McAfee Data Loss Prevention Endpoint 9.4.0
|
|
- Dwayne Cobb
- 8 years ago
- Views:
Transcription
1 Release Notes Revision A McAfee Data Loss Prevention Endpoint For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues Find product documentation About this release This document contains important information about the current release. We strongly recommend that you read the entire document. We do not support the automatic upgrade of a pre-release software version. To upgrade to a production release of the software, you must first uninstall the existing version. This release includes the following: McAfee Data Loss Prevention extension for McAfee epolicy Orchestrator (McAfee epo ) The McAfee DLP extension can be installed in McAfee epo together with either McAfee DLP Endpoint extension (9.3 Patch 4) or (9.3 Patch 5). On McAfee epo 5.1.x, however, running McAfee DLP side by side with McAfee DLP Endpoint results in errors with queries and reports. In addition, the DLP Incident Manager and DLP Operational Events modules use the same names in both versions, which might cause confusion. For these reasons, upgrading to McAfee DLP Endpoint extension is required when running extensions side by side in McAfee epo 5.1.x. Install the version extension before installing the version extension. Upgrading the endpoint client software to version is not necessary. 1
2 McAfee Data Loss Prevention Endpoint (McAfee DLP Endpoint) client for Microsoft Windows build McAfee DLP Endpoint client for OS X build McAfee DLP Endpoint Diagnostic Tool for Windows McAfee Help Desk This release was developed for use with: McAfee epo and When running McAfee epo in Microsoft Internet Explorer, use IE version 10.0 or later. McAfee Agent for Windows 4.8 Patch 2 and 5.0 McAfee Agent for Mac 4.6 Patch 3, 4.8 Patch 2, and 5.0 OS X Yosemite requires 4.8 Patch 2 or 5.0 only. Supported systems The McAfee DLP Endpoint client for Microsoft Windows in this release was developed for use with the following Microsoft operating systems. Windows 7 SP1 or later Enterprise and Professional editions, 32-bit and 64-bit Windows 8 and 8.1 or later Enterprise and Pro, 32-bit and 64-bit Windows Server 2008 R2 and 2008 SP2 or later, 32-bit and 64-bit Windows Server 2012 and 2012 R2 or later, 64-bit File System Discovery rules and Network Communication Protection rules are not supported on servers. Policy conversion and incident or operational event migration from McAfee DLP Endpoint 9.3.x to are not currently supported. The McAfee DLP Endpoint client for OS X in this release was developed for use with the following Mac operating systems. OS X Mountain Lion OS X Mavericks OS X Yosemite Compatible McAfee managed products The McAfee DLP Endpoint client for Windows in this release has been tested for compatibility with the following McAfee managed product versions. McAfee Application Control (formerly Solidcore) McAfee Client Proxy 1.2 and 2.0 McAfee Data Exchange Layer (DXL) 1.0 and 1.1 McAfee Drive Encryption (formerly McAfee Endpoint Encryption for PC) 7.0 Patch 1 McAfee File and Removable Media Protection (FRP) (formerly McAfee Endpoint Encryption for Files and Folders) HF ( ) 2
3 McAfee Host Intrusion Prevention System 8.0 Patch 5 McAfee Policy Auditor 6.2 McAfee Risk Advisor 2.7 Patch 2 McAfee Rogue System Detection (RSD) McAfee SiteAdvisor Enterprise 3.5 Patch 2 McAfee Threat Intelligence Exchange (TIE) 1.0 McAfee Virtual Technician McAfee VirusScan Enterprise 8.7 Patch 5 and 8.8 Patch 4 The McAfee DLP Endpoint client for Mac in this release has been tested for compatibility with the following McAfee managed product versions. McAfee Client Proxy 2.0 McAfee Endpoint Encryption for Mac 7.0 McAfee Endpoint Protection for Mac 2.2 McAfee Management of Native Encryption (MNE) 2.1 McAfee VirusScan for Mac 9.7 Supported software This release has been tested for compatibility with the following third-party software versions. Virtualization applications: Citrix XenApp 6.0, 6.5 FP2, 7.5, and 7.6 Citrix Device Rules are not supported when using a separate controller server with XenApp 7.5. Citrix XenDesktop 5.5, 5.6, 7.0, 7.1, 7.5, and 7.6 VMware View 4.6, 5.0, 5.1, 5.2, and 5.3 VMware Hyper-V Cloud applications: Box Sync Microsoft OneDrive Dropbox Syncplicity Google Drive Security and encryption applications: Boldon James Classifier Microsoft Active Directory Rights Management Service (AD RMS) 2008, 2012 Seclore FileSecure Policy Server Seclore Desktop Client Titus Message Classification 3.5 3
4 Titus Classification for Desktop 3.1 Titus Classification Suite 4.3 HF 1 TrueCrypt Office applications: Adobe Acrobat Pro, X and XI Adobe Reader 7 11 Google Chrome Lotus Notes client software 8.5.2, 8.5.3, 9.0, and Microsoft Internet Explorer 8 11 Microsoft Office 2007, 2010, and 2013 SP1 Microsoft Outlook 2007, 2010, 2013 SP1 Microsoft Sharepoint 2007, 2010, and 2013 Mozilla Firefox New features This release of the product includes these new features. Native McAfee epo DLP Policy management tools The McAfee DLP Endpoint console is fully integrated in McAfee epo. It is easier to install and no longer relies on ActiveX. Two new console modules, Classifications and DLP Policy Manager, configure the tagging, classification criteria (formerly known as content category definitions), and rules. Multiple policies New DLP Policy Manager supports easy deployment of multiple McAfee DLP Endpoint policies across your organization. JAWS support The McAfee DLP Endpoint client console and notifications support Job Access With Speech (JAWS) computer screen readers for the visually impaired (Windows client only, English only). Enhancements This release of the product includes these enhancements. The following enhancements apply to the McAfee DLP Endpoint client for Windows only. Protection rules Support for: 4
5 Google Chrome browser in web post protection rules Block action in application file access protection rules (Skype, Nero, and so forth) Block action in cloud protection rules Advanced mode and V4 printers in printer protection rules; XPS/PDF is now part of the printer protection rule Block and charge with iphone 4 and later using Plug and Play Device rules with Block action Ability to exclude by application process name in removable storage device rules, for example, trusted backup software or malware removal tools Built-in rule sets and classifications To help facilitate first-time deployments, the DLP Policy Manager contains more than 20 built-in Rule Sets that demonstrate typical scenarios. These rule sets can be used as-is, or duplicated and customized as required for specific applications. The Rule Sets use built-in Classifications that can likewise be used as-is, or duplicated and customized as required. Improved connectivity support Rules now offer three connectivity options in place of the previous "online/offline" option. You can define different actions for when the endpoint computer is connected to or disconnected from the corporate network, or when connected using VPN. Different VPN actions apply only to Printer Protection, Network Communication Protection, and Plug and Play Device rules. Classification definitions Proximity between dictionaries, keywords, and advanced patterns (any two of the three) Advanced patterns can count a match string once or multiple times No limit for advanced pattern entries Notification and Business Justification Fully customizable: Button reactions Text Localization options Installation instructions The McAfee DLP extension is installed in McAfee epo. The McAfee DLP Endpoint client is available in two versions, one for Microsoft Windows and one for OS X computers. The recommended installation of the client software uses the McAfee epo infrastructure for deployment to the endpoint computers. You can also deploy McAfee DLP Endpoint client software to your network using third party enterprise deployment tools such as Microsoft Systems Management Server (SMS). 5
6 For information about installing McAfee DLP Endpoint, see the McAfee Data Loss Prevention Endpoint Product Guide, version Known issues For a list of known issues in this product release, see this McAfee KnowledgeBase article: KB Find product documentation After a product is released, information about the product is entered into the McAfee online Knowledge Center. Task 1 Go to the Knowledge Center tab of the McAfee ServicePortal at 2 In the Knowledge Base pane, click a content source: Product Documentation to find user documentation Technical Articles to find KnowledgeBase articles 3 Select Do not clear my filters. 4 Enter a product, select a version, then click Search to display a list of documents. Product documentation Every McAfee product has a comprehensive set of documentation. See this documentation for your product version: McAfee Data Loss Prevention Endpoint Release Notes McAfee Data Loss Prevention Endpoint Product Guide Help modules are automatically included with the product installation. Copyright 2015 McAfee, Inc. Intel and the Intel logo are trademarks/registered trademarks of Intel Corporation. McAfee and the McAfee logo are trademarks/ registered trademarks of McAfee, Inc. Other names and brands may be claimed as the property of others. A00
McAfee Data Loss Prevention Endpoint 9.3.416
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.416 For use with McAfee epolicy Orchestrator Contents About this release Resolved issues Installation instructions Known issues Find product
More informationMcAfee Data Loss Prevention Endpoint 9.4.100
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.4.100 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues
More informationMcAfee Data Loss Prevention Endpoint 10.0.0
Release Notes Revision A McAfee Data Loss Prevention Endpoint 10.0.0 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Resolved issues Installation instructions
More informationMcAfee Data Loss Prevention Endpoint 9.4.100
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.4.100 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054,
More informationMcAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course
McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course The McAfee Host Data Loss Prevention (DLP) Administration course provides attendees with in-depth
More informationProduct Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Threat Intelligence Exchange 1.0.1 Software
Release Notes McAfee Threat Intelligence Exchange 1.0.1 Software Contents About this release Installation instructions New features Resolved issues Known issues Product documentation About this release
More informationMcAfee Host Intrusion Prevention 8.0.0 Patch 6 Software
Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Network Security Platform 8.2
8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known
More informationAbout Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationProduct Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0
Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationRelease Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationMcAfee Firewall for Linux 8.0.0
Release Notes McAfee Firewall for Linux 8.0.0 Contents About this release Features Installation Known issues Find product documentation About this release This document contains important information about
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Policy Auditor 6.2.0 software Installation Guide
McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationInstallation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationSymantec Encryption Satellite for Windows Version 3.3 Release
Page 1 of 5 Symantec Encryption Satellite for Windows Version 3.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release
More informationCreating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationRequired Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
More informationClient System Requirements for Brainloop Secure Dataroom as of Version 8.30
Client System Requirements for Brainloop Secure Dataroom as of Version 8.30 Copyright Brainloop AG, 2004-2014. All rights reserved. Document version 2.0 All trademarks referred to in this document are
More informationHow To Fix A Fault Notification On A Network Security Platform 8.0.0 (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent
XC-Cluster Release Notes Network Security Platform 8.0 Revision A Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
More informationhttp://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationMcKesson Radiology 12.0 Technical Requirements
McKesson Radiology 12.0 Technical Requirements McKesson Radiology Version 12.0 is designed to not require workstation replacement, assuming the legacy McKesson PACS hardware meets the specifications listed
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Data Loss Prevention 9.3.0
Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationBITDEFENDER SMALL OFFICE SECURITY
BITDEFENDER SMALL OFFICE SECURITY Quick Start Guide Bitdefender Small Office Security Quick Start Guide Publication date 2014.06.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part
More informationInstallation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationAltiris Patch Management Solution for Windows 7.1 from Symantec Release Notes
Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationWorry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8
Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud8 Administrator s Guide System Requirements Trend Micro Incorporated reserves the right to make changes to
More informationImplementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationMcAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationhttp://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationBest Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationMcAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
More informationMcAfee Application Control / Change Control Administration Intel Security Education Services Administration Course
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationREDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS
REDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS User Guide v1.0 12/08/2014 VERSION CONTROL Date Change Author 12/08/14 1.0 Initial version created and signed off DM Page 2 Public UNITY SOFTWARE MINIMUM
More informationMcKesson Radiology 12.1.1 Technical Requirements
McKesson Radiology 12.1.1 Technical Requirements McKesson Radiology Version 12.1.1 is designed to not require workstation replacement, assuming the legacy McKesson PACS hardware meets the specifications
More informationUnprecedented Malware Growth
McAfee epolicy Orchestrator 4.5 Best Practices Sumeet Gohri Mid-Atlantic Sales Engineer McAfee User Group meeting organized by MEEC Agenda 9:30 am 9:45 am Welcome 9:45 am - 11:00 am epo 11:00 am 11:15
More informationData Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP rolf@mcafee.com January 22, 2013 for ANSWER SA Event, Geneva Position Features
More informationAdobe Reader Settings
Adobe Reader Settings Table of Contents Adobe 9 and X (10) Reader Settings...2 For Adobe Reader X (10)... 5 Adobe Reader XI (11)...7 Internet Explorer 8 and 9... 8 Google Chrome... 9 Mozilla Firefox...
More informationMcAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationOpenScape Web Collaboration
OpenScape Web Collaboration Performance-boosting collaboration and secure support for teams from anywhere OpenScape Web Collaboration is a scalable, reliable, and highly secure web conferencing solution
More informationMcAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationUsing Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet
System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used
More informationConnecting Remotely via the Citrix Access Gateway (CAG)
2011 Connecting Remotely via the Citrix Access Gateway (CAG) Version 2.0 *** The CAG is intended for users with OE equipment only. Users with GFE must still use RESCUE as their VPN solution. *** All VISN
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationBITDEFENDER ENDPOINT SECURITY TOOLS
BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights
More informationSage 300 2016. Compatibility guide. Last revised: October 26, 2015
Sage 300 2016 Compatibility guide Last revised: October 26, 2015 This is a publication of Sage Software, Inc. Copyright 2015. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage
More informationProduct Guide. McAfee VirusScan for Mac 9.8.0
Product Guide McAfee VirusScan for Mac 9.8.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS Intel
More informationThe Education Edge / The Financial Edge 7.85
Minimum System Requirements This document lists the minimum infrastructure required to run your Blackbaud. We recommend the purchase of topof-the-line equipment when possible and that organizations budget
More informationClient Operating System and Applications Scope
Client Operating System and Applications Scope Workshop Purpose and Objectives Workshop Purpose Review client experience options for the user base Review requirements to enable the rich experience and
More informationHow McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
More informationBest Practices Guide. McAfee Endpoint Protection for Mac 1.1.0
Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationRelease Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.
Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -
More informationMcAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationAbout this release. McAfee Application Control and Change Control 6.1.1. Addendum. Content change tracking. Configure content change tracking rule
Addendum McAfee Application Control and Change Control 6.1.1 About this release For use with epolicy Orchestrator 4.6 5.0 Software This document is an addendum to the McAfee Change Control and Application
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationSecureAnywhereTM Business Global Site Manager
SecureAnywhereTM Business Global Site Manager Webroot SecureAnywhere Business MSP... 3 Requirements... 3 Management Console Access Requirements... 3 WSA Agent - System Requirements... 3 Workstations...
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationMcAfee Client Proxy 1.0.0 Software
Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
More informationInstallation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationBenefits of upgrading to Enterprise Vault 11
Benefits of upgrading to Vault 11 This document describes the new s and benefits that are available to existing customers who upgrade to Vault 11. Upgrading to the latest version can provide benefits in
More informationInstallation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationBest Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationRelease Notes for Host Intrusion Prevention 8.0
Release Notes for Host Intrusion Prevention 8.0 About this document New features Known issues Finding product documentation About this document Thank you for choosing this McAfee product. This document
More informationTechnology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationQlik Sense Desktop. Qlik Sense 2.0.6 Copyright 1993-2015 QlikTech International AB. All rights reserved.
Qlik Sense Desktop Qlik Sense 2.0.6 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31
Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134
More informationMcAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationWeb Supervisor/Agent. System Requirements & Troubleshooting Guide. 989 Old Eagle School Road Wayne, PA 19087 (610) 964-8000. www.evolveip.
Web Supervisor/Agent System Requirements & Troubleshooting Guide 989 Old Eagle School Road Wayne, PA 19087 (610) 964-8000 www.evolveip.net Evolve IP Guide Copyright Notice Trademarks Copyright 2011 Evolve
More information2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationOffice 365 Professional Onboarding Services
Office 365 Professional Onboarding Services Office 365 Standard Email Onboarding Standard onboarding is designed to train one user so they can manage the administrative and end user functionalities of
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More information