McAfee Cloud Identity Manager
|
|
- Malcolm Spencer
- 6 years ago
- Views:
Transcription
1 Provisioning SDK Guide McAfee Cloud Identity Manager version 3.5
2 COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, Avert, epo, epolicy Orchestrator, Foundstone, GroupShield, IntruShield, LinuxShield, MAX (McAfee SecurityAlliance Exchange), NetShield, PortalShield, Preventsys, SecureOS, SecurityAlliance, SiteAdvisor, SmartFilter, Total Protection, TrustedSource, Type Enforcement, VirusScan, and WebShield are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANTOR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Cloud Identity Manager Provisioning SDK Guide
3 Contents 1.0 McAfee Cloud Identity Manager Provisioning API Overview Provisioning Actions Setting Up Your Java Development Environment Import Custom Java Code Directory Locations of Internal and External JAR File Dependencies Action API Interfaces Writing an Action Plug-in: Simple Configuration Example AAMV3Interface Methods Used in Sample Code Simple Configuration Summary of Sample Code for Simple Configuration Writing an Action Plug-in: Advanced Configuration Example AAMV3Interface Methods Used in Sample Code Advanced Configuration Summary of Sample Code for Advanced Configuration...13 McAfee Cloud Identity Manager Provisioning SDK Guide 3
4 4 McAfee Cloud Identity Manager Provisioning SDK Guide
5 1.0 McAfee Cloud Identity Manager Provisioning API Overview McAfee Cloud Identity Manager (Cloud Identity Manager, formerly Intel Expressway Cloud Access 360-SSO) provides two Application Programming Interfaces (APIs) for developers who wish to customize the provisioning service by creating plug-ins. Action API Use the Action API to develop custom actions. Web Service Listener API Use the Web Service Listener API to synchronize information over HTTP/HTTPS between two Cloud Identity Manager instances. Note: Information about the Web Service Listener API is available upon request. 1.1 Provisioning Actions Provisioning actions are the key to policy implementation. In addition to a large menu of built-in actions, the provisioning service offers an Action API that lets you configure custom actions for your particular situation. There are three types of provisioning actions. Getters Getters are actions that add data from one or more data sources to the internal virtual image of an object. Getters create new session objects and session attributes. Modifiers Modifiers are actions that update existing session objects and session attributes. Setters Setters are actions that save data from existing session objects and session attributes to one or more databases. Note: For more information about provisioning actions, see the McAfee Cloud Identity Manager Provisioning Guide. McAfee Cloud Identity Manager Provisioning SDK Guide 5
6 1.2 Setting Up Your Java Development Environment Before using one of the provisioning APIs, you need to have Cloud Identity Manager installed. You also need a basic understanding of the provisioning service. For more information, see the following guides. McAfee Cloud Identity Manager Installation Guide McAfee Cloud Identity Manager Provisioning Guide You can use any Integrated Development Environment (IDE) to develop custom plug-ins for the provisioning service, including the following: Eclipse For more information, visit: IntelliJ IDEA For more information, visit: NetBeans For more information, visit: The Action API, which is written in Java code and distributed in JAR (Java ARchive) files, consist of Java classes. To view the Javadoc and Java classes, visit: Import Custom Java Code Before you begin, you can import sample Java code in the Provisioning Studio and view two custom actions. One action is an example of a simple configuration, and the other is advanced: Reverse String (Action Advanced Config) Reverse String (Action Simple Config) To download the sample Java code, click: AAMActionAPISampleCode.zip The downloaded.zip file includes the following.jar file: AAMActionAPISampleCode.jar. You import the.jar file in Provisioning Studio, where you can view the custom actions. To import custom Java code 1. Open the Provisioning Studio. 2. Go to Tools Plugin Manager. 3. Click Import from file, browse to locate the.jar file, and click OK. 4. Restart the Provisioning Studio. 6 McAfee Cloud Identity Manager Provisioning SDK Guide
7 1.4 Directory Locations of Internal and External JAR File Dependencies On a Microsoft Windows operating system, you place internal and external JAR file dependencies in specified locations. Internal JAR file dependencies are those.jar files that you import in the Provisioning Studio. Internal JAR File Dependencies Place all.jar files imported in the Provisioning Studio in the following directory: <installation_directory>\lib <installation_directory> Specifies the directory where Cloud Identity Manager is installed. Default: C:\Program Files\McAfee\CIM\SSO\current\provisioning External JAR File Dependencies Place all external JAR file dependencies in the following directory: <installation_directory>\ext <installation_directory> Specifies the directory where Cloud Identity Manager is installed. Default: C:\Program Files\McAfee\CIM\SSO\current\provisioning McAfee Cloud Identity Manager Provisioning SDK Guide 7
8 1.5 Action API Interfaces In the Provisioning Studio, there are two different API interfaces for developing action plug-ins. Simple Action API Interface Using the simple interface, you can develop simple actions. For example, you can develop actions that update session attributes, create a Microsoft Excel file with values read from session objects and attributes, or browse an LDAP directory or file system. The following screenshot shows an action in the simple interface. Advanced Action API Interface Using the advanced interface, you can develop advanced actions. For example, you can develop actions that synchronize user information between two or more databases. In the advanced interface, a JPanel is used and graphical components can be added. The following screenshot shows an action group in the advanced interface. 1.6 Writing an Action Plug-in: Simple Configuration Example To write a simple action plug-in, implement the following interface in a new class or use the sample code classes as templates: se.nordicedge.aamv3interface AAMV3Interface Methods Used in Sample Code Simple Configuration Summarizes the primary AAMV3Interface methods used by the sample code written for a simple action plug-in Summary of Sample Code for Simple Configuration Summarizes the runplugin method that is called when the action is invoked. This method is where you place your code. For instructions on how to download the sample code, see section 1.3 Import Custom Java Code. To view the Javadoc and Java classes, visit: 8 McAfee Cloud Identity Manager Provisioning SDK Guide
9 1.6.1 AAMV3Interface Methods Used in Sample Code Simple Configuration The sample Java code for a simple action plug-in uses the following primary AAMV3Interface methods. getdescription Type: String Description: Returns a brief description of the plug-in s function. geticonname Type: String Description: Returns the name of the image file. Note: Set the icon size to 21x21 pixels. Supported image formats include BMP, JPG, and PNG. getname Type: String Description: Obsolete getsimpleconfigparameters Type: Vector Description: Returns configuration parameters. Each vector element represents a parameter using a string array. Example: String[] sarray0 = new String[] {"Session Attribute Containing Givenname [MANDATORY]", "LDAP-ATTRIBUTE", "Attribute of the incoming session object which contains the value to be manipulated. Example: givenname"; gettype Type: String Description: Returns the plug-in type. The type is used when creating a new instance of the action in the Provisioning Studio. Note: The type is a unique identifier. Do not modify its value after the plug-in is released for production. getusage Type: Boolean[] Description: Returns the action s type, as follows. Table 1. Type Getter Modifier Setter Action types and return values Return Value Boolean.TRUE, Boolean.FALSE, Boolean.FALSE Boolean.FALSE, Boolean.TRUE, Boolean.FALSE Boolean.FALSE, Boolean.FALSE, Boolean.TRUE getversion Type: Float Description: Returns the version number of the action. runplugin Type: Boolean Description: This method is called when the action is invoked. Place your code here. setconfigpanel Type: Boolean Description: Returns TRUE when the configuration is advanced and FALSE when the configuration is simple. Value: FALSE McAfee Cloud Identity Manager Provisioning SDK Guide 9
10 1.6.2 Summary of Sample Code for Simple Configuration The following steps and comments summarize the sample code for a simple action plug-in. For instructions on how to download the complete sample code, see section 1.3 Import Custom Java Code. To view more information about the AAMV3Interface methods used in the code, visit: 1. Check for search results. If there are search results, you can continue. If there are no search results, end the action and return a TRUE value. if (results == null results.size() == 0){ NELogger.debug("No session objects available."); return Boolean.TRUE; // End the action. 2. Get the parameters. String sacontaininggivenname = action.getparametervalue(0, ""); // No default value is specified and therefor the setting is MANDATORY. String sanameforstatus = action.getparametervalue(1, "status"); // "status" is the the default value. 3. Check the parameters. if (sacontaininggivenname.trim().equalsignorecase("")){ NELogger.error("ERROR: The 'Session Attribute Containing Givenname' is unset. Please enter a session attribute which contains the given name. Example: givenname"); return Boolean.FALSE; 4. Loop through all session objects in the search result. for (int xx = 0; xx < results.size(); xx++){ // Get the session object. SessionObject currentsessionobject = (SessionObject) results.get(xx); // Get the session attribute for given name. SessionAttribute sagivenname = currentsessionobject.getsessionattribute(sacontaininggivenname); String givenname = ""; boolean success = Boolean.FALSE; if (sagivenname!= null){ // Get the value from the session attribute. givenname = sagivenname.getvalue(); if (givenname == null givenname.isempty()){ NELogger.debug(currentSessionObject.getName() + " has no value in attribute: " + sacontaininggivenname); else { // Manipulate the incoming data (given name) as desired. // In this example the given name is reversed. StringBuffer sbuf = new StringBuffer(givenName); givenname = sbuf.reverse().tostring(); // Set the session attribute with the manipulated data. sagivenname.setvalue(givenname); success = Boolean.TRUE; 10 McAfee Cloud Identity Manager Provisioning SDK Guide
11 else { NELogger.error(currentSessionObject.getName() + " is missing attribute: " + sacontaininggivenname); /* In this example a session status attribute containing a result string is added to the session. SUCCESS or FAILURE is set depending on the result. */ SessionAttribute sastatus = new SessionAttribute(); sastatus.setname(sanameforstatus); if (success){ sastatus.setvalue("success"); else { sastatus.setvalue("failure"); sastatus.sethasbeenedited(true); currentsessionobject.addsessionattribute(sastatus); return Boolean.TRUE; //Success 1.7 Writing an Action Plug-in: Advanced Configuration Example To write an advanced action plug-in, implement the following interface in a new class or use the sample code classes as templates: se.nordicedge.aamv3interface AAMV3Interface Methods Used in Sample Code Advanced Configuration Summarizes the primary AAMV3Interface methods used by the sample code written for an advanced action plug-in Summary of Sample Code for Advanced Configuration Summarizes the runplugin method that is called when the action is invoked. This method is where you place your code. For instructions on how to download the sample code, see section 1.3 Import Custom Java Code. To view the Javadoc and Java classes, visit: McAfee Cloud Identity Manager Provisioning SDK Guide 11
12 1.7.1 AAMV3Interface Methods Used in Sample Code Advanced Configuration The sample Java code for a advanced action plug-in uses the following primary AAMV3Interface methods. getdescription Type: String Description: Returns a brief description of the plug-in s function. geticonname Type: String Description: Returns the name of the image file. Note: Set the icon size to 21x21 pixels. Supported image formats include BMP, JPG, and PNG. getname Type: String Description: Obsolete getsimpleconfigparameters Type: Vector Description: Returns null. gettype Type: String Description: Returns the plug-in type. The type is used when creating a new instance of the action in the Provisioning Studio. Note: The type is a unique identifier. Do not modify its value after the plug-in is released for production. getusage Type: Boolean[] Description: Returns the action s type, as follows. Table 2. Type Getter Modifier Setter Action types and return values Return Value Boolean.TRUE, Boolean.FALSE, Boolean.FALSE Boolean.FALSE, Boolean.TRUE, Boolean.FALSE Boolean.FALSE, Boolean.FALSE, Boolean.TRUE getversion Type: Float Description: Returns the version number of the action. runplugin Type: Boolean Description: This method is called when the action is invoked. Place your code here. setaction Type: void Description: Sets the action object that stores information for this action. To extract the parameter values, use: action.getparametervalue. setconfigpanel Type: Boolean Description: Returns TRUE when the configuration is advanced and FALSE when the configuration is simple. Value: TRUE 12 McAfee Cloud Identity Manager Provisioning SDK Guide
13 1.7.2 Summary of Sample Code for Advanced Configuration The following steps and comments summarize the sample code for an advanced action plug-in. For instructions on how to download the complete sample code, see section 1.3 Import Custom Java Code. To view more information about the AAMV3Interface methods used in the code, visit: 1. Check for search results. If there are search results, continue. If there are no search results, end the action and return a TRUE value. if (results == null results.size() == 0){ NELogger.debug("No session objects available."); return Boolean.TRUE; // End the action. 2. Get the parameters. String sessionattribname = action.getparametervalue(0, ""); boolean copytonewattribute = action.getparametervalue(1, false); 3. Check the parameters. if (sessionattribname.trim().equalsignorecase("")){ NELogger.error("ERROR: The 'Session Attribute Name' is unset. Please enter a session attribute name which contains a string value. Example: givenname"); return Boolean.FALSE; 4. Loop through all session objects in the search result. for(int xx=0; xx < results.size(); xx++){ // Get the session object. SessionObject sessionobj = (SessionObject) results.get(xx); // Get the session attribute from sessionattribname. SessionAttribute sessionattrib = sessionobj.getsessionattribute(sessionattribname); if(sessionattrib!= null){ // The session object has the attribute. String s = sessionattrib.getvalue(); StringBuffer sbuf = new StringBuffer(s); s = sbuf.reverse().tostring(); // If checked, add a new session attribute to the session object. if(copytonewattribute){ SessionAttribute newsessionattrib = new SessionAttribute(); newsessionattrib.setname("new-"+sessionattribname); newsessionattrib.setvalue(s); newsessionattrib.sethasbeenedited(true); sessionobj.addsessionattribute(newsessionattrib); else{ sessionattrib.setvalue(s); sessionattrib.sethasbeenedited(true); McAfee Cloud Identity Manager Provisioning SDK Guide 13
14 return Boolean.TRUE; //Success 14 McAfee Cloud Identity Manager Provisioning SDK Guide
15
16 Order Number: US [Revision A]
McAfee Cloud Identity Manager
EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Cloud Identity Manager
IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Cloud Identity Manager
Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Cloud Identity Manager
BoxNet Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Cloud Identity Manager
Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Cloud Identity Manager
WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Cloud Identity Manager
Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Cloud Identity Manager
Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationRelease Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved
Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ========================================================== Release date:
More informationMcAfee Cloud Identity Manager
Jive Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationFirewall Enterprise epolicy Orchestrator
Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationRelease Notes - McAfee Deep Defender 1.0
Release Notes - McAfee Deep Defender 1.0 About this document About this release Features Known issues Documentation Before installing McAfee Deep Defender 1.0 Installing McAfee Deep Defender 1.0 About
More informationData Loss Prevention Discover 11.0
Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationRelease Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved
Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix 904321 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ==========================================================
More informationMcAfee SiteAdvisor Enterprise 3.5.0
Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide
McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide COPYRIGHT Copyright 009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationRelease Notes for McAfee(R) VirusScan Enterprise for Linux Version Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved
Release Notes for McAfee(R) VirusScan Enterprise for Linux Version 1.9.0 Hotfix 872066 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ============================================================ Release
More informationProduct Guide. McAfee Plugins for Microsoft Threat Management Gateway Software
Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee Web Gateway. for Riverbed Services Platform
Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Change Control Using Change Reconciliation and Ticket-based Enforcement
6.0.0 Using Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee. Deployment and User Guide. epo 4 / Endpoint Encryption
McAfee Deployment and User Guide epo 4 / Endpoint Encryption 1 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee
More informationMcAfee Solidcore Platform Support Matrix Version (Nov 16, 2011)
McAfee Solidcore Platform Support Matrix Version 5.1.2 (Nov 16, 2011) COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Host Intrusion Prevention 8.0
Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,
More informationMcAfee Content Security Reporter 2.6.x Migration Guide
McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMigration Guide. McAfee Content Security Reporter 2.4.0
Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationTotal Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More information========================================================== Release date: December 03, This release was developed and tested with:
Release Notes for McAfee(R) Security (TM) for Lotus Domino, version 7.5 on Microsoft Windows. Rollup1 Copyright (C) 2012 McAfee, Inc. All Rights Reserved ==========================================================
More informationMcAfee MVISION Endpoint 1808 Installation Guide
McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationInstallation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform
Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform version 7.0.1.02 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be
More informationMcAfee Content Security Reporter 2.6.x Installation Guide
McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationInstallation Guide. McAfee Web Gateway Cloud Service
Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationProduct Guide Revision A. McAfee Client Proxy 2.3.2
Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee epolicy Orchestrator 5.9.1
Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright
More informationInstallation Guide. McAfee Endpoint Security for Servers 5.0.0
Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)
McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationArchiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides
Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks
More informationMcAfee MVISION Endpoint 1811 Installation Guide
McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Rogue Database Detection For use with epolicy Orchestrator Software
McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationMcAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS
More informationMcAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)
McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationBoot Attestation Service 3.0.0
Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Boot Attestation Service 3.5.0
Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)
McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.4.0
Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Client Proxy Installation Guide
McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,
More informationAccount Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013
Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature
More informationMcAfee MVISION Mobile IBM MaaS360 Integration Guide
McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee
More informationMcAfee Client Proxy Product Guide
McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationMcAfee MVISION Mobile Silverback Integration Guide
McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee
More informationMcAfee MVISION Mobile Microsoft Intune Integration Guide
McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active
More informationMcAfee epolicy Orchestrator Software
User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)
McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee Investigator Product Guide
McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,
More informationMcAfee MVISION Mobile IBM MaaS360 Integration Guide
McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationReference Guide Revision B. McAfee Cloud Workload Security 5.0.0
Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Policy Auditor 6.2.2
Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationMigration Guide. McAfee File and Removable Media Protection 5.0.0
Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationHardware Guide. McAfee MVM3200 Appliance
Hardware Guide McAfee MVM3200 Appliance COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis,
More informationAddendum. McAfee Virtual Advanced Threat Defense
Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationMcAfee Data Protection for Cloud 1.0.1
Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationProduct Guide. McAfee Endpoint Upgrade Assistant 1.5.0
Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee MVISION Mobile epo Extension Product Guide
McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationAddendum. McAfee Virtual Advanced Threat Defense
Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or
More informationInstallation Guide. McAfee epolicy Orchestrator software D R A F T
Installation Guide McAfee epolicy Orchestrator 4.6.0 software COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)
McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Application Control Windows Installation Guide. (Unmanaged)
McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide
McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee MVISION Mobile Citrix XenMobile Integration Guide
McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active
More informationMcAfee Network Security Platform
Revision K McAfee Network Security Platform (NS-series Interface Modules Reference Guide) COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Security
Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the
More informationMcAfee epolicy Orchestrator 4.5 Reporting Guide
McAfee epolicy Orchestrator 4.5 Reporting Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationBest Practices Guide. Amazon OpsWorks and Data Center Connector for AWS
Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active
More informationMcAfee Network Security Platform
Reference Guide Revision I McAfee Network Security Platform NS-series Interface Modules COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationInstallation Guide Revision B. McAfee Cloud Workload Security 5.0.0
Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee epo Deep Command 1.0.0
Product Guide McAfee epo Deep Command 1.0.0 For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)
McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)
McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Upgrade Assistant 2.3.x Product Guide
McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee File and Removable Media Protection Installation Guide
McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationMcAfee Endpoint Security for Servers Product Guide
McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More informationMcAfee Management for Optimized Virtual Environments AntiVirus 4.5.0
Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel
More informationProduct Guide. McAfee Web Gateway Cloud Service
Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Endpoint Security Threat Prevention Installation Guide - Linux
McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide
McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationReference Guide. McAfee Security for Microsoft Exchange 8.6.0
Reference Guide McAfee Security for Microsoft Exchange 8.6.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationProduct Guide. McAfee Web Gateway Cloud Service
Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationMcAfee Agent 4.5 Product Guide
McAfee Agent 4.5 Product Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationMcAfee Endpoint Security Threat Prevention Installation Guide - macos
McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy
More informationMcAfee MVISION Mobile AirWatch Integration Guide
McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and
More informationProduct Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6
Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Application Control Windows Installation Guide
McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee File and Removable Media Protection 6.0.0
Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the
More informationProduct Guide. McAfee Content Security Reporter 2.4.0
Product Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,
More information