Product Guide Revision A. McAfee Customer Submission Tool 2.4.0
|
|
- Horatio Cross
- 6 years ago
- Views:
Transcription
1 Product Guide Revision A McAfee Customer Submission Tool 2.4.0
2 COPYRIGHT Copyright 2016 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, , TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Evader, Foundscore, Foundstone, Global Threat Intelligence, McAfee LiveSafe, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee TechMaster, McAfee Total Protection, TrustedSource, VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Customer Submission Tool Product Guide
3 Contents Preface 5 About this guide Audience Conventions Find product documentation Introduction 7 How it works Identifying spam Avoiding spam How spam scores work Identifying phish Avoiding phish Installation 11 Requirements Installation checklist Download the product files Install the product files manually Install the tool using a script Examples Announce the tool to users Change the configuration Using the tool 17 Finding the tool on the Outlook interface Submit samples Submit wrongly categorized samples Add your Microsoft Outlook contacts to the whitelist Configure Customer Submission Tool Index 21 McAfee Customer Submission Tool Product Guide 3
4 Contents 4 McAfee Customer Submission Tool Product Guide
5 Preface This guide provides the information you need to work with your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who use the computer where the software is running and can access some or all of its features. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Customer Submission Tool Product Guide 5
6 Preface Find product documentation Find product documentation On the ServicePortal, you can find information about a released product, including product documentation, technical articles, and more. Task 1 Go to the ServicePortal at and click the Knowledge Center tab. 2 In the Knowledge Base pane under Content Source, click Product Documentation. 3 Select a product and version, then click Search to display a list of documents. 6 McAfee Customer Submission Tool Product Guide
7 1 Introduction 1 McAfee Customer Submission Tool helps you to reduce the amount of unwanted or spam that you receive. The software works with your Microsoft Office Outlook software to forward messages to McAfee Labs and McAfee Quarantine Manager (MQM). McAfee Labs and MQM analyze the message sample and use it to reduce further spam. Contents How it works Identifying spam Identifying phish How it works Anti-spam products provide protection against spam. Spam is sometimes hard to detect; spammers develop new techniques, and anti-spam products are unable to detect new spam. In addition, some false detections can occur an anti-spam product can wrongly categorize some genuine messages as spam. By analyzing new spam, phish, and wrongly categorized , McAfee can continuously improve its anti-spam products. Customer Submission Tool forwards messages to McAfee Labs or MQM for analysis. Sending to McAfee Labs McAfee Labs examines messages that are incorrectly categorized by our software or other vendor products, and learn why, which improves our anti-spam products. We treat all submitted samples as confidential material and do not forward or use them for any purpose other than research. To analyze the sample properly, we look at the message headers, including sender and subject, and body contents, including text and attachments. A full privacy statement is available at the time you install the tool. Sending to MQM If your network includes MQM, you can submit samples to MQM. See also Using the tool on page 3 Identifying spam Any unsolicited and unwelcome messages are considered spam. Spam, also known as unsolicited bulk (UBE), includes: McAfee Customer Submission Tool Product Guide 7
8 1 Introduction Identifying spam Commercial messages, which are the electronic equivalent of junk mail Unwanted non-commercial messages, such as virus hoaxes, jokes, and chain letters People who create spam, known as spammers, forge the headers of the messages to hide their true identity, often deflecting retaliation toward innocent parties. What is not spam? Some is called spam, but it is not. For example, if you completed any of the following scenarios, your address is probably still on a distribution list: Subscribed to a newsletter or online forum Requested information about some products Recently left a workgroup To reduce this type of unwanted , remove your address from any out-of-date distribution lists. Avoiding spam Every time you use an address to respond to and send messages, post to an Internet chat room, or advertise an address, you expose that account to spammers. Spammers compile lists of addresses. Over time, the address is added to more lists within spammer networks, greatly increasing the amount of spam that you receive. To help reduce the number of spam messages that you receive, follow any guidelines about usage that your organization recommends. For example: Beware of purchasing products advertised within spam messages. This alerts the spammer that the address is active so the address and other personal information can then be sold to other spammers. Do not post a personal address online. Instead, use a disposable address when you participate in newsgroups, join contests, or when a third party requests your address. If the address receives an excessive amount of spam, you can stop using that address and obtain a new one. Do not reply to spam messages, even if they offer to remove you from the distribution list. Your reply confirms to the spammer that the address is active, and the address can then be sold to other spammers. How spam scores work Our anti-spam products match an extensive set of rules against every message. Each rule is associated with a score positive or negative. Rules that match spam-like characteristics give a positive score. Rules that match attributes of legitimate messages give a negative score. When added, the scores give each message an overall spam score. Some rules are simple, and match only on phrases. Other rules are more complex and match on the header information and structure of messages. A false negative is an message that has not been categorized, but contains content that is generally considered to be spam or phish. A false positive is an message that has been categorized as spam or phish, but the recipient does not consider to be spam or phish. 8 McAfee Customer Submission Tool Product Guide
9 Introduction Identifying phish 1 Anti-spam products can specify a level at which a message is considered as spam. Typically, a score of 5 indicates that a message is spam. Your anti-spam product can highlight messages by adding some text, such as **SPAM** to the subject line of the message. You can then easily identify a spam message and decide how to handle the message. You must correctly configure your anti-spam product to categorize spam when the spam score exceeds a certain level. If the level is too high (a spam score of 10 or more), the anti-spam product does not categorize some spam messages. If the level is too low, some genuine messages are wrongly categorized as spam. Identifying phish Some spammers specialize in spoofing messages to trick unsuspecting users into disclosing information about their identity and financial accounts. Spoofing examples include forging the origin of an message to conceal the identity of the sender, and creating a website that looks authentic. This specialized form of spam is known as phish. Typically, you receive an that appears to come from a respected organization such as a bank. The message normally directs you to a spoofed website where you are asked for personal and financial details such as: Account number Password Credit card details Social security numbers Criminals use the stolen identity to fraudulently obtain goods and services (such as personal loans), to: Steal directly from your account Open bank accounts Launder money Avoiding phish Follow any guidelines about usage that your organization recommends for promoting good messaging practices. For example: Beware of any that asks for passwords and other sensitive information. Banks do not ask for such information directly and normally verify information using the mail. Organizations are unlikely to lose your account information. The typical procedure is to issue new details to you by mail, rather than ask you to provide the details yourself through or via a website. Beware of links to websites. When you are asked to provide sensitive information, you might be directed via a spoofed link. For example, a link in an looks like your bank s website ( and connects you to a site that appears authentic, but the address in the browser shows a different name (such as or an IP address (such as ) instead. Beware of websites that are not secure. Legitimate organizations operate secure websites that encrypt your personal information before you send it. Their websites have addresses such as rather than In other words, they use a secure Internet protocol known as HTTPS rather than HTTP. McAfee Customer Submission Tool Product Guide 9
10 1 Introduction Identifying phish 10 McAfee Customer Submission Tool Product Guide
11 2 Installation Prepare your installation environment and install the Customer Submission Tool software. You can install the software manually, but if you intend to provide the tool to many users, we recommend that you use a script. Contents Requirements Installation checklist Download the product files Install the product files manually Install the tool using a script Requirements To ensure your installation is successful, your environment must meet the minimum requirements. Component Microsoft Office Outlook Requirement You can download 32-bit and 64-bit Customer Submission Tool installers. Each installer supports different versions of Microsoft Outlook. If you download Customer Submission Tool using the 32-bit installer, verify that you use one of these Microsoft Outlook versions: If you download Customer Submission Tool using the 64-bit installer, verify that you use one of these Microsoft Outlook versions: Messaging server Customer Submission Tool supports these versions of Microsoft Exchange Server: McAfee Customer Submission Tool Product Guide 11
12 2 Installation Installation checklist Installation checklist To make sure that your system is configured correctly to run the installation program, review the installation checklist. Determine... If your computer has a Microsoft Windows XP or later operating system If you have installed the latest service packs for Windows operating systems and Windows updates If your computer has a Microsoft Outlook 2002 or later client. The Customer Submission Tool is unable to work with Microsoft Outlook Express or other clients If you have the administrator rights and permissions for installing the Customer Submission Tool software Verified Download the product files Download the Customer Submission Tool product files from the McAfee website. Task 1 Create a temporary folder on your hard drive. 2 Go to the McAfee Free Tools page. 3 Locate the Spam Submission section, then click Customer Submission Tool. 4 Click the installation link appropriate for your computer, then click Download Now on the McAfee Software royalty-free License page. 5 Extract the archived product installation folder to the temporary folder. You can obtain the necessary utilities to extract.zip archives from most electronic services. Install the product files manually Install the Customer Submission Tool product files on your computer. For Outlook 2007 or earlier versions, after the first installation, you cannot change the installation location during reinstallation. To install Customer Submission Tool on several computers, we recommend that you use a script. Task 1 Close all running applications. 2 In the temporary folder where you downloaded the tool, double-click the McAfee Customer Submission Tool folder. 3 To open the installation wizard, locate and run the MCSTx86.EXE file for Office 32-bit, or MCSTx64.EXE for Office 64-bit. If the installer has not automatically selected the appropriate language, a dialog box opens to enable you to select a language. 4 On the McAfee Customer Submission Tool Setup window, click Next to open the Destination Folder page. 5 Keep the default destination folder or click Browse to select a different folder, then click Next. 12 McAfee Customer Submission Tool Product Guide
13 Installation Install the tool using a script 2 6 On the Ready to Install the Application page, click Next to open the Updating System page. The page displays progress messages and a progress bar. The files are copied and the software is installed, which can take a few minutes. When the installation is complete, the McAfee Customer Submission Tool has been successfully installed page appears. 7 To close the wizard, click Finish. 8 Open Microsoft Outlook. Extra buttons are available on the Microsoft Outlook user interface. Install the tool using a script Use a script to install Customer Submission Tool on several computers. For Outlook 2007 or earlier versions, after the first installation, you cannot change the installation location during reinstallation. The install command has the following general form: msiexec /qn /I mcstx86.msi parameter1 parameter2 parameter3 msiexec /qn /I mcstx64.msi parameter1 parameter2 parameter3 For more information about the Windows Installer, visit the Microsoft website. All features that can be set when configuring the tool manually (as on Configuring the tool) can be specified as parameters in the command. The following tables describe the parameters. Table 2-1 General parameters Parameter and default value CONFIGENABLED 1 (Yes) DELETESPAMONSUBMIT 0 (No) Description Allows the user to configure the tool by making the Configure MCST button visible. 0 = No 1 = Yes Any other value is treated as 1. Deletes any spam or phish after submission. 0 = No 1 = Yes Any other value is treated as 0. DONTSHOWSPAMSUBMIT 0 (No) When the user clicks the button to submit spam or phish, hides the submission dialog. 0 = No 1 = Yes Any other value is treated as 0. McAfee Customer Submission Tool Product Guide 13
14 2 Installation Install the tool using a script Table 2-1 General parameters (continued) Parameter and default value DONTSHOWHAMSUBMIT 0 (No) INSTALLDIR1 (See text) MAXSUBMISSIONCOUNT 100 REBOOT (None) Description When the user clicks the button to submit an incorrectly categorized message, hides the submission dialog box. 0 = No 1 = Yes Any other value is treated as 0. Installs the tool at the specified location. By default, the tool is installed at: C:\Program Files\McAfee\Submission Tool Allows the user to submit up to 100 messages at one time. Reboots the operating system when the installation finishes. Possible settings are: F = Forced S = Suppress R = Really Suppress We recommend that you use S or R. Table 2-2 Parameters for submissions to McAfee Labs Parameter and default value ASEENABLED 1 (Yes) ASERESPONSEFREQ 0 (Immediately) ASERESPONSETYPE 0 (Brief) Description Enables the submission of samples to McAfee Labs. How often McAfee Labs responds to the submissions. Possible settings are: 0 = Immediate 1 = Daily 2 = Weekly 3 = Never Any other value is treated as 0. Type of acknowledgment that McAfee Labs sends. Possible settings are: 0 = Brief 1 = Normal 2 = Detailed Any other value is treated as 0. Table 2-3 Parameters for submissions to MQM Parameter and default value MQMENABLED 0 (No) MQMPATH Description Enables the submission of samples to MQM. 0 = No 1 = Yes Any other value is treated as 0. URL for the user folder on MQM. For example, 14 McAfee Customer Submission Tool Product Guide
15 Installation Install the tool using a script 2 Table 2-3 Parameters for submissions to MQM (continued) Parameter and default value WHITELISTHAMONSUBMIT 0 (No) Description When the submitted is not spam or phish, automatically adds the sender address to a whitelist. 0 = No 1 = Yes Any other value is treated as 0. BLACKLISTSPAMONSUBMIT 0 (No) When the submitted is spam or phish, automatically adds the sender address to a blacklist. 0 = No 1 = Yes Any other value is treated as 0. Examples Enclose character strings in double quotes. For example: INSTALLDIR1= C:\FOLDER A\FOLDER 1. The following command: Silently installs Customer Submission Tool using the default values Allows the user to see the Submit Spam and Submit Non-spam buttons on the Microsoft Outlook toolbar Allows the user to submit samples to McAfee Labs Prevents the user from reconfiguring Customer Submission Tool When the installation finishes, no reboot occurs. msiexec /qn /i mcstx86.msi CONFIGENABLED=0 INSTALLDIR1= C:\FOLDER A\FOLDER 1 REBOOT=R msiexec /qn /i mcstx64.msi CONFIGENABLED=0 INSTALLDIR1= C:\FOLDER A\FOLDER 1 REBOOT=R The following command: Silently installs the Customer Submission Tool Enables the user to submit samples to MQM Allows the user to reconfigure Customer Submission Tool msiexec /qn /I mcstx86.msi MQMENABLED=1 MQMPATH= REBOOT=R msiexec /qn /I mcstx64.msi MQMENABLED=1 MQMPATH= REBOOT=R Announce the tool to users You can issue an announcement to the users when Customer Submission Tool is installed on their Microsoft Outlook clients. Example Today, we are deploying the McAfee spam submission tool. The tool helps us all to reduce the amount of SPAM that our organization receives. Two extra buttons appears on the Microsoft Outlook user interface. If you cannot see the icons, restart Microsoft Outlook. McAfee Customer Submission Tool Product Guide 15
16 2 Installation Install the tool using a script To submit samples of spam that were not detected as spam, click. To submit samples of messages that were wrongly categorized as spam, click. Change the configuration To change the configuration without reinstalling the tool, you can change registry settings at the key HKEY_CURRENT_USER\Software\McAfee\Submission Tool. Table 2-4 Settings Name AseEnabled AseResponseFreq AseResponseType BlacklistSpamOnSubmit ConfigEnabled DeleteSpamOnSubmit DontShowHamSubmit DontShowSpamSubmit MaxSubmissionCount MqmEnabled WhitelistHamOnSubmit Default value (in hexadecimal) The names in the registry are identical to the parameters you use to install Customer Submission Tool using a script. To enforce the changed registry settings, restart Microsoft Outlook. If you enter any incorrect values, Customer Submission Tool replaces them with the default values. 16 McAfee Customer Submission Tool Product Guide
17 3 Using 3 the tool On the Microsoft Outlook interface, you can submit samples, add contacts to the whitelist, and configure Customer Submission Tool. Contents Finding the tool on the Outlook interface Submit samples Submit wrongly categorized samples Add your Microsoft Outlook contacts to the whitelist Configure Customer Submission Tool Finding the tool on the Outlook interface Customer Submission Tool adds toolbar buttons and menu entries to the Microsoft Outlook 2007 or earlier versions. In Outlook 2010 and 2013, icons are added to the home tab of the ribbon user interface. Outlook 2007 In Outlook 2007 or earlier supported versions, the following toolbar buttons appear with the elaborated tooltip text as: Submit spam or phish sample Submit non-spam sample Configure submissions settings You can also use the options from the Actions menu. Outlook 2010 and 2013 In Outlook 2010 and 2013, the following icons appear on the home tab of the ribbon user interface: Submit Spam Submit Non-spam Configure MCST These options enable you to: Submit messages that are categorized as spam or phish. Submit messages that are wrongly categorized as spam or phish. McAfee Customer Submission Tool Product Guide 17
18 3 Using the tool Submit samples Add all your Microsoft Outlook contacts to a whitelist if your organization uses MQM. Configure some of the tool settings. Submit samples Submit spam and phish samples using your Microsoft Outlook client. Task 1 In Microsoft Outlook, view the message or select the subject line of the message. 2 On the toolbar, click Submit Spam. You can also use the Action menu. 3 In the Submit Spam or Phish dialog box, select one of the following options, then click OK. Blacklist sender on submission Adds the sender of the spam to a blacklist. Any future s from the sender are blocked. The Blacklist sender on submission checkbox is only available if your organization uses MQM. Delete messages on submission Deletes the selected spam or phish samples. Do not show this dialog again Prevents the dialog box from appearing again. To show this dialog box again, press Shift, then click Submit Spam. Customer Submission Tool submits the sample. 4 If you submit the sample to MQM, you are prompted for your logon name and password. 5 On the message window that states that the sample was submitted successfully, click OK. The tool does not submit samples that are over 1 MB. We recommend that you delete files that are over 1 MB. Submit wrongly categorized samples Submit wrongly categorized samples using your Microsoft Outlook client. Task 1 In Microsoft Outlook, view the message or select the subject line of the message. 2 On the toolbar, click Submit Non-spam. You can also use the Action menu. 3 In the Submit Non-Spam dialog box, select one of the following options, then click OK. Whitelist sender on submission When selected, any future s from the sender are not categorized as spam. The Whitelist sender on submission checkbox is only available if your organization uses MQM. Do not show this dialog again Prevents the dialog box from appearing again. To show this dialog box again, press Shift, then click Submit Spam. Customer Submission Tool submits the sample. 18 McAfee Customer Submission Tool Product Guide
19 Using the tool Add your Microsoft Outlook contacts to the whitelist 3 4 If you submit the sample to MQM, you are prompted for your logon name and password. 5 On the message window that states that the sample was submitted successfully, click OK. The tool does not submit samples that are over 1 MB. We recommend that you delete files that are over 1 MB. Add your Microsoft Outlook contacts to the whitelist To prevent categorizing from any of your Microsoft Outlook contacts as spam or phish, you can add your contact addresses to your whitelist. Before you begin This feature is only available when: Your organization uses MQM. Customer Submission Tool is configured to display the Configure MCST button on the Microsoft Outlook toolbar. Task 1 In Microsoft Outlook, click Configure MCST on the toolbar. 2 In the McAfee Customer Submission Tool dialog box, click Add contact addresses to safe sender list, then click OK. All future messages that you receive from addresses in your whitelist are scanned for viruses, but not for spam or phish. Configure Customer Submission Tool If the Configure MCST button is available on the toolbar, you can configure the features. The button is only available when you view subject lines, and is unavailable if the tool was installed via a script that did not enable it. Task 1 On the Microsoft Outlook toolbar, click Configure MCST. 2 In the McAfee Customer Submission Tool dialog box, click the General tab, then select the following options. Delete on submission Deletes each spam or phish after it is successfully submitted. Do not show submission dialog Prevents a dialog box from appearing when any spam, phish, or wrongly categorized is submitted. 3 If you want to submit samples to McAfee Labs for analysis, click the McAfee Labs tab, select Enable, then configure the following options. Frequency of response Specifies how often McAfee Labs sends an automatic to acknowledge your submissions. When you select Immediately, then send many samples at the same time, you receive several replies within the following few minutes. Type of response Specifies the detail in each automatic . For example, Brief provides an acknowledgment only. When you first use the tool, we recommend that you select Immediately and Brief. McAfee Customer Submission Tool Product Guide 19
20 3 Using the tool Configure Customer Submission Tool 4 if you want to submit samples to MQM for analysis, click the MQM tab, select Enable, then configure the following options. URL Specifies the MQM server address. For example: User name Specifies the user name that is used when communicating with MQM. For example, user@example.com. Password Specifies the password associated with the user name. Block future messages from this sender (Blacklist the sender) Blocks any future received from the sender. Allow future messages from this sender (Whitelist the sender) Prevents Customer Submission Tool from scanning any from this sender for spam or phish. is always scanned for viruses. 20 McAfee Customer Submission Tool Product Guide
21 Index A about this guide 5 add Outlook contacts to whitelist 19 announce tool to users 15 avoid phish 9 avoid spam 7, 8 C change configuration 16 configure tool 19 conventions and icons used in this guide 5 D documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 download product files 12 F false negative 8 false positive 8 I install checklist 12 install tool manually 12 using script 13 M McAfee Customer Submission Tool 7 McAfee ServicePortal, accessing 6 R requirements, installation 11 S send to McAfee Labs 7 to McAfee Quarantine Manager 7 ServicePortal, finding product documentation 6 spam 7 spam scores 8 spammer 9 spoofing 9 submit first spam or phish sample 18 first wrongly categorized sample 18 T technical support, finding product information 6 tool configure 19 use 17 U use tool 17 use McAfee Customer Submission Tool 17 W what is phish 9 what is spam 7 P phish 9 McAfee Customer Submission Tool Product Guide 21
22 0A00
McAfee Host Intrusion Prevention 8.0
Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,
More informationMigration Guide. McAfee File and Removable Media Protection 5.0.0
Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee Rogue Database Detection For use with epolicy Orchestrator Software
McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationMcAfee Endpoint Security
Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the
More informationMcAfee Data Protection for Cloud 1.0.1
Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationAddendum. McAfee Virtual Advanced Threat Defense
Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or
More informationMcAfee Management for Optimized Virtual Environments AntiVirus 4.5.0
Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel
More informationMcAfee epolicy Orchestrator Software
User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationBoot Attestation Service 3.0.0
Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Change Control and McAfee Application Control 8.0.0
Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are
More informationBest Practices Guide. Amazon OpsWorks and Data Center Connector for AWS
Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active
More informationProduct Guide. McAfee Plugins for Microsoft Threat Management Gateway Software
Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Boot Attestation Service 3.5.0
Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee Web Gateway. for Riverbed Services Platform
Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee File and Removable Media Protection 6.0.0
Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the
More informationReference Guide. McAfee Security for Microsoft Exchange 8.6.0
Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee SiteAdvisor Enterprise 3.5.0
Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee Policy Auditor 6.2.2
Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationMcAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationData Loss Prevention Discover 11.0
Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee MVISION Endpoint 1811 Installation Guide
McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationScripting Guide. McAfee Drive Encryption 7.2.0
Scripting Guide McAfee Drive Encryption 7.2.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other
More informationProduct Guide. McAfee GetSusp
Product Guide McAfee GetSusp 3.0.0.461 COPYRIGHT LICENSE INFORMATION Copyright 2013-2017 McAfee, LLC. YOUR RIGHTS TO COPY AND RUN THIS TOOL ARE DEFINED BY THE MCAFEE SOFTWARE ROYALTY-FREE LICENSE FOUND
More informationInstallation Guide. McAfee Endpoint Security for Servers 5.0.0
Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationInstallation Guide. McAfee Web Gateway Cloud Service
Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee MVISION Endpoint 1808 Installation Guide
McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationProduct Guide Revision A. McAfee Client Proxy 2.3.2
Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationArchiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides
Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks
More informationProduct Guide. McAfee GetClean. version 2.0
Product Guide McAfee GetClean version 2.0 About this guide COPYRIGHT LICENSE INFORMATION Copyright 2013-2017 McAfee, LLC. YOUR RIGHTS TO COPY AND RUN THIS TOOL ARE DEFINED BY THE MCAFEE SOFTWARE ROYALTY-FREE
More informationMcAfee Application Control Windows Installation Guide. (Unmanaged)
McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationAddendum. McAfee Virtual Advanced Threat Defense
Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or
More informationMcAfee Network Security Platform
Revision D McAfee Network Security Platform (M-series Transceiver Modules Reference Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Network Security Platform 8.3
Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Management of Native Encryption 3.0.0
Product Guide McAfee Management of Native Encryption 3.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Application Control Windows Installation Guide
McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Change Control and McAfee Application Control 6.1.4
Installation Guide McAfee Change Control and McAfee Application Control 6.1.4 For use with epolicy Orchestrator 4.6.0-5.1.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.
More informationProduct Guide Revision A. Intel Security Controller 1.2
Product Guide Revision A Intel Security Controller 1.2 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationMcAfee Endpoint Upgrade Assistant 2.3.x Product Guide
McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Rogue System Detection 5.0.5
Product Guide McAfee Rogue System Detection 5.0.5 For use with epolicy Orchestrator 5.1.2, 5.1.3, 5.3.0, 5.3.1, and 5.3.2 Software COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationProduct Guide. McAfee SiteAdvisor Enterprise 3.5 Patch2
Product Guide McAfee SiteAdvisor Enterprise 3.5 Patch2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationInstallation Guide. McAfee epolicy Orchestrator Software. Draft for Beta
Installation Guide McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Content Security Reporter 2.6.x Installation Guide
McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Enterprise Mobility Management 12.0 Software
Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)
McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee File and Removable Media Protection Installation Guide
McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationProduct Guide. McAfee Web Gateway Cloud Service
Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Content Security Reporter 2.6.x Migration Guide
McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationProduct Guide. McAfee Web Gateway Cloud Service
Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMigration Guide. McAfee Content Security Reporter 2.4.0
Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Investigator Product Guide
McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationMcAfee Client Proxy Installation Guide
McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,
More informationMcAfee Active Response 2.0.0
Product Guide McAfee Active Response 2.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationMcAfee Client Proxy Product Guide
McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationReference Guide Revision B. McAfee Cloud Workload Security 5.0.0
Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationCloud Workload Discovery 4.5.1
Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationMcAfee Network Security Platform 8.1
Revision M McAfee Network Security Platform 8.1 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Endpoint Security Threat Prevention Installation Guide - macos
McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationReference Guide. McAfee Application Control 7.0.0
Reference Guide McAfee Application Control 7.0.0 COPYRIGHT Copyright 2016 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationMcAfee Rogue System Detection 5.0.0
Product Guide McAfee Rogue System Detection 5.0.0 For use with epolicy Orchestrator 5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.5.0
Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)
McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationAccount Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013
Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature
More informationFirewall Enterprise epolicy Orchestrator
Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee MVISION Mobile epo Extension Product Guide
McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationProduct Guide. McAfee Content Security Reporter 2.4.0
Product Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Endpoint Security Threat Prevention Installation Guide - Linux
McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationHardware Guide. McAfee MVM3200 Appliance
Hardware Guide McAfee MVM3200 Appliance COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis,
More informationMcAfee Performance Optimizer 2.1.0
Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)
McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee Enterprise Mobility Management 10.1
Installation Guide McAfee Enterprise Mobility Management 10.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationCyber Security Guide for NHSmail
Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationMcAfee Endpoint Security for Servers Product Guide
McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide
McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationInstallation Guide Revision B. McAfee Cloud Workload Security 5.0.0
Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide
McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS
More informationMcAfee epolicy Orchestrator 5.9.1
Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright
More informationMcAfee VirusScan Enterprise for Storage 1.3.0
Product Guide McAfee VirusScan Enterprise for Storage 1.3.0 For use with epolicy Orchestrator 5.3.x and 5.9.x Software COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee
More informationMcAfee Content Security Reporter 2.6.x Product Guide
McAfee Content Security Reporter 2.6.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Application Control 8.0.0
Best Practices Guide McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks
More informationMcAfee Content Security Reporter Product Guide. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee. Deployment and User Guide. epo 4 / Endpoint Encryption
McAfee Deployment and User Guide epo 4 / Endpoint Encryption 1 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee
More informationMcAfee Network Security Platform 8.1
Revision P McAfee Network Security Platform 8.1 (Upgrade Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationChoic Anti-Spam Quick Start Guide
ChoiceMail Anti-Spam Quick Start Guide 2005 Version 3.x Welcome to ChoiceMail Welcome to ChoiceMail Enterprise, the most effective anti-spam protection available. This guide will show you how to set up
More informationMcAfee Data Loss Prevention Endpoint
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.200 For use with epolicy Orchestrator 4.6-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee MVISION Mobile MobileIron Integration Guide
McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee
More informationTotal Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationInstallation Guide. McAfee epolicy Orchestrator software D R A F T
Installation Guide McAfee epolicy Orchestrator 4.6.0 software COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee MVISION Mobile IBM MaaS360 Integration Guide
McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee MVISION Mobile IBM MaaS360 Integration Guide
McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee
More informationReference Guide. McAfee Application Control 8.0.0
Reference Guide McAfee Application Control 8.0.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other
More information