McAfee Security Connected Integrating epo and MVM

Similar documents
McAfee Security Connected Integrating EPO and MAM

McAfee Security Connected Integrating epo and MFECC

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator

McAfee Security-as-a-Service

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Total Protection for Compliance: Unified IT Policy Auditing

McAfee MVISION Mobile epo Extension Product Guide

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Data Protection for Cloud 1.0.1

McAfee epolicy Orchestrator

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Release Notes McAfee Change Control 8.0.0

Deploying the hybrid solution

McAfee Endpoint Security for Servers Product Guide

McAfee Boot Attestation Service 3.5.0

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control/ McAfee Change Control Administration

Module 2: AlienVault USM Basic Configuration and Verifying Operations

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

McAfee Red and Greyscale

Installation Guide. McAfee Web Gateway Cloud Service

Boot Attestation Service 3.0.0

AlienVault USM Appliance for Security Engineers 5 day course outline. Module 2: USM Appliance Basic Configuration and Verifying Operations

Installing Client Proxy software

Lab Test Report DR110208B. McAfee Risk Management Solution. February 8, 2011

ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA. Technical Setup and User Guide

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Administering System Center 2012 Configuration Manager

McAfee MVISION Endpoint 1811 Installation Guide

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

CounterACT VMware vsphere Plugin

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Automating the Top 20 CIS Critical Security Controls

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

McAfee Network Security Platform 8.1

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Administering System Center Configuration Manager

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

McAfee MER for EPO 3.1 Walkthrough Guide. About this guide This guide provides information on how to use McAfee MER for EPO 3.1.

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Loss Prevention Endpoint

McAfee Change Control Using Change Reconciliation and Ticket-based Enforcement

McAfee Firewall Enterprise epolicy Orchestrator Extension

Administering System Center 2012 Configuration Manager

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee Cloud Workload Security Product Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee Data Loss Prevention Endpoint

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

CloudHealth. AWS and Azure On-Boarding

McAfee Embedded Control for Retail

Migration Guide. McAfee File and Removable Media Protection 5.0.0

McAfee Application Control 6.2.0

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

Comodo One Software Version 3.26

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

McAfee Total Protection for Data Loss Prevention

McAfee Network Security Platform 8.3

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.

Managing Client Proxy

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Administering System Center Configuration Manager

Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs

Resolution: The DataChannel servlet no longer stops working, regardless of the state of the DataChannel extension.

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Tenable for Palo Alto Networks

IBM IBM Tivoli Endpoint Manager V8.1 Implementation.

Qualys Cloud Platform

Administering System Center Configuration Manager

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

This document provides instructions for the following products.

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

IT-Security Symposium in Stuttgart. Workshop McAfee Device-to-Cloud, Erweiterte Endpunktsicherheit für Microsoft Umgebungen

ForeScout Extended Module for Qualys VM

Endpoint Intelligence Agent 2.2.0

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

10747D: Administering System Center 2012 Configuration Manager

Data Loss Prevention Endpoint

McAfee Client Proxy Product Guide

Digital Defense Frontline VM 6.0

Chapter 5: Vulnerability Analysis

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee MVISION Endpoint 1808 Installation Guide

Comodo Dome Shield - Admin Guide

A: Administering System Center Configuration Manager

PostgreSQL Solution 1.1

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541

Transcription:

McAfee Security Connected Integrating epo and MVM

Table of Contents Overview 3 User Accounts & Privileges 3 Prerequisites 3 Configuration Steps 3 Optional Configuration Steps for McAfee Risk Advisor 2.7.2 6 Value Add 7 FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March 5, 2014 2

Overview Integration between McAfee epo 5.0.1 and McAfee MVM 7.5. Adds the ability to pull MVM scan data into epo along with MVM asset information. User Accounts & Privileges Administrative rights to McAfee epo & MVM. Access to the Operating Systems, Databases, and Application Consoles. Prerequisites Download the MVM 7.5 epo Extension. Configuration Steps 1. Log in to the epo Server as administrator (OS Log in) 2. Locate the MVM_750_ePO50Extension.zip file. a. Download from the McAfee download site with a valid Grant Number. 3. Unzip the extension file 4. Run Setup.exe a. Once all required applications are found click Next b. Enter the epo Global Administrator User Name and Password Next FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March 5, 2014 3

c. Enter the IP Address of the MVM Server Next d. Enter the Port Number (default 3801) e. Click Next to begin the installation then click Finish 5. Log in to the epo Application Console with the Global Administrator Account 6. Browse to Menu Registered Servers 7. Select New Server FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March 5, 2014 4

8. Select MVM as the Server type and Enter a Name for the MVM Server Next 9. Enter the Database IP Address or Host Name for the MVM database 10. Keep Default selected for Server Instance 11. Enter the Database name. (MVM default is faultline) 12. Select Authentication Type Windows Authentication 13. Enter the user name for the Windows Authentication a. Note: Workgroup servers should use the server name\username format. Workgroup\username will not work most likely b. Note: Domain servers should use domain\username format 14. Enter the password for the user 15. Select the Organization check box and enter the organization name used for the MVM Server a. Selecting Organization will import all assets discovered by MVM to the epo server. b. Optional: Select Import assets from epo data source and Import assets from asset tag (these are not covered in this document) FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March 5, 2014 5

16. Click Test Connection. 17. If the Connection is successful click Save 18. Browse to Menu Server Tasks 19. Locate the task MVM: Maintain association between MVM and epo 20. Ensure that task is enabled 21. Click New Task at the bottom of the console 22. Name the task MVM Data Import Next 23. Select MVM Data Import from the Actions Drop Down a. Select the Server Name b. Select Delta 24. Click Next 25. Schedule the task to run at a desired time Next Save Optional Configuration Steps for McAfee Risk Advisor 2.7.2 1. Install McAfee Risk Advisor (Not Covered in this document) 2. Deploy the McAfee Application Inventory Agent bundled with MRA 2.7.2 3. Schedule application data collection from the McAfee Application Inventory Agent a. The default policy will collect data from endpoints every day b. Select systems in the system tree then Actions Application Inventory Collect Application Data Now to pull data on demand 4. Browse to Menu Server Tasks a. Enable server task MRA Threat Download and Analysis b. Enable server task MRA Reporting Group Analysis 5. Countermeasure What-if Risk Analysis can be measured 6. Browse to Menu Risk Metrics 7. Apply a countermeasure product Click Apply and Analyze Latest After Analysis results FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March 5, 2014 6

8. The system will provide metrics on how the system(s) risk score will decrease after deploying products. MVM helps this effort by providing MRA risk information about systems in the environment. Value Add The systems discovered by McAfee Vulnerability Manager using the Discovery Scan and imported to the epolicy Orchestrator database can be organized using the System Tree groups and subgroups. An efficient and well-organized System Tree can simplify maintenance. This allows administrators to identify unmanaged systems and work towards a fully managed environment more efficiently. Additionally, host vulnerability information is imported the epolicy Orchestrator dashboards for MVM. This helps administrators consolidate host threat events and host vulnerability information into one console. When McAfee Risk Advisor is installed on the epolicy Orchestrator Server all host threat events are compared to host vulnerability information so that countermeasure recommendations are available for quick remediation and a path to more comprehensive environment protection. FOR INTERNAL AND CHANNEL USE ONLY Rev 1 March 5, 2014 7