingress", "ec2:createsecuritygroup", "ec2:deletesecuritygroup", "ec2:modifyinstanceattribute", "ec2:modifynetworkinterfaceattribute", "ec2:revokesecuritygroupegress", "ec2:revokesecuritygroupingress", "ec2:createtags" ], "Resource": [ "*" ] } ] 10 McAfee Cloud Workload Security Installation Guide

11 Configuring cloud accounts and your security products Register an AWS cloud account 2 Policy to enable Network Traffic Discovery These set of rules will allow the AWS user to enable network traffic flow logs at VPC levels. This policy allows Cloud Workload Security to discover network traffic logs. { } ] "Version": " ", "Statement": [ { "Sid": "", "Effect": "Allow", "Action": [ "logs:createloggroup", "logs:deleteloggroup", "logs:describeloggroups", "logs:describelogstreams", "logs:filterlogevents", "logs:getlogevents", "logs:createlogstream", "logs:putlogevents", "iam:getuser", "ec2:createflowlogs", "ec2:deleteflowlogs" ], "Resource": [ "*" ] } Create an IAM role with flow logs for your AWS account An IAM role with flow log policies enables you to access the IP traffic flow in your virtual networks. You can view the IP traffic flows of your Virtual networks in the Cloud Workload Security. 1 Log on to your Amazon Web Services management console. 2 Select IAM to load the Identity and Access Management (IAM) dashboard. 3 Enter this name McafeeFlowLogger for your role, and then choose Next. 4 On the Select Role Type page next to Amazon EC2, click Select. 5 On the Attach Policy page, click Next Step. 6 On the Review page, make a note of the ARN for your role. 7 Select Create Role. 8 Type a name for your role. 9 Under Permissions, expand the Inline Policies section, and then select Click here. 10 Select Custom Policy, and click Select. McAfee Cloud Workload Security Installation Guide 11

12 2 Configuring cloud accounts and your security products Register an AWS cloud account 11 Copy this policy and paste it in the Policy Document window. Enter a name for your policy in Policy Name, then click Apply Policy. { } "Version": " ", "Statement": [ { "Action": [ "logs:createloggroup", "logs:createlogstream", "logs:putlogevents", "logs:describeloggroups", "logs:describelogstreams" ], "Effect": "Allow", "Resource": "*" } ] 12 Select Edit Trust Relationship. Delete any existing policy document. 13 Copy and paste this policy, and click Update Trust Policy. { } "Version": " ", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "Service": "vpc-flow-logs.amazonaws.com" }, "Action": "sts:assumerole" } ] Policy for workload shut down These set of rules will allow you to shut down the selected workload as a remediation measure. { } "Version": " ", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "ec2:stopinstances", "Resource": "*" } ] Assign the policy to a user Assign the required policy to the user on the Amazon Web Services management console to provide necessary permissions to the user. Before you begin Ensure that you have created a new user. Ensure that you have created the required permissions policy. 12 McAfee Cloud Workload Security Installation Guide

13 Configuring cloud accounts and your security products Register an AWS cloud account 2 1 Log on to your Amazon Web Services management console. 2 On the AWS services page, click IAM from the Security, Identity & Compliance section. 3 In the left panel, select the user from the Users section. 4 On the Summary page, select the policy that you created, then click Attach Policy. 5 Go back to the Summary page, then click the Security Credentials tab. 6 Click Create access key. Secret access key is generated when you create the Access key. Use the access key and the secret access key when registering your cloud account using McAfee epo. Register an AWS account Register an AWS account with McAfee epo so that McAfee epo can communicate with the AWS cloud. Before you begin Ensure that these conditions are met: You have your AWS account and its details ready. AWS users have an access key ID and a secret access key set up for them in the AWS console. AWS users have permissions to use Cloud Workload Security. To view IP traffic flows in your virtual network, the account you are registering with McAfee epo has an IAM role with flow log policies. You installed the Cloud Workload Security extension on McAfee epo. Your McAfee epo system date and time are synchronized with the current date and time. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Systems Cloud Workload Security, to open the Cloud Workload Security page. 3 From the Accounts pane, click Add Account, to open the Registered Cloud Account pane. McAfee Cloud Workload Security Installation Guide 13

14 2 Configuring cloud accounts and your security products Register an AWS cloud account 4 From the Select Account Type drop-down list, select Amazon Web Service and type these details. Option Definition Name A name for the AWS account in McAfee epo. Account names can include characters a z, A Z, 0 9, and [_. ], without space. Access Key ID Type the access key ID used by AWS connector to log on to AWS. Each user can be configured to have an Access Key ID in AWS console. For details, see Create an AWS user. Secret Key ID Type the secret access key used by AWS connector to log on to AWS. Each user can be configured to have a Secret Access key in AWS console. For details, see Create an AWS user. Enable Traffic Discovery Assessment Policy McAfee epo Tags (seperated by commas) Sync Interval (In Minutes) Select to discover and view traffic flow logs for instances in your AWS accounts. Click Assessment Policy to select the policy to be applied to your AWS account, or click to go to the Policy Catalog page to create or select a policy. List of McAfee epo tags that are applied on VMs discovered for this AWS account. Tag name can include characters a z, A Z, 0 9, and [_. ], with space. For details about Tag usage, see the product documentation for McAfee epo. Specify the interval for McAfee epo to AWS synchronization (the default value is 5 minutes. The maximum value is 60 minutes). If you specify the sync interval as 5 minutes, the next sync is scheduled 5 minutes after the completion of the current sync. 5 Enable GovCloud if the AWS account belongs to the AWS GovCloud (US) region. For other users, leave it deselected. 6 Enable Enable Traffic Discovery if you want to view traffic details for your instances. 7 (Optional) Windows Domain Logon Credentials: type the credentials to deploy the McAfee Agent package. Make sure that the McAfee epo server and the VMs in the AWS cloud can communicate with each other. 8 Click Test Connection to validate the account details and verify the connection to the AWS cloud. 9 Click Submit to register the cloud account. This action registers the AWS cloud and imports all discovered VMs, which are unmanaged, into the System Tree. The instances are imported with the structure and hierarchy of the AWS cloud. The VMs that are already added and managed by McAfee epo are retained with the existing policy settings. 10 View the imported VMs: Select Menu Systems Cloud Workload Security on McAfee epo to view, assess, and remediate your cloud asset information. Select Menu System Tree in McAfee epo. You can find your AWS account under the group AWS. The virtual machines from AWS are logically grouped with the hierarchy AWS Cloud account name Region Availabilty zone instances. 14 McAfee Cloud Workload Security Installation Guide

15 Configuring cloud accounts and your security products Configuring Microsoft Azure cloud accounts 2 Configuring Microsoft Azure cloud accounts You can configure and register your Microsoft Azure account on McAfee epo, then view your cloud account details in the System Tree and on the Cloud Workload Security dashboard. Create an application in the Microsoft Azure console Create an application in Microsoft Azure Active Directory to access the resources in your subscription. This application will allow you to create default roles only. Before you begin Ensure that these conditions are met: You have installed Azure Resource Manager modules in Microsoft Azure PowerShell. You have registered Microsoft.insights provider under User Account My Permissions Resource provider status. You can get your client ID, tenant ID, and configure your Client key after creating the application. 1 Log on to the Microsoft Azure portal and select Active Directory from the left pane. 2 Select the directory that you want to use for creating the application. 3 Click Applications and then click Add. 4 On the What do you want to do? page, select Add an application my organization is developing. 5 Type a name for your application and select WEB APPLICATION AND/OR WEB API and click Next. 6 Type the properties for your application. For SIGN-ON URL, give the URI to a website that describes your application. The existence of the website is not validated. For APP ID URI, provide the URI that identifies your application. The uniqueness or existence of the endpoint is not validated. 7 Click Complete to create your application. Create an application using PowerShell script Create an application using power shell scripts to create custom roles. You can access the tenant ID, client ID, and client key from the automatically generated MicrosoftAzurecloudaccountdetails.txt file. Before you begin Ensure that these conditions are met: You have installed Azure Resource Manager modules in Microsoft Azure PowerShell. You have registered Microsoft.insights provider under User Account My Permissions Resource provider status. For more information about Azure PoweShell, see overview?view=azurermps and KB Download the required PowerShell script and copy it to the PowerShell installation folder. Ensure that you have downloaded the correct script according to your Cloud Workload Security version. 2 Log on to PowerShell as administrator. McAfee Cloud Workload Security Installation Guide 15

16 2 Configuring cloud accounts and your security products Configuring Microsoft Azure cloud accounts 3 Enter cd "PowerShell directory path" to change the directory. 4 Enter.\ MicrosoftAzure_Prerequisite.ps1 to run the script. 5 Enter the required parameters according to your subscription. You must register Microsoft.insights provider for traffic discovery. For a single logged on user, select one of these in the Register Cloud Accounts window. McAfee CWS Basic This set of rules allows you to discover Azure instances and Network Security Groups (NSG) rules. McAfee CWS Advanced This set of rules allows you to discover Azure instances and NSG rules, and remediate NSG rules. For multiple subscriptions associated with one account: Create a web application for: Selected subscriptions All subscriptions In the Register Cloud Accounts window, select: McAfee CWS Basic McAfee CWS Advanced NSG flow logs allow Network Watcher to view information about the traffic in the NSG. When Network Watcher is enabled, the retention period set by Cloud Workload Security for NSG flow logs is 15 days. You can reconfigure the retention period under Network Watcher in the Azure portal. For more information, see 16 McAfee Cloud Workload Security Installation Guide

17 Configuring cloud accounts and your security products Configuring Microsoft Azure cloud accounts 2 Finding Subscription ID, Tenant ID, and Client ID After creating your application, you can make a note of the subscription ID, tenant ID and client ID. The subscription ID for your Microsoft Azure account is listed in Subscriptions SUBSCRIPTION ID. Select the application that you created and click the Configure to see your Client ID. Click VIEW ENDPOINTS to see App Endpoints page. Your tenant ID is given after the URLs for all the attributes in this page. McAfee Cloud Workload Security Installation Guide 17

18 2 Configuring cloud accounts and your security products Configuring Microsoft Azure cloud accounts Configure client key Configure your client key on Microsoft Azure Active Directory for your application. Before you begin Ensure that you have created an application in your Microsoft Azure Active Directory. 1 Log on to the Microsoft Azure portal. 2 Select the application that you created and click Configure. 3 Scroll down to the Keys section and select how long you would like your password to be valid. 4 Select the duration and click Save to create the key. Copy the key displayed in the application. You will not be able to retrieve it after you leave this page. Set delegated permissions Set the delegated permissions to access the web APIs from the registered account. Before you begin Ensure that you have created your application. 1 Log on to the Microsoft Azure portal. 2 Select the application that you created, then click Configure. 3 Select Add Application. 4 From the list in the Name field, select Windows Service Management API, then click Complete. 5 From Permissions to other applications, for Windows Azure Service Management, set the Delegated Permission as Access Azure Service Management as organization. Assign the application to your subscription Assign a role to your application and also assign it to your Microsoft Azure subscription. Before you begin You created an application in the Microsoft Azure console. You configured Client key for your application and set the delegated permissions. 1 On the Microsoft Azure console, click Subscription. 2 Select your subscription, and click Access icon. 3 Click Add Select a role and select your role as Contributor. 4 Click Add users and search for your application, click Select and click OK. Your application is assigned to your subscription. 18 McAfee Cloud Workload Security Installation Guide

19 Configuring cloud accounts and your security products Configuring Microsoft Azure cloud accounts 2 Register a Microsoft Azure account Register a Microsoft Azure account with McAfee epo so that McAfee epo can communicate with the Microsoft Azure cloud. Before you begin Ensure that these conditions are met: You have your Microsoft Azure account and its details ready. You have created an application in the Microsoft Azure console. You have got the Client ID and Tenant ID from the Microsoft Azure console after creating the application. You have configured the Client key for your application. You have set the delegated permissions for your application. You have assigned the newly created application to a role and to your Microsoft Azure cloud account subscription. You have installed the Cloud Workload Security extension on McAfee epo. Your McAfee epo system date and time are synchronized with the current date and time. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Systems Cloud Workload Security, to open the Cloud Workload Security page. 3 From the Accounts pane, click Add Account, to open the Registered Cloud Account pane. McAfee Cloud Workload Security Installation Guide 19

20 2 Configuring cloud accounts and your security products Configuring Microsoft Azure cloud accounts 4 From the Select Account Type drop-down list, select Microsoft Azure, then type the details. Option Account Name Azure Endpoint Definition Specify a name for the cloud account in McAfee epo. Account names can include characters a z, A Z, 0 9, and [_. ], without space. Specify the URL of Microsoft Azure endpoint. For Microsoft Azure cloud account, the endpoint is pre-populated. Do not change the endpoint URL unless confirmed by the cloud provider. Subscription ID Tenant ID Client ID Client Key Assessment Policy McAfee epo Tags (seperated by commas) Sync interval (In Minutes) Specify the subscription ID of your account. For details, see Where to find Subscription ID, Tenant ID, and Client ID. Specify the unique ID of the organization in Microsoft Active Directory. For details, see Where to find Subscription ID, Tenant ID, and Client ID. Specify the unique ID of the application. For details, see Where to find Subscription ID, Tenant ID, and Client ID. Specify the client key of the application. For details, see Configure Client Key. Click Assessment Policy to select the policy to be applied to your Azure account, or click to go to the Policy Catalog page to create or select a policy. Specify McAfee epo tag that is applied on the VMs discovered for this cloud account. Tag name can include characters a z, A Z, 0 9, and [_. ], with space. For details about Tag usage, see the product documentation for McAfee epo. Specify the interval for McAfee epo to the cloud synchronization (the default value is 5 minutes. The maximum value is 60 minutes). If you specify the sync interval as 5 minutes, the next sync is scheduled 5 minutes after the completion of the current sync. 5 (Optional) Windows Domain Logon Credentials: type the credentials to deploy the McAfee Agent package. 6 Click Test Connection to validate the account details and verify the connection to the cloud. 7 Click Submit to register the cloud account. This action registers the Microsoft Azure cloud account and imports all discovered VMs, which are unmanaged, into the System Tree. The instances are imported with the structure and hierarchy of the Azure cloud. The VMs that are already added and managed by McAfee epo are retained with the existing policy settings. 8 View the imported VMs: Select Menu Systems Cloud Workload Security on McAfee epo to view, assess, and remediate your cloud asset information. Select Menu Systems System Tree in McAfee epo. After the discovery, you can find your account under the group Azure. The VMs from each Microsoft Azure account are logically grouped under different geographical zones in McAfee epo. 20 McAfee Cloud Workload Security Installation Guide

21 Configuring cloud accounts and your security products Register a VMware vsphere account from the Accounts pane 2 Register a VMware vsphere account from the Accounts pane Register a VMware vsphere account with McAfee epo so that McAfee epo communicates with the VMware vcenter, which manages the ESXi servers. Before you begin Ensure that: The VMware vcenter server that manages the ESXi servers is configured to host the guest VMs. The Cloud Workload Security extension is installed on McAfee epo. 1 Log on to McAfee epo as an administrator. 2 Select Menu Systems Cloud Workload Security, to open the Cloud Workload Security page. 3 From the Accounts pane, click Add Account, to open the Registered Cloud Account pane. 4 From the Select Account Type drop-down list, select VMware vsphere. 5 On the vcenter Account Details page, type these details. Option Account Name Server Address vcenter Username vcenter Password Assessment Policy McAfee epo Tags (seperated by commas) Port Sync Interval (In Minutes) Definition A name for the vcenter account in McAfee epo. Account names can include characters a z, A Z, 0 9, and [_. ], without space. Specify the URL of VMware VSphere endpoint. Type the vcenter user name to log on to VSphere. Type the vcenter password to log on to VSphere. Click Assessment Policy to select the policy to be applied to your vcenter account, or click to go to Policy Catalog page to create or select a policy. List of McAfee epo tags that are applied on VMs discovered for this vcenter account. Tag name can include characters a z, A Z, 0 9, and [_. ], with space. For details about Tag usage, see McAfee epo product documentation. Specify the port name. Specify the interval for McAfee epo to vcenter synchronization (the default value is 5 minutes. The maximum value is 60 minutes). If you specify the sync interval as 5 minutes, the next sync is scheduled 5 minutes after the completion of the current sync. 6 (Optional) Windows Domain Logon Credentials: type the credentials to deploy the McAfee Agent package. Make sure that the McAfee epo server and the VMs in the vsphere cloud can communicate with each other. 7 Click Test Connection to validate VMware vcenter account details and verify the connection to the VMware vcenter, then click Next to open the vcenter Summary page. The summary page has vcenter, vcns, and NSX summary. McAfee Cloud Workload Security Installation Guide 21

22 2 Configuring cloud accounts and your security products Register a McAfee Network Security Manager account 8 Click Submit to register the cloud account. This action registers the VMware vcenter and imports all discovered virtual machines, which are unmanaged, into the McAfee epo System Tree. The instances are imported with the similar structure and hierarchy present in VMware vcenter. The virtual machines that are already added and managed by McAfee epo are retained with the existing policy settings, but the virtualization properties for these machines are added. 9 View the imported VMs: Select Menu Systems Cloud Workload Security on McAfee epo to view your cloud asset information. Select Menu Systems System Tree in McAfee epo. After the discovery, you can find your vcenter account under the group vsphere. The clusters and hosts from vcenter are logically grouped under each Data Center group in McAfee epo. Register a McAfee Network Security Manager account Register a McAfee Network Security Manager account with McAfee epo so that McAfee epo can communicate with the Network Security Manager server. Before you begin Ensure that: You have your Network Security Manager account and its details ready. You installed the Cloud Workload Security License extension on McAfee epo. After registering your Network Security Manager account, you can deploy vnsp probe to your cloud infrastructure using Cloud Workload Security. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Systems Cloud Workload Security, to open the Cloud Workload Security page. 3 From the Network Security Account pane, click Add Account, to open the Register Security Account pane. 4 From the Select Account Type drop-down list, select NSM Account, and type these details. Option NSM Server Name NSM Server IP User Name Password Definition Specify the name of the NSM server. Specify the IP address of the NSM server. Specify the user name of your account. Specify the password of your account. 5 Click Submit to register your account. The synchronisation between Cloud Workload Security and the Network Security Manager account occurs with the AWS account. You can deploy McAfee Agent to the registered VMs to manage product installation and network security of the virtual instances on McAfee epo. 22 McAfee Cloud Workload Security Installation Guide

23 Configuring cloud accounts and your security products Register a McAfee Network Security Manager account 2 s Download the Virtual Probe on page 23 A Virtual Probe has to be installed on every instance that has to be protected by Network Security Platform. In order to install a Virtual Probe, you will have to first download the Probe Installation script from the McAfee epo server. Install the Virtual Probe on page 23 The procedure to install a Virtual Probe on your virtual machine is different for different operating systems running on it. This section provides the installation steps for Linux and Windows virtual machines. Download the Virtual Probe A Virtual Probe has to be installed on every instance that has to be protected by Network Security Platform. In order to install a Virtual Probe, you will have to first download the Probe Installation script from the McAfee epo server. Before you begin You installed the Cloud Workload Security License extension on McAfee epo. 1 Log on to McAfee epo as an administrator. 2 Select Menu Systems Cloud Workload Security. 3 Select your workload from Systems, then select an instance from the instance list under Total Workloads to view the properties of your virtual systems from your cloud account. 4 From Network Intrusion Prevention under the Workload Details pane, click Download to download the Probe Installer for vnsp. 5 The Probe Installation Package with the <file name> will be downloaded onto your machine. Install the Virtual Probe The procedure to install a Virtual Probe on your virtual machine is different for different operating systems running on it. This section provides the installation steps for Linux and Windows virtual machines. 1 On your client system, run the downloaded script: Windows client system Open Windows PowerShell and run the script. Linux client system Launch the terminal Shell prompt and run the script. The McAfee Agent versions that are available depend on which McAfee Agent installation packages are checked in to the Master Repository. McAfee Cloud Workload Security Installation Guide 23

24 2 Configuring cloud accounts and your security products Configuring your security products and viewing reports 2 If you are using Amazon Web Services and deploying new EC2, copy the generated script and paste it into the User Data field. This allows you to launch existing Amazon Machine Images (AMI's) and automatically install and activate the Virtual probe at startup. The new instances must be able to access the McAfee epo server specified in the deployment script. You can now select the virtual instance and install Network Intrusion Prevention using Cloud Workload Security in McAfee epo. Configuring your security products and viewing reports After installing the Cloud Workload Security extension and registering cloud accounts, you must complete these tasks to configure the security products on your McAfee epo server. 1 Configure your firewall policies in Policy Catalog and assign them to required systems. 2 View your cloud account information from Menu Systems Cloud Workload Security. This graphical visualization of your cloud accounts gives you visibility into your cloud infrastructure assets and their hierarchy. The Total Workloads pane highlights any immediate issues or violations on your workload based on firewall settings or assigned policy settings. 3 After visualizing cloud account structure and seeing which systems are at risk, you can activate any missing protection with a few clicks. Manage your instances by installing McAfee Agent. Install other McAfee products on your instances. 4 Secure the instances in your network by correcting your firewall settings. 5 You can see the encryption status of your AWS volumes in the Cloud Workload Security dashboard. 6 To encrypt volumes, deploy McAfee Data Protection for Cloud to your managed systems with the product deployment client task. 7 Select Data Protection for Cloud to see that it displays all zones from your registered AWS cloud account. You can encrypt volumes from here. 8 Track the usage of AWS and Microsoft Azure cloud VMs using the metering feature. You can get a monthly report of your usage hours for your cloud instances. You can also create custom queries to display this information. 9 Select Dashboards Public Cloud to see the security summary of your EC2 instances and EBS volumes. You can also see details about Data Centers, OS Distribution, Anti-Malware Status, Security Incidents, Host Firewall Status, File Integrity Monitoring Status, Data Protection Per Cloud VM, Instance Assesment Report, and Usage Metering Report. 24 McAfee Cloud Workload Security Installation Guide

25 0B00

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Cloud Workload Security Installation Guide. (McAfee epolicy Orchestrator)

McAfee Cloud Workload Security Installation Guide. (McAfee epolicy Orchestrator) McAfee Cloud Workload Security 5.1.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision F McAfee Network Security Platform 9.1 (Virtual IPS Administration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee MVISION Mobile Citrix XenMobile Integration Guide

McAfee MVISION Mobile Citrix XenMobile Integration Guide McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0 Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active

More information

McAfee MVISION Mobile Threat Detection Android App Product Guide

McAfee MVISION Mobile Threat Detection Android App Product Guide McAfee MVISION Mobile Threat Detection Android App 1809.4.7.0 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Application Control Windows Installation Guide. (Unmanaged)

McAfee Application Control Windows Installation Guide. (Unmanaged) McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Product Guide Revision A. Intel Security Controller 1.2

Product Guide Revision A. Intel Security Controller 1.2 Product Guide Revision A Intel Security Controller 1.2 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

CloudHealth. AWS and Azure On-Boarding

CloudHealth. AWS and Azure On-Boarding CloudHealth AWS and Azure On-Boarding Contents 1. Enabling AWS Accounts... 3 1.1 Setup Usage & Billing Reports... 3 1.2 Setting Up a Read-Only IAM Role... 3 1.3 CloudTrail Setup... 5 1.4 Cost and Usage

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

ForeScout CounterACT. Configuration Guide. Version 1.1

ForeScout CounterACT. Configuration Guide. Version 1.1 ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision K McAfee Network Security Platform (NS-series Interface Modules Reference Guide) COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Content Security Reporter 2.4.0

Product Guide. McAfee Content Security Reporter 2.4.0 Product Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate White Paper PlateSpin Transformation Manager PlateSpin Migrate Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate Updated for PlateSpin Transformation Manager 1.1 and PlateSpin

More information

McAfee Network Security Platform

McAfee Network Security Platform Reference Guide Revision I McAfee Network Security Platform NS-series Interface Modules COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Agent 5.6.x Product Guide

McAfee Agent 5.6.x Product Guide McAfee Agent 5.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager BoxNet Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Product Guide. McAfee Performance Optimizer 2.2.0

Product Guide. McAfee Performance Optimizer 2.2.0 Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

McAfee epolicy Orchestrator Installation Guide

McAfee epolicy Orchestrator Installation Guide McAfee epolicy Orchestrator 5.10.0 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Virtual IPS Administration Guide Revision C McAfee Network Security Platform 8.3 For Private, Public, and Hybrid Clouds COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

McAfee Change Control and McAfee Application Control 6.1.4

McAfee Change Control and McAfee Application Control 6.1.4 Installation Guide McAfee Change Control and McAfee Application Control 6.1.4 For use with epolicy Orchestrator 4.6.0-5.1.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.

More information