McAfee ePolicy Orchestrator
:
A single console for all your security
management
McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced,
extensible, and scalable centralized security management software in the
industry.
§ Get a unified view of your security posture
with drag-and-drop dashboards that provide security intelligence across
endpoints, data, mobile and networks.
§ Simplify security operations with streamlined
workflows for proven efficiencies.
§ Flexible security management options allow you
to select either a traditional premises-based or a cloud-based
management version of McAfee ePO.
§ Leverage your existing third-party IT
infrastructure from a single security management console with our extensible
architecture.
EPO
Description
McAfee ePolicy Orchestrator is a
server based application that monitors and controls McAfee end-point-protection
packages. It uses a Microsoft SQL database for its backend data storage. The
two prominent managed packages are McAfee VirusScan Enterprise and Groupshield.
McAfee VirusScan Enterprise or VSE is the current server and workstation
anti-virus client used on Windows and Linux systems. Groupshield is the current
anti-virus solution for our Exchange email servers.
McAfee ePolicy Orchestrator
server, "EPO" for short, enables enterprise-level control and
monitoring for our McAfee security clients. It has a user friendly web
interface console that has a lot of flexibility. Some examples are Active
Directory synchronization, pushing clients, upgrading clients, sorting based on
IP, global policy control for all systems, automated notifications, event
correlation, report generation and a very customizable Dashboard section for
easy daily monitoring of all 6,500+ systems.
An agent installation is required
for the EPO server to manage Windows and Linux hosts. The installation is small
and doesn't require a reboot. The agent install file is compiled by the EPO
server with specific security keys and connection information pertaining to the
EPO server.
McAfee EPO
Server Port List
Introduction
This
article lists all the network ports used by the McAfee ePolicy Orchestrator 4.5
server.
Network Port List
Source
|
Target
|
Port
|
Protocol
|
Description
|
EPO Client
|
EPO Server
|
8080
|
TCP
|
Agent to
Server Communication
|
EPO Client
|
EPO Server
|
4443
|
TCP
|
Agent to
Server Communication Secure
|
EPO Server
|
EPO Client
|
8081
|
TCP
|
Agent
Wake-up Communication
|
EPO Server
|
EPO Client
|
8082
|
UDP
|
Agent Broadcast
Communication (Client Listening)
|
Admin PC
|
EPO Server
|
4443
|
TCP
|
Web
Console to Application Server Communication
|
Admin PC
|
EPO Server
|
8444
|
TCP
|
Client to
Server Authenticated Communication
|
McAfee EPO
Agent Supported Operating Systems List
Summary
As Microsoft releases new operating systems or Service Packs,
the original McAfee product guides might not reflect the current McAfee support
policy for those platforms.
Most of the information below is available in the product
installation guides and Readme.txt files, however some of the information
is available only in Product Management Statements published in the McAfee
KnowledgeBase.
Microsoft Windows supported operating systems
The following tables detail the McAfee products supported for
use on Windows workstation and server operating systems. Only the most current
versions are included as most customers upgrade to the latest Service Packs
shortly after they are released.
Supported ePolicy Orchestrator versions
Version
|
CMA 3.5.5
|
CMA 3.6.0
|
MA 4.0
|
MA 4.5
|
MA 4.6
|
ePolicy Orchestrator
4.6
|
No
|
No
|
Yes
|
Yes
|
Yes
|
ePolicy Orchestrator
4.5
|
No
|
Yes*
|
Yes
|
Yes
|
Yes
|
ePolicy Orchestrator 4.0
|
Yes*
|
Yes*
|
Yes
|
Yes
|
No
|
* CMA 3.5.5 and 3.6.0 reached End of Life (EOL) on March 31,
2010. See KB60789 for details. CMA 3.6.0 Patch
4 wasthe minimum supported version with ePO 4.5. CMA = Common Management Agent
MA = McAfee Agent
Definitions
End of Support (EOS)
Notification
|
The notification
that establishes when the discontinued product will no longer have General
Availability. EOS Notification begins the EOL process.
|
End of Life (EOL)
Period
|
The EOL Period
refers to the timeframe beginning with the day that McAfee notifies its
intentions to discontinue a product until the last date that the product is
formally supported. In general, after the EOL Period is announced, product
enhancements are not made.
|
End of Support
|
The last day that
the product is supported according the terms of McAfee’s standard support
offering.
|
McAfee EPO Web
Console
2.
Username should be your Best domain administrator account
usually prefaced with "X"
3.
The password is authenticated against Active Directory
Example
Login
Screen
Enter your assigned username and password. Usually it's your normal Best domain account. Don't enter the domain name.
Enter your assigned username and password. Usually it's your normal Best domain account. Don't enter the domain name.
Figure A
McAfee EPO
Server Dashboards
Purpose
This article covers some of the
basic usage of the Dashboards in our McAfee ePolicy Orchestrator 4.5 web
console interface.
EPO
Dashboard Description
The McAfee ePolicy Orchestrator
web console Dashboards are designed primarily for instant up-to-date report
data of the McAfee managed environments. Dashboards are completely customizable
by the web console user. It does not take a McAfee EPO expert or administrators
to create your own Dashboards that suit you’re needed. The way Dashboards are
created is through the EPO Queries section. Basically reporting queries can be
created fairly quickly through and intuitive wizard. These can be used
standalone or linked into a Dashboard.
So, all the Dashboards besides
the default ePO Summary Dashboard have been created by making queries and
linking them into the different Dashboards.
There are several already created
which can be used as examples to create your own custom Dashboard if desired.
Basically, the purpose of the
Dashboards it for the support personnel that help keep the McAfee environments
healthy can frequently login, look over their Dashboards and know the status of
their environment.
This is also McAfee solution to
spamming reports out via email. Which you could do if needed, but the preferred
method is to simply login and check your Dashboards. From the Dashboards you
can easily export data to many common formats such as CSV and PDF as needed.
When
you login for the first time you will have a single default Dashboard named ePO
Summary
Go to again login figure A
Select and
Arrange Existing Dashboards
You can add or remove Public or
private (My) Dashboards that are all ready created to your user profile active
Dashboard list through one of these solutions. These selections will be saved
to your user profile and remain for the following logins.
Solution 1
1.
Select Options\Manage Dashboards
2.
Select the Dashboard you wish to add on the left under Public
Dashboards
3.
Select Make Active
4.
OK
Figure B
Adding Dashboards
Solution 2
1.
Select Options\Select
Active Dashboards
2.
Click the grey circle
with white chevron next to existing Dashboard on left that you wish to add
3.
Either use the arrows
on the Active Dashboards to sort or drag and drop to rearrange order on right
blue bar
4.
Click the X on an
Active Dashboard to remove it
1.
This does not delete
the Dashboard.
Figure 3
Select and Arrange Dashboards
Repeat solution steps to add as many Dashboards as you want.
Recommended Dashboards
IS Operations
·
Client Overview
·
Problem Systems
·
Servers
·
Threat Overview
IS Desktop and Service Desk
·
Client Overview
·
Problem Systems
·
Workstations
·
Threat Overview
Figure 4
Added Dashboards
Tip: The far left Dashboard will be the default
Dashboard viewed upon login. Also, Dashboards can be activated or deactivated
in this management section as well.
Note: Threat Overview is slow to load because of
all the data it pulls. The three Threats (Timeframe) Dashboards were partial
created to address that issue. These three can be used instead because they
load faster and have threats broke down by site (EPO Groups sorted by IP).
McAfee EPO Server Queries
Description
The EPO server queries have several
purposes. The top three are for building Dashboards, automated server tasks,
and generating reports. Dashboards basically are user interfaces to view live
reports that built queries pull. This is where most time will be spent by
administrators to monitor the status of the McAfee environments through the EPO
web console. Automated server tasks use queries to execute actions. Such as, a
query to list all unmanaged systems is built and then a server task uses that
list to remove them daily before repopulating from and Active Directory sync.
Lastly, queries can be used to pull data from the EPO database and generate
reports. These reports can be exported in several formats including CSV, XML,
HTML and PDF. They can also be setup to automatically be emailed. The queries
are very customizable and fairly simple to create. Meaning you don’t need to
know a scripting language to create them, because it’s all done through a web
wizard interface from the EPO web console.
Queries
Queries are configurable objects that
retrieve and display data from the database. The results of queries are
displayed in charts and tables. Any query’s results can be exported to a
variety of formats, any of which can be downloaded or sent as an attachment to
an email message. Most queries can be used as dashboard monitors.
Query results are actionable
Query results are now actionable.
Query results displayed in tables (and drill-down tables) have a variety of
actions available for selected items in the table. For example, you can deploy
agents to systems in a table of query results. Actions are available at the
bottom of the results page.
Queries as dashboard monitors
Most queries can be used as a
dashboard monitor (except those using a table to display the initial results).
Dashboard monitors are refreshed automatically on a user-configured interval
(five minutes by default).
Exported results
Query results can be exported to
four different formats. Exported results are historical data and are not
refreshed like other monitors when used as dashboard monitors. Like query
results and query-based monitors displayed in the console, you can drill down
into the HTML exports for more detailed information. Unlike query results in
the console, data in exported reports is not actionable.
Reports are available in several formats:
·
CSV — Use the data in a spreadsheet application (for example,
Microsoft Excel).
·
XML — Transform the data for other purposes.
·
HTML — View the exported results as a web page.
·
PDF — Print the results.
Sharing queries between servers
Any query can be imported and
exported, allowing you to share queries between servers. In a multi-server
environment, any query needs to be created only once.
Public and personal queries
Queries can be personal (private)
or public. Private queries exist in the user’s My Groups list, and are available only to their
creator. Public queries exist in the Shared
Groups list, and are
available to everyone who has permissions to use public queries. By default,
all of ePolicy Orchestrator default queries are public. However, not all users
have permission to view queries automatically. Additionally, users must have
permissions to view queries to be able to view all of the default dashboards,
because some of the monitors on these dashboards are created by queries. Only
users with appropriate permissions can make their personal queries public ones.
NOTE: If migrating from ePolicy Orchestrator 4.5, any queries that were private in version 4.0 remain private in this version. These private queries are located in the Migrated Queries group inside the My Groups list. Public queries that are migrated are located in the Shared Groups list in the Migrated Queries group.
NOTE: If migrating from ePolicy Orchestrator 4.5, any queries that were private in version 4.0 remain private in this version. These private queries are located in the Migrated Queries group inside the My Groups list. Public queries that are migrated are located in the Shared Groups list in the Migrated Queries group.
Query permissions
Use query permissions to assign
specific levels of query functionality to permission sets, which are assigned
to individual users. To run most queries, you also need permissions to the
feature sets associated with their result types. In a query’s results pages,
the available actions to take on the resulting items depend on the feature sets
a user has permission to.
Available permissions include:
Available permissions include:
·
No permissions — The Query tab is unavailable to a user with
no permissions.
·
Use public queries — Grants permission to use any queries that
have been made public.
·
Use public queries; create and edit personal
queries — Grants
permission to use any queries that have been made public, as well as the
ability to use the Query Builder wizard to create and edit personal queries.
·
Edit public queries; create and edit personal
queries; make personal queries public
·
Grants permission to use and edit any public queries, create and
edit any personal queries, as well as the ability to make any personal query
available to anyone with access to public queries.
Query
Builder
ePolicy Orchestrator provides an
easy, four-step wizard that is used to create and edit custom queries. With the
wizard you can configure which data is retrieved and displayed, and how it is
displayed.
Result types
The first selection you make in
the Query Builder wizard is a result type from a feature group. This selection
identifies what type of data the query retrieves, and determines the available
selections in the rest of the wizard.
Chart types
ePolicy Orchestrator provides a
number of charts and tables to display the data it retrieves. These and their
drill-down tables are highly configurable.
NOTE: Tables do not include drill-down tables.
NOTE: Tables do not include drill-down tables.
Chart Type Groups
Pie:
·
Boolean Pie Chart
·
Pie Chart
Bar:
·
Grouped Bar Chart
·
Singe Group Bar Chart
·
Stacked Bar Chart
Summary:
·
Multi-group Summary Table
·
Single Group Summary Table
Line:
·
Multi-line Chart
·
Single Line Chart
List:
·
Table
Table columns
Specify columns for the table. If
you select Table as the primary display of the data,
this
configures that table. If you
select a type of chart as the primary display of data, this configures
the drill-down table.
Query results displayed in a
table are actionable. For example, if the table is populated with
systems, you can deploy or wake
up agents on those systems directly from the table.
Filters
Specify criteria by selecting
properties and operators to limit the data retrieved by the query.
Creating custom queries
Use this task to create custom
queries with the Query Builder wizard. You can query on system
properties, product properties,
many of the log files, repositories, and more.
1.
Click Menu |
Reporting | Queries, then click Actions
| New Query. The Query Builder wizard opens.
2.
On the Result Type page, select the Feature Group and Result
Type for this query, then
click Next. The Chart page
appears.
NOTE: This choice determines the options available on subsequent pages of the wizard.
NOTE: This choice determines the options available on subsequent pages of the wizard.
3.
Select the type of chart or table to display the primary results
of the query, then click Next.
The Columns page appears.
NOTE: If you select Boolean Pie Chart, you must configure the criteria to include in the query.
NOTE: If you select Boolean Pie Chart, you must configure the criteria to include in the query.
4.
Select the columns to be included in the query, then click Next. The Filter page appears.
NOTE: If you selected Table on the Chart page, the columns you select here are the columns of that table. Otherwise, these are the columns that make up the query details table.
NOTE: If you selected Table on the Chart page, the columns you select here are the columns of that table. Otherwise, these are the columns that make up the query details table.
5.
Select properties to narrow the search results, then click Run. The Unsaved Query page
displays the results of the query, which is actionable, so you can take any
available actions on items in any tables or drill-down tables.
NOTE: Selected properties appear in the content pane with operators that can specify criteria used to narrow the data that is returned for that property.
NOTE: Selected properties appear in the content pane with operators that can specify criteria used to narrow the data that is returned for that property.
1.
If the query didn’t appear to return the expected results, click Edit Query to go back to the Query Builder and
edit the details of this query.
2.
If you don’t need to save the query, click Close.
3.
If this is a query you want to use again, click Save and continue to the next step.
6.
The Save Query page appears. Type a name for the query, add any
notes, and select one of the following:
1.
New Group — Type the new group name and select either:
1.
Private group (My Groups)
2.
Public group (Shared Groups)
2.
Existing Group — Select the group from the list of Shared Groups.
7.
Click Save.
Running an
existing query
Use this task to run an existing
query from the Queries page.
1.
Click Menu |
Reporting | Queries, then select a query from the Queries list.
2.
Click Actions |
Run. The query results appear. Drill down into the report and take actions
on items as necessary. Available actions depend on the permissions of the user.
3.
Click Close when finished.
Running a
query on a schedule
Use this task to create and
schedule a server task that runs a table-based (list chart type) query
and takes actions on the query
results.
1.
Click Menu |
Automation | Server Tasks, then click Actions
| New Task. The Server Task Builder wizard opens.
2.
On the Description page, name and describe the task, then click Next. The Actions page appears.
3.
From the Actions drop-down menu, select Run Query.
4.
In the Query field, browse to the table-based query
you want to run.
5.
Select the language in which to display the results.
6.
From the Sub-Actions list, select an action to take based
on the results. Available actions depend on the permissions of the user, and
include:
1.
Add to System Tree — Specifies the systems selected from the
query to be added to the System Tree.
2.
Apply Tag — Applies a specified tag to all systems
(that are not excluded from the tag) in the query results. This option is valid
only for queries that result in a table of systems.
3.
Assign Policy — Assigns a specified policy to all systems
in the query results. This option is valid only for queries that result in a
table of systems.
4.
Change Sorting Status — Enables or disables System Tree sorting on
all systems in the query results. This option is valid only for queries that
result in a table of systems.
5.
Clear Agent GUID Sequence Error Count — Clears the agent GUID sequence count found
by the query.
6.
Clear Tag — Removes a specified tag from all systems in
the query results. This option is valid only for queries that result in a table
of systems.
7.
Delete Sensor — Specifies the sensor selected from the
query to be deleted.
8.
Delete Systems — Specifies the systems selected from the
query to be deleted.
9.
Detected System Exceptions — Specifies what to do with the system
exceptions detected by the query.
10.
Email File — Sends the results of the query to a
specified recipient, in a user-configured format (PDF, XML, CSV, or HTML).
11.
Exclude Tag — Excludes a specified tag from all systems
in the query results. This option is valid only for queries that result in a
table of systems.
12.
Export to File — Exports the query results to a specified
format. The exported file is placed in a location specified in the Printing and
Exporting server settings.
13.
Generate Compliance Event — Generates an event based on a percentage or
actual number threshold of systems that do not match the criteria in the query.
This action is intended for compliance-based Boolean pie chart queries that
retrieve data on managed systems (for example, the McAfee Agent and VirusScan
Enterprise Compliance Summary default queries).
14.
Install Rogue Sensor — Specifies when to install a Rogue System
Sensor when the query detects the system.
15.
Move Agent GUID to Duplicate List — Moves an agent GUID to the duplicate list
when it is discovered by the query.
16.
Move System to Another Group — Moves all systems in the query results to a
group in the System Tree. This option is valid only for queries that result in
a table of systems.
17.
Push Agents for Windows — Uses push technology to move agents for
Windows that are detected by the query.
18.
Remove Rogue Sensor — Removes the Rogue System Sensor detected by
the query.
19.
Repository Replication — Replicates master repository contents to
the distributed repositories in the query results. This is valuable for queries
that return a list of out-of-date repositories (for example, the Distributed
Repository Status default query). This option is valid only for queries that
result in a table of distributed repositories.
20.
Resort Systems — Resorts the systems found by the query.
21.
Sensor Blacklist Management — Allows editing of the sensor blacklist
systems detected by the query.
22.
Set System Description — Allows adding a description and four custom
fields.
23.
Transfer Systems — Allows moving systems detected by the query
within the System Tree.
24.
Update Agents — Distributes and updates agents detected by
the query.
25.
Wake Up Agents — Sends a wake-up call to specified systems.
NOTE:<span style="color: #0000ff" /> You are not limited to selecting one action for the query results. Click the + button to add additional actions to take on the query results. Be careful to ensure you place the actions in the order you want them to be taken on the query results.
NOTE:<span style="color: #0000ff" /> You are not limited to selecting one action for the query results. Click the + button to add additional actions to take on the query results. Be careful to ensure you place the actions in the order you want them to be taken on the query results.
7.
Click Next.
The Schedule page appears.
8.
Schedule the task as desired, then click Next. The Summary page appears.
9.
Verify the configuration of the task, then click Save.
The task is added to the list on
the Server Tasks page. If the task is enabled (by default), it runs at the next
scheduled time. If the task is disabled, it only runs by clicking Run next to the task on the Server Tasks
page.
Making a personal query group
Use this task to make personal
query groups that allow you to save personal queries that you
create.
NOTE: You can also create personal query groups
during the process to save a custom query.
Before you begin
You must have appropriate
permissions to perform this task.
1.
Click Menu |
Reporting | Queries, then click Group
Actions | New Group. The New Group page appears.
2.
Type a group name.
3.
From Group
Visibility, select one of the following:
1.
Private group — Adds the new group under My Groups.
2.
Public group — Adds the new group under Shared Groups.
3.
By permission — Adds the new group under Shared Groups.
Users with the following default permissions can view the results:
1.
Executive Reviewer — Only users designated as an Executive
Reviewer can view the results.
2.
Global Reviewer — Only users designated as a Global Reviewer
can view the results.
3.
Group Admin — Only users designated as a Group Admin can
view the results.
4.
Group Reviewer — Only users designated as a Group Reviewer
can view the results.NOTE: Global Administrators have full access to all By permission queries.TIP: You can also specify any
custom user permission sets in your environment.
4.
Click Save.
Making
existing personal queries public
Use this task to make personal
queries public. All users with permissions to public queries have
access to any personal queries
you make public.
Before you begin
You must have appropriate
permissions to perform this task.
1.
Click Menu |
Reporting | Queries. In the Queries list, select the query you want to
make public and click Actionsand
select either:
2.
Move to Different Group — Select the desired shared group from the Select target group menu.
3.
Duplicate — Specify a new name and select the desired
share group from the Group to
receive copy menu. NOTE: The
public group must be created before performing this task.
4.
Click OK.
Duplicating
queries
Use this task to create a query
based on an existing query.
1.
Click Menu |
Reporting | Queries. From the list, select a query to duplicate and click Actions |Duplicate. The
Duplicate dialog box appears.
2.
Type a name for the duplicate and select a group to receive a
copy of the query, then click OK.
Exporting
query results to other formats
Use this task to export query
results for other purposes. You can export to HTML and PDF files
for viewing formats, or to CSV or
XML files for using and transforming the data in other
applications.
1.
Click Menu |
Reporting | Queries then
select the query or multiple queries to export.NOTE: You can also, run the
query from the Queries page and click Options
| Export Data from the query
results page to access the Export page.
2.
Click Actions |
Export Data. The Export page appears.
3.
Select what to export. For chart-based queries, select either Chart data only or Chart
data and drill-down tables.
4.
Select whether the data files are exported individually or in a
single archive (zip) file.
5.
Select the format of the exported file. If exporting to a PDF
file, configure the following:
1.
Select the Page
size and Page orientation.
Optionally select:
Optionally select:
2.
Show filter criteria.
3.
Include a cover page with these text and include the needed text. Select whether
the files are emailed as attachments to selected recipients, or they are saved
to a location on the server to which a link is provided. You can open or save
the file to another location by right-clicking it. NOTE: When typing multiple
email addresses for recipients, you must separate entries with a comma or
semicolon.
1.
Click Export.
The files are created and either
emailed as attachments to the recipients, or you are taken to
a page where you can access the
files from links.
Creating a query to define compliance
Use this task to specify the
properties to be included in a query to define compliance for
Compliance History reporting.
1.
Click Menu |
Reporting | Queries , then
click Actions | New Query.
The Query Builder wizard opens.
2.
On the Result Type page, select System Management as Feature Group, and select Managed Systems as Result Types, then click Next. The Chart page appears.
3.
Select Boolean
Pie Chart from the Display
Result As list, then click Configure
Criteria. The Configure Criteria page appears.
4.
Select the properties to include in the query, then set the
operators and values for each property. Click OK.
When the Chart page appears, click Next.
The Columns page appears.
NOTE: These properties define what is compliant for systems managed by this ePO server.
NOTE: These properties define what is compliant for systems managed by this ePO server.
5.
Select the columns to be included in the query, then click Next.
6.
Select any filters to be applied to the query, click Run, then click Save.
Generating
compliance events
Use this task to create a Run
Query server task using the information that defines compliance.
1.
Click Menu |
Automation | Server Tasks ,
then click Actions | New Task.
The Server Task Builder wizard opens.
2.
On the Description page, type a name for the new task, then
click Next. The Actions
page appears.
3.
From the Actions drop-down menu, select Run Query.
4.
Click browse (...) next to the Query field and select a
query. The Select a query from
the list dialog box appears
with the My Groups tab active.
5.
Select the compliance-defining query. This could be a default
query, such as McAfee Agent
and VirusScan Enterprise (for Windows) Compliance Summary in the Shared Groups section, or a
user-created query, such as one described in Creating a query to define
compliance.
6.
From the Sub-Actions drop-down menu, select Generate Compliance Event and specify the percentage or number
of target systems, then click Next.
The Schedule page appears.
NOTE: Events can be generated by the generate compliance event task if noncompliance rises above a set percentage or set number of systems.
NOTE: Events can be generated by the generate compliance event task if noncompliance rises above a set percentage or set number of systems.
7.
Schedule the task for the time interval needed for Compliance
History reporting. For example, if compliance must be collected on a weekly
basis, schedule the task to run weekly. Click Next.
The Summary page appears.
8.
Review the details, then click Save.
Figure 1
Query Display Page This page displays all the queries you have access to.
Figure 2
New Query Result Type
Managed Systems is used for the majority of the query builds.
Figure 3
New Query Chart Options
Select the type of chart you wish to be displayed when the query is ran.
Tip: You must select table chart if the task is going to be used for an automated task.
Figure 4
New Query Columns Selection
Here you select the items for the query to pull that would be included in the export or if you drilled down in a Dashboard chart using this query.
Figure 5
New Query Filter
Selections
Here you select query options to narrow down the listed that is pulled from the EPO database to exactly what systems you wish to be included in the chart. When done select run.
Figure 6
Run Query
When a query is run the chart is displayed. To make changes to the query select Edit Query. When saticfied with the results or to change the name of an existing query; select save and enter the name and description for the query.
McAfee EPO
Server Threat Event Log
Description
Use the Threat Event Log to
quickly view and sort through events in the database. The log can be purged
only by age. You can choose which columns are displayed in the sortable table.
You can choose from a variety of event data to use as columns. Depending on
which products you are managing, you can also take certain actions on the
events. Actions are available in the Actions menu at the bottom of the page.
Common event
format
Most managed products now use a
common event format. The fields of this format can be used as columns in the
Threat Event Log. These include:
·
Action Taken — Action that was taken by the product in
response to the threat.
·
Agent GUID — Unique identifier of the agent that
forwarded the event.
·
DAT Version — DAT version on the system that sent the
event.
·
Detecting Product Host Name — Name of the system hosting the detecting
product.
·
Detecting Product ID — ID of the detecting product.
·
Detecting Product IPv4 Address — IPv4 address of the system hosting the
detecting product (if applicable).
·
Detecting Product IPv6 Address — IPv6 address of the system hosting the
detecting product (if applicable).
·
Detecting Product MAC Address — MAC address of the system hosting the
detecting product.
·
Detecting Product Name — Name of the detecting managed
product.
·
Detecting Product Version — Version number of the detecting
product.
·
Engine Version — Version number of the detecting product’s
engine (if applicable).
·
Event Category — Category of the event. Possible categories
depend on the product.
·
Event Generated Time (UTC) — Time in Coordinated Universal Time that the
event was detected.
·
Event ID — Unique identifier of the event.
·
Event Received Time (UTC) — Time in Coordinated Universal Time that the
event was received by the ePO server.
·
File Path — File path of the system which sent the
event.
·
Host Name — Name of the system which sent the
event.
·
IPv4 Address — IPv4 address of the system which sent the
event. Reporting On System Status
·
IPv6 Address — IPv6 address of the system which sent the
event.
·
MAC Address — MAC address of the system which sent the
event.
·
Network Protocol — Threat target protocol for network-homed
threat classes.
·
Port Number — Threat target port for network-homed threat
classes.
·
Process Name — Target process name (if applicable).
·
Server ID — Server ID which sent the event.
·
Threat Name — Name of the threat.
·
Threat Source Host Name — System name from which the threat
originated.
·
Threat Source IPv4 Address — IPv4 address of the system from which the
threat originated.
·
Threat Source IPv6 Address — IPv6 address of the system from which the
threat originated.
·
Threat Source MAC Address — MAC address of the system from which the
threat originated.
·
Threat Source URL — URL from which the threat originated.
·
Threat Source User Name — User name from which the threat
originated.
·
Threat Type — Class of the threat.
·
User Name — Threat source user name or email address.
Working with
the Threat Event Log
Use these tasks to view and purge
the Threat Event Log
Viewing the Threat Event Log
Viewing the Threat Event Log
Use this task to view the Threat
Event Log.
Before you begin
You must have appropriate
permissions to perform this task.
1.
Click Menu |
Reporting | Threat Event Log.
2.
Click any of the column titles to sort the events. You can also
click Actions | Choose Columns and the Select Columns to Display page
appears.
3.
From the Available Columns list, select different table columns
that meet your needs, then click Save.
4.
Select events in the table, then click Actions and select Show Related Systems to see the details of the systems that
sent the selected events.
Purging Threat Events
Use this task to purge Threat
Event records from the database. Purging Threat Event records deletes them
permanently.
Before you begin
You must have appropriate
permissions to perform this task.
1.
Click Menu |
Reporting | Threat Event Log.
2.
Click Actions |
Purge.
3.
In the Purge dialog box, next to Purge records older than, type
a number and select a time unit.
4.
Click OK.
Records older than the specified
age are deleted permanently.
Purging the
Threat Event Log on a schedule
Use this task to purge the Threat
Event Log with a scheduled server task.
Before you begin
You must have appropriate
permissions to perform this task.
1.
Click Menu |
Automation | Server Tasks, then click Actions
| New Task. The Server Task Builder wizard opens to the Description page.
2.
Name, describe the task, and click Enabled after Schedule Status.
3.
Click Next.
The Actions page appears.
4.
Select Purge
Threat Event Log from the
drop-down list.
5.
Select whether to purge by age or from a queries results. If you
purge by query, you must pick a query that results in a table of events.
6.
Click Next.
The Schedule page appears.
7.
Schedule the task as needed, then click Next. The Summary page appears.
8.
Review the task’s details, then click Save.
Figure 1
Threat Event Log
This page displays all the known threats reported from the clients to the EPO server. It defaults to displaying the last day of data. From the Filter dropdown box Hour, Day, Week, Month, Quarter and Year can be selected. Custom queries can be created to pull this information with different filters. Also, the list can be filtered by selecting the Advanced Filter hyperlink in the upper left of the screen.
McAfee EPO Server Policies and Client Tasks
Description
The McAfee EPO server manages all
the settings for the McAfee clients on our systems. This includes things
like exclusions, client update intervals, log settings, protection settings and
so forth. These policies and client tasks are how these settings for
one or many of the managed systems are changed.
Policies and Client Tasks
Managing products from a single
location is a central feature of ePolicy Orchestrator and is accomplished
through the combination of product policies and client tasks. Policies ensure a
product’s features are configured correctly, while client tasks are the
scheduled actions that run on the managed systems hosting any client-side
software.
Configuring Policies for the
First Time
When configuring policies and
tasks for the first time:
1.
Plan product policies and client tasks for the segments of your
System Tree.
2.
Create and assign policies to groups and systems.
3.
Create and assign client tasks to groups and systems.
Product Extensions
Extensions are zip files you
install on the ePO server to manage another security product in your
environment. The extensions contain the files, components, and information necessary
to manage such a product. Extensions replace the NAP files of previous
releases.
Functionality that extensions add
When a managed product extension
is installed, added functionality can include:
·
Policy pages
·
Server tasks
·
Client tasks
·
Default queries
·
New result types, chart types, and properties to select with the
Query Builder wizard
·
Default Dashboards and dashboard monitors
·
Feature permissions that can be assigned to user accounts
·
Additional product-specific functionality
Where extension files are located
Some product extensions are
installed automatically when ePolicy Orchestrator is installed. For products
whose extensions are not installed by default, see the product documentation
for the extension name and location on the product CD or in the product
download.
Policy management
A policy is a collection of
settings that you create, configure, then enforce. Policies ensure that the
managed security software products are configured and perform accordingly.
Some policy settings are the same
as the settings you configure in the interface of the product installed on the
managed system. Other policy settings are the primary interface for configuring
the product or component. The ePolicy Orchestrator console allows you to
configure policy settings for all products and systems from a central location.
Policy categories
Policy settings for most products
are grouped by category. Each policy category refers to a specific subset of
policy settings. Policies are created by category. In the Policy Catalog page, policies are displayed by product and
category. When you open an existing policy or create a new policy, the policy
settings are organized across tabs.
Where policies are displayed
To see all of the policies that
have been created per policy category, click Menu | Policy | Policy Catalog, then
select aProduct and Category from the drop-down lists. On the Policy
Catalog page, users can see only policies of the products to which they have
permissions. To see which policies, per product, are applied to a specific
group of the System Tree, clickMenu | Systems | System Tree | Assigned
Policies page,
select a group, then select a Product from the drop-down list.
NOTE: A McAfee Default policy exists for each
category. You cannot delete, edit, export or rename these policies, but you can
copy them and edit the copy.
How policy enforcement is set
For each managed product or
component, choose whether the agent enforces all or none of its policy
selections for that product or component. From the Assigned Policies page,
choose whether to enforce policies for products or components on the selected
group. In the Policy Catalog page, you can view policy assignments, where they
are applied, and if
they are enforced. You can also
lock policy enforcement to prevent changes to enforcement below the locked
node.
If policy enforcement is turned off, systems in the specified group do not receive updated sitelists during an agent-server communication. As a result, managed systems in the group might not function as expected. For example, you might configure managed systems to communicate with Agent Handler A, but with policy enforcement turned off, the managed systems won't receive the new sitelist with this information, so they report to a different Agent Handler listed in an expired sitelist.
If policy enforcement is turned off, systems in the specified group do not receive updated sitelists during an agent-server communication. As a result, managed systems in the group might not function as expected. For example, you might configure managed systems to communicate with Agent Handler A, but with policy enforcement turned off, the managed systems won't receive the new sitelist with this information, so they report to a different Agent Handler listed in an expired sitelist.
When policies are enforced
When you reconfigure policy
settings, the new settings are delivered to, and enforced on, the managed
systems at the next agent-server communication. The frequency of this
communication is determined by the Agent-to-server-communication interval (ASCI) settings on the General tab of the McAfee Agent policy pages, or the McAfee Agent Wakeup
client task schedule (depending on how you implement agent-server
communication). This interval is set to occur once every 60 minutes by default.
Once the policy settings are in
effect on the managed system, the agent continues to enforce policy settings
locally at a regular interval. This enforcement interval is determined by the Policy enforcement interval setting on the General tab of the McAfee Agent policy pages. This interval is set to occur
every five minutes by default. Policy settings for McAfee products are enforced
immediately at the policy enforcement interval, and at each agent-server
communication if policy settings have changed.
For Symantec AntiVirus products,
there is a delay of up to three minutes after the interval before policies are
enforced. The agent first updates the GRC.DAT file with policy information,
then the Symantec AntiVirus product reads the policy information from the
GRC.DAT file, which occurs approximately every three minutes.
Exporting and importing policies
If you have multiple servers, you
can export and import policies between them via XML files. In such an
environment, you only need to create a policy once. You can export and import
individual policies, or all policies for a given product. This feature can also
be used to back up policies if you need to reinstall the server.
Policy sharing
Policy sharing is another way to
transfer policies between servers. Sharing policies allows you to manage
policies on one server, and use them on many additional servers all through the
ePO console. For more information, see Sharing policies among ePO servers.
Policy Application
Policies are applied to any
system by one of two methods, inheritance or assignment.
Inheritance
Inheritance determines whether
the policy settings and client tasks for a group or system are taken from its
parent. By default, inheritance is enabled throughout the System Tree.
When you break this inheritance
by assigning a new policy anywhere in the System Tree, all child groups and
systems that are set to inherit the policy from this assignment point do so.
Assignment
You can assign any policy in the
Policy Catalog to any group or system, provided you have the appropriate
permissions. Assignment allows you to define policy settings once for a
specific need, then apply the policy to multiple locations. When you assign a
new policy to a particular group of the System Tree, all child groups and
systems that are set to inherit the policy from this assignment point do so.
Assignment locking
You can lock the assignment of a
policy on any group or system, provided you have the appropriate permissions.
Assignment locking prevents other users:
·
With appropriate permissions at the same level of the System
Tree from inadvertently replacing a policy.
·
With lesser permissions (or the same permissions but at a lower
level of the System Tree) from replacing the policy.
Assignment locking is inherited
with the policy settings.
Assignment locking is valuable
when you want to assign a certain policy at the top of the System Tree and
ensure that no other users replace it anywhere in the System Tree.
Assignment locking only locks the
assignment of the policy, but does not prevent the policy owner from making
changes to its settings. Therefore, if you intend to lock a policy
assignment, make sure that you are the owner of the policy.
assignment, make sure that you are the owner of the policy.
Policy ownership
All policies for products and
features to which you have permissions are available from the Policy Catalog page. To prevent any user from editing other
users’ policies, each policy is assigned an owner — the user who created it.
Ownership provides that no one can modify or delete a policy except its creator
or a global administrator. Any user with appropriate permissions can assign any
policy in the Policy
Catalog page, but
only the owner or a global administrator can edit it. If you assign a policy
that you do not own to managed systems, be aware that if the owner of the named
policy modifies it, all systems where this policy is assigned receive these
modifications. Therefore, if you wish to use a policy owned by a different
user, McAfee recommends that you first duplicate the policy, then assign the
duplicate to the desired locations. This provides you ownership of the assigned
policy. You can specify multiple non-global administrator users as owners of a
single policy.
Creating Policy Management Queries
Use this task to create either of
the following Policy Management queries:
·
Applied Policies query — Retrieves policies assigned to a
specified managed systems.
·
Broken Inheritance query — Retrieves information on policies
that are broken in the system hierarchy.
Before you begin
You must have appropriate permissions
to perform this task.
1.
Click Menu |
Reporting | Queries, then click Actions
| New Query. The Query Wizard opens.
2.
On the Result Type page, select Policy Management from the Feature Group list.
3.
Under Result Types, select one of these options, then click Next and the Chart page appears:
• Applied Policies
• Broken Inheritance
• Applied Policies
• Broken Inheritance
4.
Select the type of chart or table to display the primary results
of the query, then click Next.
The Columns page appears.
NOTE: If you select Boolean Pie Chart, you must configure the criteria you want to include in the query.
NOTE: If you select Boolean Pie Chart, you must configure the criteria you want to include in the query.
5.
Select the columns to be included in the query, then click Next. The Filter page appears.
6.
Select properties to narrow the search results, then click Run. The Unsaved Query page
displays the results of the query, which is actionable. You can take any
available actions on items in any tables or drill-down tables.
NOTE: Selected properties appear in the content pane with operators that can specify criteria, which narrows the data that is returned for that property.
• If the query didn’t return the expected results, click Edit Query to go back to the Query Builder and edit the details of this query.
• If you don’t need to save the query, click Close.
• If you want to use again this query again, click Save and continue to the next step.
NOTE: Selected properties appear in the content pane with operators that can specify criteria, which narrows the data that is returned for that property.
• If the query didn’t return the expected results, click Edit Query to go back to the Query Builder and edit the details of this query.
• If you don’t need to save the query, click Close.
• If you want to use again this query again, click Save and continue to the next step.
7.
In Save Query page, type a name for the query, add any notes,
and select one of the following:
• New Group — Type the new group name and select either:
• Private group (My Groups)
• Public group (Shared Groups)
• Existing Group — Select the group from the list of Shared Groups.
• New Group — Type the new group name and select either:
• Private group (My Groups)
• Public group (Shared Groups)
• Existing Group — Select the group from the list of Shared Groups.
8.
Click Save.
Client Tasks
ePolicy Orchestrator allows you
to create and schedule client tasks that run on managed systems. You can define
tasks for the entire System Tree, for a specific group, or for an individual
system. Like policy settings, client tasks are inherited from parent groups in
the System Tree. Which extension files are installed on your ePO server
determines which client tasks are available. Client tasks are commonly used
for:
·
Product deployment
·
Product functionality (for example, the VirusScan Enterprise
On-Demand Scan task)
·
Upgrades and updates
See the product documentation for
your managed products for information and instructions.
Product Extensions
Use this task to install an extension
(zip) file. A product’s extension must be installed before ePolicy Orchestrator
can manage the product.
Before you begin
You must have appropriate
permissions to perform this task.
1.
Ensure that the extension file is in an accessible location on
the network.
2.
Click Menu |
Software | Extensions | Install Extension. The Install Extension dialog box
appears.
3.
Browse to and select the desired extension (zip) file, then
click OK.
4.
Verify that the product name appears in the Extensions list.
Viewing policy information
Use these tasks to view detailed
information about the policies, their assignments, inheritance, and their
owners.
Viewing groups and systems where a policy is assigned
Use this task to view the groups
and systems where a policy is assigned. This list shows the assignment points
only, not each group or system that inherits the policy.
1.
Click Menu |
Policy | Policy Catalog, then select the desired Product and Category.
All created policies for the selected category appear in the details pane.
2.
Under Assignments on the row of the desired policy,
click the link that indicates the number of groups or systems the policy is
assigned to (for example, 6
assignments).
On the Assignments page, each
group or system where the policy is assigned appears with its Node Name and Node Type.
Viewing the settings of a policy
Use this task to view the
specific settings of a policy.
1.
Click Menu |
Policy | Policy Catalog, then select the desired Product and Category.
All created policies for the selected category appear in the details pane.
2.
Click Edit
Settings next to the desired
policy. The policy pages and their settings appear.
NOTE: You can also view this information when accessing the assigned policies of a specific group. To access this information click Menu | Systems | System Tree | Assigned Policies, then click the link for the selected policy in the Policy column.
NOTE: You can also view this information when accessing the assigned policies of a specific group. To access this information click Menu | Systems | System Tree | Assigned Policies, then click the link for the selected policy in the Policy column.
Viewing policy ownership
Use this task to view the owners
of a policy.
1.
Click Menu |
Policy | Policy Catalog, then select the desired Product and Category.
All created policies for the selected category appear in the details pane.
2.
The owners of the policy are displayed under Owner.
Viewing assignments where policy enforcement is
disabled
Use this task to view assignments
where policy enforcement, per policy category, is disabled.
1.
Click Menu |
Policy | Policy Catalog, then select the desired Product and Category.
All created policies for the selected category appear in the details pane.
2.
Click the link next to Product
enforcement status, which indicates the number of assignments where
enforcement is disabled, if any. The page appears.
3.
Click any item in the list to go to its Assigned Policies page.
Viewing policies assigned to a group
Use this task to view the
policies assigned to a group.
1.
Click Menu |
Systems | System Tree | Assigned Policies, then select a group in the
System Tree. All assigned policies, organized by product, appear in the details
pane.
2.
Click any policy to view its settings.
Viewing policies assigned to a specific system
Use this task to view the
policies assigned to a specific system.
1.
Click Menu |
Systems | System Tree | Systems, then select the desired group in the
System Tree. All systems belonging to the group appear in the details pane.
2.
Select the system, then click Actions
| Agent | Modify Policies on a Single System.
3.
Select the product. The product’s policies assigned to this
system appear.
4.
Click any policy to view its settings.
Viewing a group’s policy inheritance
Use this task to view the policy
inheritance of a specific group.
1.
Click Menu |
Systems | System Tree | Assigned Policies. All assigned policies, organized
by product, appear in the details pane.
2.
The desired policy row, under Inherit
from, displays the name of the group from which the policy is
inherited.
Viewing and resetting broken inheritance
Use this task to view where
policy inheritance is broken.
1.
Click Menu |
Systems | System Tree | Assigned Policies. All assigned policies, organized
by product, appear in the details pane.
2.
The desired policy row, under Broken
Inheritance, displays the number of groups and systems where this policy’s
inheritance is broken.
NOTE: This is the number of groups or systems where the policy inheritance is broken, not the number of systems that do not inherit the policy. For example, if only one group does not inherit the policy, this is represented by 1 doesn’t inherit, regardless of the number of systems within the group.
NOTE: This is the number of groups or systems where the policy inheritance is broken, not the number of systems that do not inherit the policy. For example, if only one group does not inherit the policy, this is represented by 1 doesn’t inherit, regardless of the number of systems within the group.
3.
Click the link indicating the number of child groups or systems
that have broken inheritance. The View
broken inheritance page
displays a list of the names of these groups and systems.
4.
To reset the inheritance of any of these, select the checkbox
next to the name, then click Actions and select Reset Inheritance.
Working with the Policy Catalog
Use these tasks to create and
maintain policies from the Policy Catalog page.
Creating a policy from the Policy Catalog page
Use this task to create a new
policy from the Policy Catalog. By default, policies created here are not
assigned to any groups or systems. When you create a policy here, you are
adding a custom policy to the Policy Catalog. You can create policies before or
after a product is deployed.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category from the drop-down lists. All created policies
for the selected category appear in the details pane.
2.
Click Actions |
New Policy. The Create New Policy dialog box appears.
3.
Select the policy you want to duplicate from the Create a policy based on this
existing policy drop-down list.
4.
Type a name for the new policy and click OK. The Policy Settings wizard
opens.
5.
Edit the policy settings on each tab as needed.
6.
Click Save.
Duplicating a policy on the Policy Catalog page
Use this task to create a new
policy based on an existing one. For example, if you already have a policy that
is similar to one you want to create, you can duplicate the existing one, then
make the desired changes.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category from the drop-down lists. All created
policies for the selected category appear in the details pane.
2.
Locate the policy to duplicate, then click Duplicate in that policy’s row. The Duplicate
Existing Policy dialog box appears.
3.
Type the name of the new policy in the field (for example, Sales
Europe), then click OK.
The new policy appears on the Policy Catalog page.
4.
Click Edit
Settings next to the new
policy’s name in the list.
5.
Edit the settings as needed, then click Save.
Editing a policy’s settings from the Policy Catalog
Use this task to modify the settings
of a policy. Your user account must have appropriate permissions to edit policy
settings for the desired product.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category from the drop-down lists. All created
policies for the selected category appear in the details pane.
2.
Locate the desired policy, then click Edit Settings next to it.
3.
Edit the settings as needed, then click Save.
Renaming a policy from the Policy Catalog
Use this task to rename a policy.
Your user account must have appropriate permissions to edit policy settings for
the desired product.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category from the drop-down lists. All created
policies for the selected category appear in the details pane.
2.
Locate the desired policy, then click Rename/Modify in the desired policy’s row. The
Rename/Modify Policy dialog box appears.
3.
Type a new name for the existing policy, then click OK.
Deleting a policy from the Policy Catalog
Use this task to delete a policy from
the Policy Catalog. When you delete a policy, all groups and systems where it
is currently applied inherit the policy of their parent group. Before deleting
a policy, review the groups and systems where it is assigned. If you don’t want
the group or system to inherit the policy from the parent group, assign a
different policy . If you delete a policy that is applied to the My
Organization group, the McAfee Default policy of this category is assigned.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category from the drop-down lists. All created
policies for the selected category appear in the details pane.
2.
Locate the desired policy, then click Delete in the policy’s row.
3.
Click OK when prompted.
Working with Policies
Use these tasks to assign and
manage the policies in your environment.
Changing the owners of a policy
Use this task to change the
owners of a policy. By default, ownership is assigned to the user that created
the policy. This task can only be performed by global administrators.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category.
All created policies for the selected category appear in the details pane.
2.
Locate the desired policy, then click on the Owner of the
policy. The Policy Ownership page appears.
3.
Select the desired owners of the policy from the list, then
click OK.
Moving policies between ePO servers
Use these tasks to move policies
between servers. To do this, you must export the policy to an XML file from the
Policy Catalog page of the source server, then import it to the Policy Catalog
page on the target server.
Exporting a single policy
Use this task to export a policy
to an XML file. Use this file to import the policy to another ePO server, or to
keep as a backup of the policy.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category from the drop-down lists. All created
policies for the selected category appear in the details pane.
2.
Locate the desired policy, then click Export next to the policy. The Download File
page appears.
3.
Right-click the link to download and save the file.
4.
Name the policy XML file and save it. If you plan to import this
file into a different ePO server, ensure that this location is accessible to
the target ePolicy Orchestrator server.
Exporting all policies of a product
Use this task to export all
policies of a product to an XML file. Use this file to import the policy to
another ePO server, or to keep as a backup of the policies.
1.
Click Menu |
Policy | Policy Catalog, then select the Product and Category . All created policies for the
selected category appear in the details pane.
2.
Click Export next to Product policies. The Download
File page appears.
3.
Right-click the link to download and save the file.
4.
Name the policy XML file and save it. If you plan to import this
file into a different ePO server, ensure that this location is accessible to
the target ePolicy Orchestrator server.
Importing policies
Use this task to import a policy
XML file. Regardless of whether you exported a single policy or all named
policies, the import procedure is the same.
1.
Click Menu |
Policy | Policy Catalog, then click Import next to Product policies.
2.
Browse to and select the desired policy XML file, then click OK.
3.
Select the policies you want to import and click OK. The policies are added to
the policy catalog.
Assigning a Policy to a Group of the System Tree
Use this task to assign a policy
to a specific group of the System Tree. You can assign policies before or after
a product is deployed.
1.
Click Menu |
Systems | System Tree | Assigned Policies, then select the desired Product. Each assigned policy
per category appears in the details pane.
2.
Locate the desired policy category, then click Edit Assignment. The Policy
Assignment page appears.
3.
If the policy is inherited, select Break inheritance and assign the
policy and settings below next to Inherited from.
4.
Select the desired policy from the Assigned policy drop-down list.
NOTE: From this location, you can also edit the selected policy’s settings, or create a new policy.
NOTE: From this location, you can also edit the selected policy’s settings, or create a new policy.
5.
Choose whether to lock policy inheritance. Locking policy
inheritance prevents any systems that inherit this policy from having another
one assigned in its place.
6.
Click Save.
Assigning a policy to a managed system
Use this task to assign a policy
to a specific managed system. You can assign policies before or after a product
is deployed.
1.
Click Menu |
Systems | System Tree | Systems, then select the desired group under System
Tree. All the systems within this group (but not its subgroups) appear in the
details pane.
2.
Select the desired system, then click Actions | Agent | Modify Policies
on a Single System.
The Policy Assignment page for that system appears.
3.
Select the desired Product.
The categories of selected product are listed with the system’s assigned policy.
4.
Locate the desired policy category, then click Edit Assignments.
5.
If the policy is inherited, select Break inheritance and assign the
policy and settings below next to Inherited from.
6.
Select the desired policy from the Assigned policy drop-down list.
NOTE: From this location, you can also edit settings of the selected policy, or create a new policy.
NOTE: From this location, you can also edit settings of the selected policy, or create a new policy.
7.
Choose whether to lock policy inheritance. Locking policy
inheritance prevents any systems that inherit this policy from having another
one assigned in its place.
8.
Click Save.
Assigning a policy to multiple managed systems within a
group
Use this task to assign a policy
to multiple managed systems within a group. You can assign policies before or
after a product is deployed.
1.
Click Menu |
Systems | System Tree | Systems, then select the desired group in the
System Tree. All the systems within this group (but not its subgroups) appear
in the details pane.
2.
Select the desired systems, then click Actions | Agent | Set Policy &
Inheritance.
3.
Select the Product, Category, and Policy from the drop-down lists, then click Save.
Enforcing policies for a product on a group
Use this task to enable or
disable policy enforcement for a product on a System Tree group. Policy
enforcement is enabled by default, and is inherited in the System Tree.
1.
Click Menu |
Systems | System Tree | Assigned Policies, then select the desired group in
the System Tree.
2.
Select the desired Product,
then click the link next to Enforcement
Status. The Enforcement page appears.
3.
To change the enforcement status you must first select Break inheritance and assign the policy and settings below.
4.
Next to Enforcement
status, select Enforcing or Not
enforcing accordingly.
5.
Choose whether to lock policy inheritance. Locking inheritance
for policy enforcement prevents breaking enforcement for groups and systems
that inherit this policy.
6.
Click Save.
Enforcing policies for a product on a system
Use this task to enable or
disable policy enforcement for a product on a system. Policy enforcement is
enabled by default, and is inherited in the System Tree.
1.
Click Menu |
Systems | System Tree | Systems, then select the group under System Tree where the system belongs. The list of
systems belonging to this group appears in the details pane.
2.
Select the desired system, then click Actions | Modify Policies on a
Single System.
3.
Select the desired Product,
then click Enforcing next to Enforcement status.
4.
If you want to change the enforcement status you must first
select Break inheritance and assign the policy and settings
below.
5.
Next to Enforcement
status, select Enforcing or Not
enforcing accordingly.
6.
Click Save.
Copying and pasting assignments
Use these tasks to copy and paste
policy assignments from one group or system to another. This is an easy way to
share multiple assignments between groups and systems from different portions
of the System Tree.
Copying policy assignments from a group
Use this task to copy policy
assignments from a group in the System Tree.
1.
Click Menu |
Systems | System Tree | Assigned Policies, then select the desired group in
the System Tree.
2.
Click Actions |
Copy Assignments.
3.
Select the products or features for which you want to copy
policy assignments, then click OK.
Copying policy assignments from a system
Use this task to copy policy assignments
from a specific system.
1.
Click Menu |
Systems | System Tree | Systems, then select the desired group in the
System Tree. The systems belonging to the selected group appear in the details
pane.
2.
Select the desired system, then click Actions | Agent | Modify Policies
on a Single System.
3.
Click Actions |
Copy Assignments, select the desired products or features for which you
want to copy policy assignments, then click OK.
Pasting policy assignments to a group
Use this task to paste policy
assignments to a group. You must have already copied policy assignments from a
group or system.
1.
Click Menu |
Systems | System Tree | Assigned Policies, then select the desired group in
the System Tree.
2.
In the details pane, click Actions and select Paste Assignments. If the group
already has policies assigned for some categories, the Override Policy
Assignments page appears.
NOTE: When pasting policy assignments, an extra policy appears in the list (Enforce Policies and Tasks). This policy controls the enforcement status of other policies.
NOTE: When pasting policy assignments, an extra policy appears in the list (Enforce Policies and Tasks). This policy controls the enforcement status of other policies.
3.
Select the policy categories you want to replace with the copied
policies, then click OK.
Pasting policy assignments to a specific system
Use this task to paste policy
assignments to a specific system. You must have already copied policy
assignments from a group or system.
1.
Click Menu |
Systems | System Tree | Systems, then select the desired group in the
System Tree. All of the systems belonging to the selected group appear in the
details pane.
2.
Select the system where you want to paste policy assignments,
then click Actions | Agent | Modify Policies on a Single
System.
3.
In the details pane, click Actions
| Paste Assignment. If the system already has policies assigned for some
categories, the Override Policy Assignments page appears.
NOTE: When pasting policy assignments, an extra policy appears in the list (Enforce Policies and Tasks). This policy controls the enforcement status of other policies.
NOTE: When pasting policy assignments, an extra policy appears in the list (Enforce Policies and Tasks). This policy controls the enforcement status of other policies.
4.
Confirm the replacement of assignments.
Working with Client Tasks
Use these tasks to create and
maintain client tasks.
Creating and scheduling client tasks
Use this task to create and
schedule a client task. The process is similar for all client tasks.
1.
Click Menu |
Systems | System Tree | Client Tasks, select the desired group in the
System Tree, then clickActions | New Task. The Client Task Builder
wizard opens.
2.
Type a name for the task you are creating, add any notes, then
select the product task type from the drop-down lists, for example, Product Update.
3.
Specify any tags to use with this task and click Next.
Configure the settings, then
click Next. The
Schedule page appears.
1.
Configure the schedule details as needed, then click Next.
2.
Review the task settings, then click Save. The task is added to the
list of client tasks for the selected group and any group that inherits the
task.
Editing client tasks
Use this task to edit a client
task’s settings or to schedule information for any existing task.
1.
Click Menu |
Systems | System Tree | Client Tasks, then select the group where the
desired client task was in the System Tree.
2.
Click Edit
Settings next to the task.
The Client Task Builder wizard opens.
3.
Edit the task settings as needed, then click Save.
The managed systems receive these
changes the next time the agents communicate with the server.
Deleting client tasks
Use this task to delete unneeded
client tasks. You can delete any client task you have created.
1.
Click Menu |
Systems | System Tree | Client Tasks, then select the group where the
desired client task was created in the System Tree.
2.
Click Delete next to the desired client task.
3.
Click OK.
Figure 1
Policy Catalog
This page displays all of the current product policies. This is where settings for VirusScan Enterprise and Groupshield are configured. Select the product and category for the policies specific to those clients.
This page displays all of the current product policies. This is where settings for VirusScan Enterprise and Groupshield are configured. Select the product and category for the policies specific to those clients.
Figure 2
VSE 8.7 On-Access Exclusions
This page is where VirusScan Enterprise 8.7 managed clients On-Access exclusions are configured. This policy affects all managed systems. Select Workstation or Server from the Settings dropdown box, Exclusions and then add or edit to change these settings
This page is where VirusScan Enterprise 8.7 managed clients On-Access exclusions are configured. This policy affects all managed systems. Select Workstation or Server from the Settings dropdown box, Exclusions and then add or edit to change these settings
Figure 3
Client Tasks
This page is where you can view or edit client tasks. Client tasks only work on managed systems. Meaning systems that already have the McAfee EPO Agent installed and working. It can be an older version, but it must be functioning. Thus, fresh installations of the McAfee EPO Agent CAN NOT be done with a client task. Also, client tasks can only be created for McAfee software that the EPO server has product extensions added. Also only software packages that have been added to the repository can be deployed with a client task.
This page is where you can view or edit client tasks. Client tasks only work on managed systems. Meaning systems that already have the McAfee EPO Agent installed and working. It can be an older version, but it must be functioning. Thus, fresh installations of the McAfee EPO Agent CAN NOT be done with a client task. Also, client tasks can only be created for McAfee software that the EPO server has product extensions added. Also only software packages that have been added to the repository can be deployed with a client task.
Add an
Exclusion for McAfee VSE Policy on EPO Server
Steps
Research Need
Frequently the requester doesn't
know exactly what they need. Communicate with the requester to discover the
need. Then apply common since to formulate a solid solution that can be applied
to all systems for ease of administration.
Example
Request: Customer asks to have control to disable the
VSE client because it's slowing their software builds down.
Possible Solution: Ask them to use a uniquely named
directory to do the builds and apply and exclusion to that folder.
Check Current Exclusions
At times an matching exclusion is
already in place. Check the SharePoint document first to know if it's already
in place.
Exclusions Syntax
* = wildcard
*\ = root of any partition or device
**\ = any directory level on any partition or
device
Examples
*\Program Files\ = C:\Program Files, D:\Program Files
etc.
*\Program Files*\ = C:\Program Files, D:\Program Files,
C:\Program Files (x86) etc.
**\source\ = C:\source, C:\Program Files\source,
H:\dev\testing\code\temp\source etc.
**\*visual studio*\ = C:\Program Files (x86)\Microsoft Visual
Studio 8 etc.
Apply Exclusions
If there is not an exclusion in
place already then follow these steps to add one:
2.
Select Menu |
Policy | Policy Catalog
3.
Select Product: VirusScan
Enterprise 8.7.0
4.
Select Category: On-Access
Default Processes Policies
5.
Select My
Default | Edit Settings
6.
Chose Settings
for | Workstation or Server
7.
Select Exclusions tab
8.
Select Add...
9.
Enter Exclusion Syntax
10.
OK
11.
Select Save
1.
Bottom Right
Tips
·
To speed up the process of getting the exclusion to the client
do the following:
1.
Search for the client in the Search Dashboard by hostname or IP
address
2.
Select the host or hosts with the checkbox
3.
Select Actions \ Agent \ Wake Up Agents
4.
Select OK
·
To watch the update status of the client do the following:
1.
Search for the client in the Search Dashboard by hostname or IP
address
2.
Select the host or hosts with the checkbox
3.
Select Actions \ Agent \ Show Agent Log
4.
Refresh the web browse page to see updates
·
Be sure to have a trailing backslash when excluding a directory.
Figure 1
Add Exclusion
To exclude a directory named "someprogram" and all it's sub-directories: C:\Program Files (x86)\Someprogram The syntax to include any partition (drive letter) would be: *\Program Files*\Someprogram\Plus check the box to exclude sub folders
To exclude a directory named "someprogram" and all it's sub-directories: C:\Program Files (x86)\Someprogram The syntax to include any partition (drive letter) would be: *\Program Files*\Someprogram\Plus check the box to exclude sub folders
McAfee EPO
Server Tasks
Description
EPO Server Tasks accomplish
several actions. There are a lot of prebuilt task actions including purging old
data from the database and Active Directory synchronization. Custom tasks for
system management can be created by using built queries. This includes the
creation of audit reports that are emailed based on the set schedule.
The most frequent uses for Server
Task include software repository updates, client system management, EPO server
database maintainance, domain synchronizations, unique tag management, emailing
reports and can be used to deploy the McAfee Agent.
Creating a
New Task
The three configuration pages for
creating a new server task are the following:
·
Description
·
Actions
·
Schedule
Steps
Note: If you plan to create a
server task based on a custom query it will need to be created before making
the server task.
2.
Select Menu\Automation\Server Tasks
Server Tasks
This page displays all the currently created automated tasks. This is where you can edit tasks or create new.
Server Tasks
This page displays all the currently created automated tasks. This is where you can edit tasks or create new.
3.
Select New Task
Enter a Name and Description for
the Task
Figure 2
New Task
This is the first of three pages of the for creating a New Task
This is the first of three pages of the for creating a New Task
4.
Next
5.
Select Actions
1.
For a lot of the server tasks the default "Run Query"
will be what you want to select.
6.
Select Query browse button
7.
Select My Groups (Private) or Shared Groups (Public)
Select the appropriate query from
the list
Figure 3
Select Query
Select the appropriate query from the list. There is a My Groups (private) and Shared Groups (public) tab at the top of the poppup window.
Select the appropriate query from the list. There is a My Groups (private) and Shared Groups (public) tab at the top of the poppup window.
8.
Select the Sub-Actions and associated settings
9.
Next
10.
Set Schedule
Figure 4
11.
Actions
Set the actions or what to do with the list of systems pulled by the query.
Set the actions or what to do with the list of systems pulled by the query.
Figure 5
Schedule
Set the frequency and time to run the server task.
Set the frequency and time to run the server task.
McAfee EPO
Server Repositories
Description
Security software is only as
effective as the latest installed updates. For example, if your DAT files are
out-of-date, even the best anti-virus software cannot detect new threats. It is
critical that you develop a robust updating strategy to keep your security software
as current as possible.
ePolicy Orchestrator repository
architecture offers flexibility to ensure that deploying and updating software
is as easy and automated as your environment allows. Once your repository
infrastructure is in place, create update tasks that determine how, where, and
when your software is updated.
Repository
types and what they do
To deliver products and updates
throughout your network, ePolicy Orchestrator offers several types of
repositories that create a robust update infrastructure when used together.
These provide the flexibility to develop an updating strategy to ensure your
systems stay up-to-date.
Master repository
The master repository maintains
the latest versions of security software and updates for your environment. This
repository is the source for the rest of your environment.
The master repository is
configured when ePolicy Orchestrator is installed. However, you must ensure
that proxy server settings are configured correctly. By default, ePolicy
Orchestrator uses Microsoft Internet Explorer proxy settings.
Distributed repositories
Distributed repositories host
copies of your master repository’s contents. Consider using distributed
repositories and placing them throughout your network strategically to ensure
managed systems are updated while
network traffic is minimized, especially across slow connections.
As you update your master
repository, ePolicy Orchestrator replicates the contents to
the distributed repositories.
Replication can occur:
·
Automatically when specified package types are checked in to the
master repository, as long as global updating is enabled.
·
On a recurring schedule with Replication tasks.
·
Manually, by running a Replicate Now task.
A large organization can have
multiple locations with limited bandwidth connections between them. Distributed
repositories help reduce updating traffic across low bandwidth connections, or
at remote sites with a large number of client systems. If you create a
distributed repository in the remote location and configure the systems within
that location to update from this distributed repository, the updates are
copied across the slow connection only once — to the distributed repository —
instead of once to each system in the remote location.
If global updating is enabled,
distributed repositories update managed systems automatically, as soon as
selected updates and packages are checked in to the master repository. Update
tasks are not necessary. However, you do need to be running SuperAgents in your
environment if you want automatic updating. You must still create and configure
repositories and the update tasks.
CAUTION: If distributed repositories are set up to
replicate only selected packages, your newly checked-in package is replicated
by default. To avoid replicating a newly checked-in package, deselect it from
each distributed repository or disable the replication task before checking in
the package. For additional information, see Avoiding replication of selected
packages and Disabling replication of selected packages.
Source site
The source site provides all
updates for your master repository. The default source site is the McAfeeHttp
update site, but you can change the source site or create multiple source sites
if you require. McAfee recommends using the McAfeeHttp or McAfeeFtp update
sites as your source site.
NOTE: Source sites are not required. You can
download updates manually and check them in to your master repository. However,
using a source site automates this process.
McAfee posts software updates to these
sites regularly. For example, DAT files are posted daily. Update your master
repository with updates as they are available.
Use pull tasks to copy source
site contents to the master repository. McAfee update sites provide updates to
detection definition (DAT) and scanning engine files,
as well as some language packs.
You must check in all other packages and updates, including service packs and
patches, to the master repository manually.
Fallback site
The fallback site is a source
site that’s been enabled as the backup site, from which managed systems can
retrieve updates when their usual repositories are inaccessible. For example,
when network outages or virus outbreaks occur, accessing the established
location might be difficult.
Therefore, managed systems can
remain up-to-date in such situations. The default fallback site is the
McAfeeHttp update site. You can enable only one fallback site.
If managed systems use a proxy
server to access the Internet, you must configure agent policy settings for those
systems to use proxy servers when accessing this fallback site.
Types of distributed repositories
ePolicy Orchestrator supports
four types of distributed repositories. Consider your environment and needs
when determining which type of distributed repository to use. You are not
limited to using one type, and might need several, depending on your network.
SuperAgent repositories
Use systems hosting SuperAgents
as distributed repositories. SuperAgent repositories have several advantages
over other types of distributed repositories:
·
Folder locations are created automatically on the host system
before adding the repository to the repository list.
·
File sharing is enabled automatically on the SuperAgent
repository folder.
·
SuperAgent repositories don’t require additional replication or
updating credentials — account permissions are created when the agent is
converted to a SuperAgent.
Although functionality of
SuperAgent broadcast wake-up calls requires a SuperAgent in each broadcast
segment, this is not a requirement for functionality of the SuperAgent
repository. Managed systems only
need to “see” the system hosting the repository.
FTP repositories
You can use an FTP server to host
a distributed repository. Use FTP server software, such as Microsoft Internet
Information Services (IIS), to create a new folder and site location for the
distributed repository. See your web server documentation for details.
HTTP repositories
You can use an HTTP server to
host a distributed repository. Use HTTP server software, such as Microsoft
IIS, to create a new folder and site location for the distributed repository.
See your web server documentation for details.
UNC share repositories
You can create a UNC shared
folder to host a distributed repository on an existing server. Be sure to
enable sharing across the network for the folder, so that the ePO server can
copy files to it and agents can access it for updates.
Unmanaged repositories
If you are unable to use managed
distributed repositories, ePolicy Orchestrator administrators can create
and maintain distributed repositories that are not managed by ePolicy
Orchestrator. If a distributed repository is not managed, a local administrator
must keep it up-to-date manually.
Once the distributed repository
is created, use ePolicy Orchestrator to configure managed systems of a specific
System Tree group to update from it.
<span style="color:
#ff0000" />Refer to Enabling the agent on unmanaged McAfee products so
that they work with ePolicy Orchestrator for configuration of unmanaged systems.
TIP: McAfee recommends that you manage all distributed repositories through ePolicy Orchestrator. This and using global updating, or scheduled replication tasks frequently, ensures your managed environment is up-to-date. Use unmanaged distributed repositories only if your network or organizational policy do not allow managed distributed repositories.
Repository branches and their purposes
ePolicy Orchestrator provides
three repository branches, allowing you to maintain three versions of all
packages in your master and distributed repositories. The repository branches
are Current, Previous, and Evaluation. By default, ePolicy Orchestrator uses
only the Current branch. You can specify branches when adding packages to your
master repository. You can also specify branches when running or scheduling
update and deployment tasks, to distribute different versions to different
parts of your network.
Update tasks can retrieve updates
from any branch of the repository, but you must select a branch other than the
Current branch when checking in packages to the master repository. If a
non-Current branch is not configured, the option to select a branch other than
Current does not appear.
To use the Evaluation and
Previous branches for packages other than updates, you must configure this in
the Repository Packages server settings. Agent versions 3.6 and earlier can
retrieve update packages only from the Evaluation and Previous branches.
Current branch
The Current branch is the main
repository branch for the latest packages and updates. Product deployment
packages can be added only to the Current branch, unless support for the other
branches has been enabled.
Evaluation branch
You might want to test new DAT
and engine updates with a small number of network segments or systems
before deploying them to your entire organization. Specify the Evaluation
branch when checking in new DATs and engines to the master repository,
then deploy them to a small number of test systems. After monitoring the test systems
for several hours, you can add the new DATs to your Current branch and deploy
them to your entire organization.
Previous branch
Use the Previous branch to save
and store prior DAT and engine files before adding the new ones to the
Current branch. In the event that you experience an issue with new DAT or
engine files in your environment, you have a copy of a previous version that
you can redeploy to your systems if necessary. ePolicy Orchestrator saves only
the most immediate previous version of each file type. You can populate the
Previous branch by selecting Move
existing packages to Previous branchwhen you
add new packages to your master repository. The option is available when you
pull updates from a source site and, when you manually check in packages to the
Current branch.
Repository list file and its uses
The repository list (SiteList.xml
and SiteMgr.xml) file contains the names of all the repositories you are
managing. The repository list includes the location and encrypted network
credentials that managed systems use to select the repository and retrieve
updates. The server sends the repository list to the agent during agent-server
communication.
If needed, you can export the
repository list to external files (SiteList.xml or SiteMgr.xml).
Use an exported SiteList.xml file
to:
·
Import to an agent during installation.
Use an exported SiteMgr.xml file
to:
·
Backup and restore your distributed repositories and source
sites if you need to reinstall the server.
·
Import the distributed repositories and source sites from a
previous installation of ePolicy Orchestrator.
Master Repository
McAfee EPO Server System Tree
Description
The EPO console System Tree is
where all the host objects reside for managed and unmanaged systems. The source
of the unmanaged systems generally is from automated Active Directory
synchronizations or systems that at one time in the last two weeks were managed
and communicating with the EPO server.
The System Tree
The System Tree organizes managed
systems in units for monitoring, assigning policies, scheduling tasks, and
taking actions.
Groups
The System Tree is a hierarchical
structure that allows you to combine your systems within units called groups.
Groups have these
characteristics:
·
Groups can be created by global administrators or users with the
appropriate permissions.
·
A group can include both systems and other groups.
·
Groups are administered by a global administrator or a user with
appropriate permissions.
Grouping systems with similar
properties or requirements into these units allows you to manage policies for
systems in one place, rather than setting policies for each system
individually. As part of the planning process, consider the best way to
organize systems into groups prior to building the System Tree.
Lost&Found
group
The System Tree root (My
Organization) includes a Lost&Found group. Depending on the methods for
creating and maintaining the System Tree, the server uses different
characteristics to determine where to place systems. The Lost&Found group
stores systems whose locations could not be determined.
The Lost&Found group has
these characteristics:
·
It can't be deleted.
·
It can't be renamed.
·
Its sorting criteria can't be changed from being a catch-all
group (although you can provide sorting criteria for the subgroups you create
within it.)
·
It always appears last in the list and is not alphabetized among
its peers.
·
Users must be granted permissions to the Lost&Found group to
see the contents of Lost&Found.
·
When a system is sorted into Lost&Found, it is placed in a subgroup
named for the system’s domain. If no such group exists, one is created.
CAUTION: If you delete systems from the System Tree, be sure you select the option to remove their agents. If the agent is not removed, deleted systems reappear in the Lost&Found group because the agent continues to communicate to the server.
CAUTION: If you delete systems from the System Tree, be sure you select the option to remove their agents. If the agent is not removed, deleted systems reappear in the Lost&Found group because the agent continues to communicate to the server.
Inheritance
Inheritance is an important
property that simplifies policy and task administration. Because of
inheritance, child groups in the System Tree hierarchy inherit policies set at
their parent groups.
For example:
·
Policies set at the My Organization level of the System Tree are
inherited by groups below it.
·
Group policies are inherited by subgroups or individual systems
within that group.
Inheritance is enabled by default
for all groups and individual systems that you add to the System Tree. This
allows you to set policies and schedule client tasks in fewer places.
To allow for customization,
however, inheritance can be broken by applying a new policy at any location of
the System Tree (provided a user has appropriate permissions). You can lock
policy assignments to preserve inheritance.
Add a
Workstation the Allow Outbound TCP Port 25 in McAfee EPO
Purpose
This
article describes the steps to add a single workstation to allow outbound TCP
port 25 (SMTP). This is done by adding a EPO tag to the system in the EPO
console that then assigns a special Access Protection policy that does not
block the traffic.
Steps
3.
Select Actions\Tags\Apply Tag
4.
Select NO BLOCK 25
5.
Ok
6.
Select Wake Up Agents
7.
Leave defaults and select OK
8.
Trigger Server Task to Apply Specific Policy OR wait an
hour for the task to automatically run
1. Browse to
Server Tasks
2. Select run
for either the 32-bit or 64-bit OS task
1. Apply
Specific Policy to 32-Bit + No Block 25 Systems
2. Apply
Specific Policy to 64-Bit + No Block 25 Systems
9.
Test from workstation
10. Done
Tips
1.
All Server class operating systems allow outbound TCP port 25 by
default.
1. So it's
not neccessary to tag server class operating systems with the above process.
Manually Add a System to McAfee EPO Server
Purpose
This article explains how to add
a single system that is missing in the McAfee EPO Server System
tree. The purpose could be for such things as pushing the agent from
the EPO Server to a system for the first time. Once any system has the
McAfee agent installed and communicating correctly to the EPO server; it will
automatically show up in the System Tree.
Steps
2.
Select System Tree \ Systems
3.
Select a System Tree Group
1.
Example: Lost&Found
4.
Select System Tree Actions \ New Systems
5.
Select How to add systems
6.
Either type/paste the systems into the Systems to add field or
Select Browse...to connect to a domain and pick the systems
7.
Uncheck "Disable System Tree sorting..."
8.
Enter Credentails for agent installation if desired.
9.
Select OK
10.
Watch progress in Server Task Log
Monitor Virus
Threats in McAfee EPO Console
Purpose
This
article describes some basic ways to monitor virus threats through the McAfee
EPO web console.
View Dashboards
2.
Select Dashboards with the default icon at the top or
Menu\Reporting\Dashboards
3.
You may have to add the Dashboards published by Levon
1. Select
Options in the upper right
2. Select
Manage Dashboards
3. Select
each Dashboard you'd like to add to your Dashboard section
4. For each
Select Make Active in the lower right
Threat Overview Dashboard
·
Select Threat Overview Dashboard from the submenu bar
Columns:
1.
Past 24 hours
2.
Past 7 days
3.
Past 30 days
Rows:
1.
Top 10 Detected Threats for all systems
2.
Detected Threats for Workstations
3.
Detected Threats for Servers
Day, Week, Month Breakout Threat Dashboards
Three Dashboarded were created
for Detected Threat monitoring. They are named "Threats (Today), Threats
(Past Week), and Threats (Past Month). Each of these are have identical
monitors, but the queries for each select the three different timeframes to pull
from the database.
Monitors:
1.
Row 1 - Column 1
1.
Detected threats per site (EPO Group)
2.
Row 1 - Column 2
1.
Top 10 Detected Threats
3.
Row 2 - Column 1
1.
Detected Threats per Workstation
4.
Row 2 - Column 2
1.
Detected Threats per Server
Item Drill
Down in Monitors
For all the monitors including
these threat monitors you can browse items by clicking on them in the monitor
window.
Tips
The Day, Week, Month
Dashboards have less to load so they load faster than the Threat Overview
Dashboard.
So Detections are false
and it is best to research them and determine if we need an exclusion to
eliminate the issue.
Each monitor can be
expanded to fill the console screen by clicking on the upper right square icon
on the monitor.
No comments:
Post a Comment