Client Proxy interface reference

Similar documents
Client Proxy interface reference

Client Proxy interface reference

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

Product Guide Revision A. McAfee Client Proxy 2.3.2

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Installing Client Proxy software

Deploying the hybrid solution

Installation Guide. McAfee Web Gateway Cloud Service

McAfee Client Proxy Installation Guide

Interface Reference topics

McAfee Security-as-a-Service

McAfee Firewall Enterprise epolicy Orchestrator Extension

Product Guide. McAfee Web Gateway Cloud Service

Managing Client Proxy

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Data Loss Prevention Prevent 11.1.x Release Notes

Product Guide. McAfee Web Gateway Cloud Service

McAfee File and Removable Media Protection Product Guide

NGFW Security Management Center

SCCM Plug-in User Guide. Version 3.0

McAfee Web Gateway Administration

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Cloud Help for Community Managers...3. Release Notes System Requirements Administering Jive for Office... 6

Migration Guide. McAfee Content Security Reporter 2.4.0

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Drive Encryption Administration Course

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Parallels Remote Application Server

Stonesoft Management Center. Release Notes Revision B

Migration Guide. McAfee File and Removable Media Protection 5.0.0

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security

McAfee epolicy Orchestrator Release Notes

What s New in Fireware v12.3 WatchGuard Training

McAfee Content Security Reporter 2.6.x Installation Guide

NGFW Security Management Center

NGFW Security Management Center

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

8.0 Help for Community Managers Release Notes System Requirements Administering Jive for Office... 6

McAfee Change Control Linux Product Guide. (McAfee epolicy Orchestrator)

LiveNX Upgrade Guide from v5.1.2 to v Windows

Pulse Connect Secure. Network Connect and Windows Secure Access Manager (WSAM) Error Messages. Product Release 8.1

Dell Client System Update Version 1.0. User s Guide

This document contains important information about the current release. We strongly recommend that you read the entire document.

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

NGFW Security Management Center

McAfee MVISION Endpoint 1811 Installation Guide

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

AT&T SD-WAN Network Based service quick start guide

Parallels Remote Application Server

Product Guide. McAfee Content Security Reporter 2.4.0

McAfee Endpoint Security

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide Revision B. McAfee Active Response 2.2.0

Adobe Marketing Cloud Bloodhound for Mac 3.0

Stonesoft Management Center. Release Notes Revision B

Device Set-Up. User s Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee epolicy Orchestrator Release Notes

USER GUIDE. Snow Integration Manager. Version 5.5. Release date Document date SNOWSOFTWARE.COM

Product Guide. McAfee GetSusp

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

Veritas Desktop and Laptop Option 9.2

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

FieldView. Management Suite

NGFW Security Management Center

NGFW Security Management Center

AirWatch Troubleshooting Guide Revised 23 January 2018

Parallels Remote Application Server

TechDirect User's Guide for ProDeploy Client Suite

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

McAfee Application Control/ McAfee Change Control Administration

McAfee Firewall Enterprise and 8.3.x

1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017

Security Explorer 9.1. User Guide

OpenText RightFax 10.5 Connector for HP OXPd MFP Administrator s Guide

KYOCERA Net Viewer User Guide

Guide Installation and User Guide - Windows

MEDIASEAL Encryptor Client Manual

NGFW Security Management Center

Installing and Configuring vcloud Connector

Service Manager. powered by HEAT. Migration Guide for Ivanti Service Manager

Print and Copy Vending

XDS Connector. Installation and Setup Guide. Version: 1.0.x

Manage Your Inventory

Installing a CoreStreet Responder

Release Note (Mar, 2018) Content Manager Version (for Mac) [About Content Manager] [Important Notice] [Main Function of Content Manager]

McAfee MVISION Endpoint 1808 Installation Guide

McAfee Application Control Windows Installation Guide

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager

Interface reference. McAfee Policy Auditor Interface Reference Guide. Add Service Level Agreement page

Copyright 2017 Softerra, Ltd. All rights reserved

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Transcription:

McAfee Client Proxy 2.3.5 Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page of the Policy Catalog, you can create, import, export, rename, duplicate, delete, view, and edit policies. The Client Proxy policy named McAfee Default is read-only. It can be duplicated and saved with a new name, but it cannot be renamed, deleted, exported, or edited. Table 1 Client Proxy policy options New Policy Import Export Name Owner Opens the Create a new policy dialog box, where you can select an existing policy to use as a template for a new policy and specify a name. Opens the Import Policies dialog box, where you can browse for the.xml file that has the policy you want to import. Opens the Export page, where you have these options: Click the link Opens a new tab in your web browser, where you can view the policy in XML format. Right-click the link, then select Save Link As, choose a folder, and optionally update the file name Downloads the policy to an.xml file. Default file name: Policies_For_McAfee_Client_Proxy_<x.y.z>.xml <x.y.z> specifies the version number of Client Proxy. Opens the policy settings, which you can edit and save. Opens a list of users and groups, where you can select the policy owners and save any changes. 1

Table 1 Client Proxy policy options (continued) Assignments Actions Opens the list of nodes, where the policy is assigned. Rename Opens the Rename Policy dialog box, where you specify a new name for the policy. Duplicate Opens the Duplicate Existing Policy dialog box, where you specify a name for the new policy that is based on an existing policy. Delete Opens the Delete Policy dialog box, where you confirm that you want to delete the policy. Export Opens the same page as the Export button. Proxy Servers page Configure the list of proxy servers and rules that the Client Proxy software uses when redirecting network traffic. Table 2 Proxy Servers options Specify how the software selects a proxy server from the list. Select an option: connect to the first accessible Proxy Server based on their order in the list below The software selects the next proxy server from the list that you configure. connect to the Proxy Server which has the fastest response time The software selects the next proxy server from the list that it maintains, which is based on response time. Proxy Server Address Proxy Port HTTP/HTTPS Non-HTTP/HTTPS Redirected Ports Enable Auto proxy switch over Polling interval Specify additional ports that you would like to redirect as HTTP/HTTPS traffic Specifies the IP address or host name of the proxy server. Specifies the port number of the proxy server. The software redirects all traffic sent to ports 80 and 443 to a proxy server. Specifies the port numbers of protocols other than HTTP/HTTPS whose traffic you want redirected. Verify that the proxy server supports these protocols. The software checks the proxy server list at the specified interval to see if a higher priority server is available. If available, the software automatically switches to it. Specifies how often the software checks the proxy server list to see if a higher priority server is available. Range: 10 3600 seconds Recommended value: 60 seconds Specifies the numbers of other ports whose traffic you want redirected like HTTP/ HTTPS traffic. For example, you can redirect requests sent to an application the same as requests sent to a web browser. 2

Table 2 Proxy Servers options (continued) Block Traffic on above configured Ports if none of the Proxy servers is reachable Bypass proxy server for local addresses When none of the configured proxy servers can be reached, the software: Selected Blocks all traffic sent to the configured ports and default ports 80 and 443. Deselected Continues to redirect all traffic sent to the configured ports and default ports 80 and 443. Selected The software does not redirect traffic sent to local addresses inside your network. Deselected The software redirects all traffic, including traffic sent to local addresses inside your network, to a proxy server. This setting is selected by default. Client Configuration page Configure the settings that the Client Proxy software uses to redirect web requests based on the location of the endpoint: inside or outside the network or connected to the network by VPN. Table 3 Customer Identifier (McAfee epo) Category Customer Identifier Before configuring this page, download the customer ID.xml file from the Web Gateway or McAfee WGCS server. You must have this information to save the configuration. Table 4 Shared Password (McAfee epo Cloud) Browse Unique Customer ID Shared Password Category Configure Shared Password After you enter the shared password, you must save the new policy for the password to be updated in the system. Allow enough time for this process to complete. Otherwise, authentication fails. Shared Password Reset Customer Credentials Export Customer Credentials Click to locate the.xml file with the customer ID and shared password. Displays the customer ID imported from the XML file. Displays the hashed shared password imported from the XML file. Enter and confirm the password that Client Proxy and McAfee WGCS use to communicate securely. When clicked, opens a warning dialog box, where you can confirm that you want to change the shared password. When clicked, opens a dialog box, where clicking Export Password opens a new tab in the web browser with the password and customer ID displayed in XML format. 3

Table 5 Client Configuration options Category Traffic Redirection Settings Redirect network traffic when computer is not connected to corporate network and not working through VPN Always redirect network traffic to proxy servers The software redirects web requests to a proxy server in this case: The user is working outside your organization's network and is not connected to the network by VPN. The software redirects web requests to a proxy server in all cases: The user is working inside your organization's network. The user is working outside your network and is connected by VPN. The user is working outside your network and is not connected by VPN. Corporate Network Detection Detect if MCP is inside the corporate network Select an option: by testing connectivity to epo The software determines whether the endpoint is inside the network by pinging the McAfee epo server. Best practice: We recommend this option. Corporate VPN Detection Active Directory Groups Filter Server Address Server Port Detect if MCP is connected to a corporate VPN Server Address Server Port Regular Expression Include / Exclude by testing connectivity to any of the following corporate servers The software determines whether the endpoint is inside the network by pinging the specified servers on the network. Specifies the IP address or host name of a server on your organization's network. Specifies the port number of the server on your organization's network. Specifies the addresses of one or more VPN servers. The software determines whether the endpoint is connected to the VPN by pinging the servers you specify. Specifies the IP address or host name of a VPN server on your organization's network. Specifies the port number of the VPN server on your organization's network. Specifies the names of one or more Active Directory groups. The software uses the names to filter the groups in the header that it adds to web requests before redirecting them to the proxy server. Format: <domain_name>\\<group_name> Group membership information must not exceed 4096 characters. For each regular expression, select an option: Include Includes the Active Directory name in the header added to the web request. Exclude Excludes the Active Directory name in the header added to the web request. 4

Table 5 Client Configuration options (continued) Category Log File Settings (OS X Only) Specifies how much information the software logs to a file. Select an option: Log messages with Error and Critical priority Log messages with Error, Critical, Information, and Warning priority Log all messages (recommended for troubleshooting and debugging) Don't log any messages Log files are located in the following folder on the endpoint running macos: C:\Program Data\McAfee\MCP\Logs Access Protection (Windows Only) Enable access protection Request release key for manual uninstall Users are allowed to: Use Windows Task Manager to disable the software Edit or delete files Change registry values Selected Users can request a release code from an administrator and use it to uninstall the software. Deselected Users must use the Windows uninstall feature to uninstall the software. Best practice: Use a release code to uninstall the software. Bypass List page The Client Proxy software allows web requests that match the items in the bypass list to pass the proxy server and go directly to the Internet. To add items to the bypass list, select them from the Common Catalog instance that is linked to the Client Proxy policy. Table 6 Bypass List options Actions From the drop-down list, select: Add bypass list item Select an item type, then select one or more items from the Common Catalog, and add them to the bypass list. Domain Name Network Address Network Port Process List Edit/View Edit the selected item in the bypass list. Remove Remove the selected items from the bypass list. Show selected rows Only the selected items in the bypass list are shown. 5

Block List page Configure the list of processes that the Client Proxy software blocks from accessing the Internet. Table 7 Block List options Allow traffic to go directly to destination Block traffic for all processes (except bypass listed processes) The software allows all processes to access the Internet without going through a proxy server. The software blocks all processes from accessing the Internet (except processes included on the bypass list). Best practice: Use this option as a last resort. It can block system processes from reaching the Internet and prevent normal operation on the endpoint. Block traffic only for the following processes Allows you to configure the names of processes that you want blocked from accessing the Internet and add them to the block list. Copyright 2018 McAfee, LLC McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. 6 0A-00