McAfee Client Proxy 2.0

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "McAfee Client Proxy 2.0"

Transcription

1 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator

2 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, , TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Evader, Foundscore, Foundstone, Global Threat Intelligence, McAfee LiveSafe, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee TechMaster, McAfee Total Protection, TrustedSource, VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Client Proxy 2.0 Product Guide

3 Contents Preface 5 About this guide Audience Find product documentation Conventions Introduction 7 How Client Proxy works Deployment options Managing McAfee Client Proxy with McAfee epo 2 Completing the setup using McAfee epo 13 Supported epo Check the system requirements Download and install the product files Install the extension Check in the Client Proxy client package Deploy to end-user computers using McAfee epo Configuring and using McAfee Client Proxy with McAfee epo 17 Configurable policy options Proxy server list Client configuration Bypass list Block list Configure a policy Configure the proxy servers Configure the client settings Configure the Bypass List Configure the Block List Assign the policy using McAfee epo Users and permission sets View end-user installation data Suspending policy enforcement Generate a release code Export the policy to an XML file Maintaining McAfee Client Proxy using McAfee epo 27 Upgrade Client Proxy using McAfee epo Install a hotfix Uninstall Client Proxy Remove the extension from McAfee epo Remove the package from McAfee epo McAfee Client Proxy 2.0 Product Guide 3

4 Contents Managing McAfee Client Proxy with McAfee SaaS Web Protection Control Console 5 Completing the setup using the Control Console 33 Check the system requirements Download and install the product files Configuring Client Proxy using the Control Console 35 Configurable policy options Create a policy using the Control Console Configure the proxy servers Configure the bypass list Configure the block list Deploy to end-user computers using other systems View status and configuration details Suspend policy enforcement Maintaining McAfee Client Proxy on your system 41 Upgrade McAfee Client Proxy on your system Install a hotfix Uninstall McAfee Client Proxy Index 43 4 McAfee Client Proxy 2.0 Product Guide

5 Preface This guide provides the information you need to work with your McAfee product. Contents About this guide Find product documentation Conventions About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Security officers People who determine sensitive and confidential data, and define the corporate policy that protects the company's intellectual property. Find product documentation After a product is released, information about the product is entered into the McAfee online Knowledge Center. 1 Go to the Knowledge Center tab of the McAfee ServicePortal at 2 In the Support Content pane: Click Product Documentation to find user documentation. Click Technical Articles to find KnowledgeBase articles. McAfee Client Proxy 2.0 Product Guide 5

6 Preface Conventions 3 Select Do not clear my filters. 4 Enter a product, select a version, then click Search to display a list of documents. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. 6 McAfee Client Proxy 2.0 Product Guide

7 1 Introduction McAfee Client Proxy is endpoint client software for Microsoft Windows and Mac OS X that is an essential component of the McAfee Web Protection hybrid deployment solution. The Client Proxy technology allows you to apply your organization's web security policy to a computer, regardless of its location. Contents How Client Proxy works Deployment options McAfee Client Proxy 2.0 Product Guide 7

8 1 Introduction How Client Proxy works How Client Proxy works McAfee Client Proxy extends network security solutions to computers outside the corporate network. End users receive automatic protection, regardless of their location (for example, a laptop or mobile computing device in a hotel or coffee shop). McAfee Client Proxy redirects web traffic and network communications to either a McAfee Web Gateway appliance or McAfee SaaS Web Protection service. Regardless of the location of the end-user device (whether it is inside the corporate network, connected by VPN, or outside the corporate network), the Client Proxy software enforces your organization's policies. It determines whether to route the web request, deny access, or bypass a proxy server. Figure 1-1 Client Proxy workflow 8 McAfee Client Proxy 2.0 Product Guide

9 Introduction Deployment options 1 When an end user is working within the corporate network, Client Proxy software: 1 Communicates with McAfee epolicy Orchestrator (McAfee epo ) or other servers configured within the policy. 2 Recognizes that the end user is working within the corporate network. 3 Remains passive, allowing web traffic and network communications to pass through. When an end user is working outside the corporate network, Client Proxy software: 1 Recognizes that the end user is working outside the corporate network. 2 Redirects all web traffic and network communications to the McAfee SaaS Web Protection service. All web traffic and network communication requests sent by Client Proxy to the SaaS Web Protection Service include end-user and AD group information that is applied to your organization's policy. 3 If the sent end-user information is mapped to a SaaS Web Protection service user account, the Client Proxy software applies the associated policy to the existing user account. If McAfee SaaS Web Protection does not recognize the sent end-user information as a mapped SaaS Web Protection user account, Client Proxy software applies the AD group information. If one or more AD groups match the end-user information, SaaS Web Protection service applies the associated policy or a combination of associated policies. When the sent end-user and AD group information are both unrecognized by SaaS Web Protection service, the proxy uses the default web policy. For organizations that use McAfee SaaS Web Protection service, Client Proxy also provides the option to always redirect web traffic and network communications to SaaS Web Protection service, regardless of the end user's location. Deployment options Client Proxy software can be deployed either with McAfee epo, or using a third-party deployment solution. Deploying with McAfee epo We highly recommend using McAfee epo to deploy McAfee endpoint software, especially in a large enterprise. It provides a single management platform that enables policy management and product enforcement. In this case, McAfee epo is installed and configured on the administrator operating system. The end user installing the Client Proxy software on McAfee epo servers must be a member of the local administrator group. Deploying with a third-party solution If you are using Client Proxy in a small- to medium-sized company and do not have McAfee epo, you can install the product within your corporate network using a third-party deployment solution. In this case, you deploy the Client Proxy software, then manually push the initial policy to end-user computers. McAfee Client Proxy 2.0 Product Guide 9

10 1 Introduction Deployment options Table 1-1 Example of the high-level process Deployment with McAfee epo 1 Install the Client Proxy extension.zip file so it is available in McAfee epo. 2 Check in the Client Proxy packages for Microsoft Windows and Mac OS X to the McAfee epo Master Repository. This release only includes a client package for Mac OS X. The Client Proxy 2.0 manager in McAfee epo, however, supports the Client Proxy version 1.2 clients for Microsoft Windows as well. If you are supporting both operating systems, McAfee epo deploys the appropriate clients to the endpoint computers. 3 Download the XML file from the Control Console that the Client Proxy extension imports when creating a policy. Deployment with third-party solutions 1 Use McAfee SaaS Web Protection to create policies that meet the needs of your network. 2 Follow the instructions of the third-party solution to create and deploy the installation package. 3 Deploy configured policies to end-user computers in your corporate network with Control Console. 4 Create policies that meet the needs of your network. 5 Deploy Client Proxy software to end-user computers within your corporate network. 10 McAfee Client Proxy 2.0 Product Guide

11 Managing McAfee Client Proxy with McAfee epo Chapter 2 Chapter 3 Chapter 4 Completing the setup using McAfee epo Configuring and using McAfee Client Proxy with McAfee epo Maintaining McAfee Client Proxy using McAfee epo McAfee Client Proxy 2.0 Product Guide 11

12 Managing McAfee Client Proxy with McAfee epo 12 McAfee Client Proxy 2.0 Product Guide

13 2 Completing the setup using McAfee epo To set up McAfee Client Proxy in your corporate network, download and install the Client Proxy installation files on the administrator operating system. Deploy the Client Proxy software to end-user computers. Contents Supported epo Check the system requirements Download and install the product files Install the extension Check in the Client Proxy client package Deploy to end-user computers using McAfee epo Supported epo This release of Client Proxy is compatible with these McAfee epo versions. McAfee epo McAfee epo McAfee epo McAfee epo We don't guarantee that Client Proxy works with other versions of McAfee epo. McAfee Client Proxy 2.0 Product Guide 13

14 2 Completing the setup using McAfee epo Check the system requirements Check the system requirements Verify that your network systems meet the hardware and operating system requirements. Table 2-1 Hardware requirements Hardware type Servers Run the McAfee epo software and Client Proxy extension. End-user computers Run the Client Proxy software. Specifications CPU Intel Pentium IV 2.8 GHz or higher RAM 1 GB minimum (2 GB recommended) Hard disk 80 GB minimum RAM 1 GB minimum (2 GB recommended) Hard disk 300 MB minimum free disk space (500 MB recommended) Table 2-2 Operating system requirements Computer type Servers Run the McAfee epo software and Client Proxy extension. End-user computers Run the Client Proxy software. Software Windows Server 2003 Standard (SE) SP1 or later, 32-bit or 64-bit Windows Server 2003 Enterprise (EE) SP1 or later, 32-bit or 64-bit Windows Server 2008 Enterprise SP1 or later 32- or 64-bit Windows Server 2012, 64-bit OS X 10.8 (Mountain Lion), 10.9 (Mavericks), or (Yosemite) Download and install the product files Download the Client Proxy product files from the McAfee Content & Cloud Security Portal and install them on the administrator operating system. Client Proxy also supports McAfee epo Software Manager. 1 Download the product files. a Log on to the operating system as an administrator. b c d e Go to the McAfee Content & Cloud Security Portal. Enter your user name and password, then click Login. Select Software McAfee Web Gateway Tools McAfee Client Proxy. Select and save the.zip files for your operating system. Client Proxy server software for McAfee epo: MCPSRVER1000_2.0.0.x_package.zip Client Proxy client software for Mac OS X: Mcpdistribution.zip 2 Install the server software, and check the client package into McAfee epo. 14 McAfee Client Proxy 2.0 Product Guide

15 Completing the setup using McAfee epo Install the extension 2 Install the extension Install the Client Proxy extension.zip file so it is available in McAfee epo. For option definitions, click? in the interface. 1 From the McAfee epo interface, select Menu Software Extensions. 2 Click Install Extension. 3 Click Browse to locate the Client Proxy extension file (MCPSRVER1000_2.0.0.x_package.zip), then click Open OK. The Install Package window appears. 4 Click OK. The MCPSRVER1000_2.0.0.x_package installs. The package installs the Client Proxy manager, Common Catalog, Help Desk, and the related Help files. Check in the Client Proxy client package Check in the Client Proxy package to the McAfee epo Master Repository. For option definitions, click? in the interface. 1 From the McAfee epo interface, select Menu Software Master Repository. 2 From the Actions menu, select Check In Package. 3 In the Check In Package window, select the package type (ZIP), then click Browse. 4 Select the Client Proxy OS X client (McpDistribution.zip) file you downloaded earlier, click Open then Next. 5 Review the information, then click Save. 6 If you are deploying both Microsoft Windows and Mac OS X clients, repeat the check-in for the Client Proxy MCP_1_2_0_x.zip file. McAfee Client Proxy appears in the Packages in Master Repository list. McAfee Client Proxy 2.0 Product Guide 15

16 2 Completing the setup using McAfee epo Deploy to end-user computers using McAfee epo Deploy to end-user computers using McAfee epo Deploy Client Proxy software to end-user computers using McAfee epo. 1 From the McAfee epo interface, select Menu Systems System Tree. 2 From the System Tree list, select the subgroup level to deploy Client Proxy. Select the My Organization subgroup to deploy Client Proxy to all computers managed by McAfee epo. To deploy Client Proxy to the individual computers available in the right pane, select a subgroup under My Organization. 3 Click the Assigned Client s tab. 4 From the Actions menu, select New Client Assignment. The Client Assignment Builder wizard opens. 5 Configure the Client Assignment Builder options. a From the Product menu, select McAfee Agent. b c From the Type menu, select Product Deployment, Click Create New. The Product Deployment window appears. 6 Configure the Product Deployment options. a Enter a task name and optional description. b c Select a Target platform. In the Products and Components field, select McAfee Client Proxy from the drop-down list. The remaining fields automatically populate. d e Configure the remaining options. Click Save. 7 Click Next. 8 From the Schedule type drop-down list, select Run immediately, then click Next. 9 Review the task summary, then click Save. The task is scheduled for the next time the McAfee Agent checks for updates. To force the installation to run immediately, issue an agent wake-up call. After installation, Client Proxy runs immediately without restarting the end-user computer. Client Proxy does not redirect data until a policy is configured. 16 McAfee Client Proxy 2.0 Product Guide

17 3 Configuring and using McAfee Client Proxy with McAfee epo Use McAfee epo to manage and configure the options that define the Client Proxy policies enforced on end-user computers. Contents Configurable policy options Configure a policy Users and permission sets View end-user installation data Suspending policy enforcement Export the policy to an XML file Configurable policy options Policy options allow you to tune multiple settings when you configure policies. The following are configurable policy options available in McAfee epo. Proxy server list The proxy server list identifies available McAfee Web Gateway appliances, McAfee SaaS Web Protection servers, and McAfee epo. When McAfee Client Proxy detects that an end-user computer is disconnected from the corporate network, network traffic is automatically redirected to McAfee Web Gateway appliances or McAfee SaaS Web Protection servers, which are configured in the proxy server list. You can configure how Client Proxy connects to proxy servers using these options: McAfee Client Proxy 2.0 Product Guide 17

18 3 Configuring and using McAfee Client Proxy with McAfee epo Configurable policy options connect to the first proxy server that is accessible based on their order in the following list Client Proxy connects to the first proxy server in the Proxy Server List. If the connection to the first proxy server in the list fails, the software attempts a connection on the second proxy server in the list. If the connection is lost during transmission, the software reconnects with the first proxy server in the list. connect to the proxy server that has the fastest response time Client Proxy connects to the closest proxy server in the Proxy Server List based on the proxy server response time. If the connection to the closest proxy server fails, the software attempts to connect to the second closest proxy server. If the connection is lost during transmission, the software reconnects with the original closest proxy server. When HTTP/HTTPS traffic is redirected, Client Proxy adds metadata to the request, such as: Identification tokens Encrypted domain user names AD groups The proxy server uses this metadata to verify that Client Proxy is redirecting the network traffic, then determines the policy definitions configured in the associated policy. Client configuration Client Configuration options define how Client Proxy behaves inside and outside the corporate network for end users. Customer Identifier Client Proxy includes a customer ID with a required secret key in its policy definition to ensure that client identities are securely protected. The customer ID also determines which policy to apply and when to apply it. Traffic Redirection Client Proxy redirects network traffic to proxy servers, whether inside the corporate network, connected by VPN, or outside of the corporate network. Corporate Network Detection When the end-user computer is inside the corporate network, stops redirecting web traffic through the proxy. Corporate VPN Detection When the end-user computer is connected to the corporate VPN, stops redirecting web traffic through the proxy. Log File Settings Enables client logging, which adds a log file to each end-user computer that identifies errors and troubleshooting information. Active Directory Groups A group filter that allows you to define the group information provided to the filtering proxy. Access Protection Prevents the end user from uninstalling, deleting, renaming, or tampering with Client Proxy from their computer. Access protection is not supported on OS X. Bypass list Each policy maintains a list of McAfee Common Catalog definitions for Client Proxy to bypass when network traffic is redirected to the proxy server. The bypass list can include domain names, network addresses, network ports, and processes that end-user computers connect to directly. A Common Catalog instance is created for each configured policy. When a bypass list item is modified, the associated Common Catalog instance is also modified. 18 McAfee Client Proxy 2.0 Product Guide

19 Configuring and using McAfee Client Proxy with McAfee epo Configure a policy 3 Block list Each policy maintains a list of processes that are permanently blocked from network communication. The block list reduces the amount of network traffic redirected to the proxy server, but can also apply unintended Internet access restrictions to end-user computers. Configure a policy Use McAfee epo to create and configure policies that are deployed to end-user computers. For option definitions, click? in the interface. 1 From the McAfee epo interface, select Menu Policy Policy Catalog. 2 From the Product drop-down list, select McAfee Client Proxy The default policy assignment appears. 3 Click the policy name to open a policy for editing. 4 To create a new policy, click New Policy. The Create a New Policy dialog box appears. 5 Use the drop-down list to select an existing policy as a base. In the Name field, type a name for the policy, enter any additional information in Notes, then click OK. s Configure the proxy servers on page 19 Configure the proxy servers for Client Proxy to redirect network traffic. Configure the client settings on page 20 Configure the settings that define how deployed Client Proxy policies behave inside or outside the corporate network. Configure the Bypass List on page 21 Configure and add the web definitions to the Bypass List that end-user computers directly connect to by bypassing the policy. Configure the Block List on page 21 To reduce the amount of network traffic redirected to the proxy server, configure and add processes to the Block List that are permanently blocked from communicating with the network. Assign the policy using McAfee epo on page 21 Assign policies to specific end-user computers within your corporate network. Configure the proxy servers Configure the proxy servers for Client Proxy to redirect network traffic. For option definitions, click? in the interface. 1 On the Policy Catalog page, select a policy. 2 From the Client Proxy Settings menu, select Proxy Servers. McAfee Client Proxy 2.0 Product Guide 19

20 3 Configuring and using McAfee Client Proxy with McAfee epo Configure a policy 3 In the Proxy Server List, select how Client Proxy connects to the proxy servers using these options: connect to the first accessible Proxy Server based on their order in the list below connect to the Proxy Server which has the fastest response time 4 Add proxy servers to the Proxy Server List. At least one proxy server definition is required in order to save the policy. a b c d In the Proxy Server Address field, type the proxy server IP address or host name. In the Proxy Port field, type the port for the proxy server. To direct HTTP/HTTPS requests to the Web Gateway appliance or SaaS Web Protection service, select the HTTP/HTTPS checkbox. In the Non-HTTP/HTTPS Redirected Ports field, type the non-http/https redirected ports. For non-http/https protocols, make sure that the server supports the protocol. e Click Add. The proxy server appears in the Proxy Server List. 5 In the Actions column, click the arrows to change the order of proxy servers in the Proxy Server List. 6 By default, Client Proxy bypasses local address. Deselect the checkbox if you want Client Proxy to redirect all requests. Do not attempt to save the policy at this point. The Customer Identifier field information on the Client Configuration page is required before you can save the policy. Configure the client settings Configure the settings that define how deployed Client Proxy policies behave inside or outside the corporate network. For option definitions, click? in the interface. 1 From the Client Proxy Settings menu, select Client Configuration. 2 In the Customer Identifier section, click Browse, select the ID file, then click Open. This file is provided by the Web Gateway or SaaS Web Protection administrator. The Unique Customer ID and Shared Password fields are automatically populated. 3 Configure the remaining options. Access Protection is not supported on Mac OS X endpoints. 20 McAfee Client Proxy 2.0 Product Guide

21 Configuring and using McAfee Client Proxy with McAfee epo Configure a policy 3 Configure the Bypass List Configure and add the web definitions to the Bypass List that end-user computers directly connect to by bypassing the policy. Creating a bypass list in McAfee epo uses McAfee Common Catalog to specify the list. Client Proxy uses only four of the definition types from the catalog: domain name, network address, network port, and process name. Process names can now be either Microsoft Windows format (test.exe) or Mac OS X format (test). For option definitions, click? in the interface. 1 From the Client Proxy Settings menu, select Bypass List. 2 From the Actions menu, select Add bypass list item, then select a web definition type. The Choose from existing values dialog box appears. 3 Do one of the following: Select at least one existing item. Click New Item, enter the required information, then click Save. 4 Click OK. Configure the Block List To reduce the amount of network traffic redirected to the proxy server, configure and add processes to the Block List that are permanently blocked from communicating with the network. For option definitions, click? in the interface. 1 From the Client Proxy Settings menu, select Block List. 2 Select an option for how to handle network traffic. 3 In the Process Name field, type the name of a process to block, then click Add. 4 Click Save. Assign the policy using McAfee epo Assign policies to specific end-user computers within your corporate network. For option definitions, click? in the interface. 1 Select Menu Systems System Tree. 2 From the System Tree menu, select a group or subgroup. 3 Click the Assigned Policies tab. 4 From the Product drop-down list, select McAfee Client Proxy In the Actions column, click Edit Assignment. The Policy Assignment for My Organization window appears. 6 Next to Inherit from, select Break inheritance and assign the policy and settings below. McAfee Client Proxy 2.0 Product Guide 21

22 3 Configuring and using McAfee Client Proxy with McAfee epo Users and permission sets 7 From the Assigned policy drop-down list, select the policy. 8 Choose whether or not to lock policy inheritance. 9 Click Save. Assign a Client to schedule the policy deployment to the endpoints. Users and permission sets We recommend creating specific administrator roles and permissions in McAfee epo for the Client Proxy catalog administrator. McAfee epo defines roles and permissions in terms of Permission Sets. A default permission set installed with the product, MCP Catalog Admin, gives the Client Proxy administrator view and change permissions for policies and certain Common Catalog items and actions. You can also assign an auditor role by adding view permission to one of the existing reviewer permission sets, or by creating a new permission set. You assign users to permission sets using Active Directory. View end-user installation data View the number of end-user computers that have successfully installed Client Proxy within the past month. For option definitions, click? in the interface. 1 From the McAfee epo interface, select Menu Reporting Queries & Reports. 2 From the Groups list, expand Shared Groups, then select McAfee Client Proxy. 3 Create a query. Option Select a query type. Definition 1 Click the Query tab, then select Actions New. The Query Builder opens with the Result Types view active. 2 From the Feature Group list, select Policy Management. 3 Choose from these options: Applied Client s Applied Policies Client Assignment Broken Inheritance Policy Assignment Broken Inheritance 4 Click Next. Select a query layout. 1 From the Display Results As list, select a graph or table for the query layout. Select a layout for your query that best displays your data. 2 Select the display options you want from the available lists. 3 To move to the Columns page, click Next. 22 McAfee Client Proxy 2.0 Product Guide

23 Configuring and using McAfee Client Proxy with McAfee epo Suspending policy enforcement 3 Option Select query columns. Definition 1 From the Available Columns list, select which columns to apply to your query. 2 In Selected Columns, select, drag, and position each column. 3 To move to the Filter page, click Next. Configure properties. Run the query. Save the query. From the Available Properties list, select which properties to use for filtering your query, and the appropriate values for each. Click Run. 1 To view the Save Query page, click Save. 2 Type a name for the query, add any notes, and select a group. 3 Click Save. 4 Create a report. Option Select a query. Definition 1 Click the Report tab, then select Actions New. The Report Builder opens with the Report Layout view active. 2 From the Toolbox menu, select Query Chart, and drag it to the Report Layout area. The Configure Query Chart dialog box appears. 3 From the Query drop-down list, select MCP: Endpoint Install Success/Failed events in last month. 4 Configure the remaining query options, then click OK. Customize the report. 1 In the Name, Description and Group tab, type a name, description, and which group to use. 2 Use the Header and Footer and Page Setup tabs to specify how you want the query to appear in the report. 3 Use the Runtime Parameters tab to select report level filters. Generate the report. Click Run. You can choose to run the report to get the information immediately, save to use it another time, or configure its appearance further by adding additional content. Suspending policy enforcement A user can request permission to access or transfer sensitive information for a limited time. Occasionally there is a legitimate business justification for temporarily suspending the security policy to access or transfer sensitive information. Client Proxy uses a mechanism known as "challenge/ response" to perform this function. The end user enters a request to an administrator by supplying certain ID information, and the administrator creates a code using McAfee Help Desk software. The code is valid for a specified time period. The user enters the code in the release code window; the security policy is bypassed for the preset time window, and automatically restarted when the time elapses. McAfee Client Proxy 2.0 Product Guide 23

24 3 Configuring and using McAfee Client Proxy with McAfee epo Export the policy to an XML file Removing endpoint software (Microsoft Windows only) A similar mechanism can be used to uninstall the Client Proxy software. McAfee Client Proxy is protected from unauthorized removal. We recommend the Client Proxy administrator uninstall the software using McAfee epo. In cases where McAfee epo removal is not possible, an uninstall key can be generated, and the software removed by normal means. Generate a release code To temporarily cancel policy enforcement on end-user computers, an end-user requests a bypass release code. The administrator uses McAfee Help Desk to create and issue the code, which is valid for a specified time period, and returns it to the user. 1 Do one of the following: On Mac OS X computers: from the McAfee menulet on the status bar, select McAfee Endpoint Protection for Mac Preferences, then select Client Proxy. On Microsoft Windows computers: click the McAfee icon on the system tray, then select Manage Features Disable McAfee Client Proxy. 2 Copy the Identification Code and Revision ID from the window and send it to the Client Proxy administrator, along with your End user name and matching End user address. Both identification code and revision ID are mandatory in a release code request. Optional information you can also include are computer name and business justification. 3 When the administrator supplies a release code, type the code in the Release Code field. On Mac OS X computers: Click Release. On Microsoft Windows computers: Click OK. The release code works only with the ID code and revision number specified. The revision number is verified when the code is generated. The Identification Code changes each time the Client Proxy window opens. Do not close the window until you fill out the Release Code field with a code from the administrator. Clicking another tab (General or Update changes the identification code. Remain on the Client Proxy tab until you receive a release code.) You can copy and paste the ID code, but you cannot modify it. Policy enforcement is canceled for the time period specified by the administrator when creating the release code. Export the policy to an XML file For troubleshooting purposes, export the McAfee Client Proxy policy to an XML file. For option definitions, click? in the interface. 1 From the McAfee epo interface, select a policy. 2 Select Actions Export Policy to File. The Export Policy to File dialog box appears. 24 McAfee Client Proxy 2.0 Product Guide

25 Configuring and using McAfee Client Proxy with McAfee epo Export the policy to an XML file 3 3 Click the McAfee Client Proxy Server File link. The other link, McAfee Client Proxy Client File, creates an OPG file you can import to other clients. 4 Save the file. 5 Click OK. McAfee Client Proxy 2.0 Product Guide 25

26 3 Configuring and using McAfee Client Proxy with McAfee epo Export the policy to an XML file 26 McAfee Client Proxy 2.0 Product Guide

27 4 Maintaining McAfee Client Proxy using McAfee epo Perform maintenance tasks to ensure Client Proxy operates as intended. Contents Upgrade Client Proxy using McAfee epo Install a hotfix Uninstall Client Proxy Upgrade Client Proxy using McAfee epo Download, install, and deploy the latest version of Client Proxy. For option definitions, click? in the interface. 1 Download the latest version of the product files. a Go to the McAfee Content & Cloud Security Portal. b c d Enter your user name and password, then click Login. Select Software McAfee Web Gateway Tools McAfee Client Proxy. Select and save the appropriate.zip file. Client Proxy also supports McAfee epo Software Manager. 2 Install the extension. a From the McAfee epo interface, select Menu Software Extensions. b c Click Install Extension. Click Browse to locate the Client Proxy.zip file, click Open, then click OK. The Install Package window appears. McAfee Client Proxy 2.0 Product Guide 27

28 4 Maintaining McAfee Client Proxy using McAfee epo Install a hotfix d e Click OK. Verify that the extension is installed, and select Menu Software Extensions. 3 Check in the package. a Select Actions Check in Package. The Check in Package window appears. b c Select the package type, then click Browse. Choose the Client Proxy.zip file you downloaded earlier, then click Open. McAfee Client Proxy appears in the Packages in Master Repository list. 4 Deploy the upgrade. a Select Menu Systems System Tree. b c d e f g h i j k From the System Tree list, select the subgroup level to deploy Client Proxy endpoint software. Click the Assigned Client s tab. From the Actions menu, select New Client Assignment. Configure the Client Assignment Builder options. Click Create New. Configure the Product Deployment options. Click Save. Click Next. From the Schedule type drop-down list, select Run immediately, then click Next. Review the task summary, then click Save. Install a hotfix McAfee occasionally releases Client Proxy hotfixes to address product issues. If the hotfix includes release notes, use the release notes instructions to install the hotfix. If the hotfix does not have release notes, use the following task. 1 Go to the McAfee Content & Cloud Security Portal. 2 Enter your user name and password, then click Login. 3 Select Software McAfee Web Gateway Tools McAfee Client Proxy. 4 Select and save the hotfix installation file for your operating system. 5 Run the hotfix installation file. 6 Follow the on-screen prompts to complete the installation. 28 McAfee Client Proxy 2.0 Product Guide

29 Maintaining McAfee Client Proxy using McAfee epo Uninstall Client Proxy 4 Uninstall Client Proxy To fully uninstall McAfee Client Proxy, remove the extension and package from McAfee epo, then remove the software from the administrator operating system. Contents Remove the extension from McAfee epo Remove the package from McAfee epo Remove the extension from McAfee epo Remove the McAfee Client Proxy extension from McAfee epo. For option definitions, click? in the interface. 1 Log on to McAfee epo as an administrator. 2 Select Menu Software Extensions. 3 From the Extensions list, select McAfee Client Proxy. 4 Click Remove. Remove the package from McAfee epo Remove the McAfee Client Proxy package from the McAfee epo Master Repository. For option definitions, click? in the interface. 1 Select Menu Software Master Repository. 2 From the McAfee Client Proxy Actions column, click Delete. McAfee Client Proxy 2.0 Product Guide 29

30 4 Maintaining McAfee Client Proxy using McAfee epo Uninstall Client Proxy 30 McAfee Client Proxy 2.0 Product Guide

31 Managing McAfee Client Proxy with McAfee SaaS Web Protection Control Console Chapter 5 Chapter 6 Chapter 7 Completing the setup using the Control Console Configuring Client Proxy using the Control Console Maintaining McAfee Client Proxy on your system McAfee Client Proxy 2.0 Product Guide 31

32 Managing McAfee Client Proxy with McAfee SaaS Web Protection Control Console 32 McAfee Client Proxy 2.0 Product Guide

33 5 Completing the setup using the Control Console To set up McAfee Client Proxy in your corporate network using a system other than McAfee epo, download and install the Client Proxy installation files from the Control Console. Contents Check the system requirements Download and install the product files Check the system requirements Verify that your network systems meet the hardware and operating system requirements. Table 5-1 Hardware requirements Hardware type End-user computers Run the Client Proxy software. Specifications Microsoft Windows endpoints: CPU Pentium III 1 GHz or higher RAM 1 GB minimum Hard disk 200 MB minimum free disk space Mac OS X endpoints: RAM 1 GB minimum Hard disk 200 MB minimum free disk space Table 5-2 Operating system requirements 32 bit Computer type End-user computers Run the Client Proxy software. Software Windows XP Professional SP3 or later Windows Vista SP2 or later Windows 7 SP1 or later Windows 8 or 8.1 McAfee Client Proxy 2.0 Product Guide 33

34 5 Completing the setup using the Control Console Download and install the product files Table 5-3 Operating system requirements 64 bit Computer type End-user computers Run the Client Proxy software. Software Windows 7 SP1 or later Windows 8 or 8.1 OS X 10.8 (Mountain Lion), 10.9 (Mavericks), or (Yosemite) Download and install the product files Download the Client Proxy product files from the McAfee Content & Cloud Security Portal or Control Console, and install them on the administrator operating system. To download the Client Proxy product files from the Control Console, you must first have a SaaS Web Protection service account. 1 Log on to the operating system as an administrator. 2 Download the product files. Option McAfee Content & Cloud Security Portal Steps 1 Go to the McAfee Content & Cloud Security Portal. 2 Enter your user name and password, then click Login. 3 Select QuickLinks Downloads McAfee Web Gateway Downloads Tools McAfee Client Proxy. 4 Select and save the.zip file for your operating system. Control Console 1 Log on to the Control Console as an administrator. 2 Select Web Protection Setup McAfee Client Proxy. 3 Click Download MCP. 4 Select and save the.zip file for your operating system. 3 Install the product files. Do one of the following: Option Description On Microsoft Windows computers Run McpInstaller.x64.exe OR Run McpInstaller.x86.exe Follow the on-screen prompts to complete the installation. On Mac OS X computers Run McpDistribution.dmg. Follow the on-screen prompts to complete the installation. 34 McAfee Client Proxy 2.0 Product Guide

35 6 Configuring Client Proxy using the Control Console Use the Control Console to manage and configure the options that define the Client Proxy policies enforced on end-user computers. Contents Configurable policy options Create a policy using the Control Console Deploy to end-user computers using other systems View status and configuration details Suspend policy enforcement Configurable policy options Policy options allow you to tune multiple settings when you configure policies. The following are configurable policy options available in the Control Console. Customer ID and secret key Client Proxy includes a customer ID and secret key in its policy definition to ensure that client identities are securely protected. Use the epo Export button to download the customer ID XML file for use with McAfee epo. If you are using McAfee epo, we recommend using McAfee epo to manage Client Proxy policies instead of the Control Console. Proxy servers McAfee Web Gateway appliances and McAfee SaaS Web Protection servers are configured in the Client Proxy Proxy Servers list. When the Client Proxy software detects that an end-user computer is disconnected from the corporate network, network traffic is automatically redirected according to the proxy servers list. You can configure how Client Proxy connects to proxy servers using these options: McAfee Client Proxy 2.0 Product Guide 35

36 6 Configuring Client Proxy using the Control Console Configurable policy options Connect to the first proxy server that is accessible based on their order in the following list Client Proxy connects to the first proxy server in the proxy servers list. If the connection to the first proxy server in the list fails, the software attempts a connection on the second proxy server in the list. If the connection is lost during transmission, the software reconnects with the first proxy server in the list. Connect to the proxy server that has the fastest response time Client Proxy connects to the closest proxy server in the proxy servers list based on the proxy server response time. If the connection to the closest proxy server fails, the software attempts to connect to the second closest proxy server. If the connection is lost during transmission, the software reconnects with the original closest proxy server. When HTTP/HTTPS traffic is redirected, Client Proxy adds metadata to the request, such as: Identification tokens Encrypted domain user names AD groups The proxy server uses this metadata to verify that Client Proxy is redirecting the network traffic, then determines the policy definitions configured in the associated policy. Bypass list Each policy maintains a list of definitions for Client Proxy to bypass when network traffic is redirected to the proxy server. The bypass list can include domain names, network addresses, network ports, and processes that end-user computers connect to directly. Block list Each policy maintains a list of processes that are permanently blocked from network communication. The block list reduces the amount of network traffic redirected to the proxy server, but can also apply unintended Internet access restrictions to end-user computers. Redirection settings Client Proxy communicates with internal proxy servers to verify that the end user is working inside the corporate network. Client Proxy also checks a list of corporate servers to detect when an end-user computer is connected through VPN. When Client Proxy detects that an end user is working inside the corporate network or through VPN, the software stops redirecting web traffic and network communication. 36 McAfee Client Proxy 2.0 Product Guide

37 Configuring Client Proxy using the Control Console Create a policy using the Control Console 6 Create a policy using the Control Console Policies are created and saved as McAfee SaaS Web Protection policies. Use the Control Console to create and configure policies that are deployed to end-user computers. Before you begin Request a customer ID and password from the Web Gateway or SaaS Web Protection administrator. To use Client Proxy with SaaS Web Protection, the SaaS Web Protection service must be activated. 1 From the Control Console interface, select Web Protection Policies McAfee Client Proxy Policies. 2 In the Secret Key field, enter your secret key. A secret key must be entered to enable Client Proxy policies. 3 Click New. The New McAfee Client Proxy Policy dialog box appears. 4 Click the Details tab. a b c d e In the Name field, type the policy name. Type an optional description. To prevent uninstallation, interruption, and policy manipulation, select the Enable Access Protection checkbox. To provide the administrator with ability to generate release code, select the Request Release key for manual uninstall checkbox. Define the Client Logging level. s Configure the proxy servers on page 37 Configure the proxy servers for McAfee Client Proxy to redirect network traffic. Configure the bypass list on page 38 Configure and add the web definitions to the bypass list that end-user computers directly connect to by bypassing the policy. Configure the block list on page 38 To reduce the amount of network traffic redirected to the proxy server, configure and add processes to the block list that are permanently blocked from communicating with the network. Configure the proxy servers Configure the proxy servers for McAfee Client Proxy to redirect network traffic. 1 Click the Proxy Servers tab. 2 Click New. McAfee Client Proxy 2.0 Product Guide 37

38 6 Configuring Client Proxy using the Control Console Create a policy using the Control Console 3 Add proxy servers to the policy. a In the Proxy Server Address field, type the proxy server IP address or host name. b c d In the Port field, type the port for the proxy server. To direct HTTP/HTTPS requests to the Web Gateway or SaaS Web Protection servers, select Yes from the HTTP/HTTPS drop-down list. In the Non-HTTP/HTTPS Redirected Ports field, type the non-http/https redirected ports. For non-http/https protocols, make sure the server supports the protocol. 4 Configure the remaining options. a In the Additional Ports field, type any additional ports to redirect as HTTP/HTTPS traffic. b To bypass Client Proxy for local addresses in your internal network, select the Bypass the McAfee Client Proxy for local addresses checkbox. To remove a proxy server, click Delete. Configure the bypass list Configure and add the web definitions to the bypass list that end-user computers directly connect to by bypassing the policy. 1 Click the Bypass List tab. 2 Click New. 3 From the Type drop-down list, select a type. 4 In the Value field, type the value. To remove a definition from the bypass list, click Delete. Configure the block list To reduce the amount of network traffic redirected to the proxy server, configure and add processes to the block list that are permanently blocked from communicating with the network. 1 Click the Block List tab. 2 Click New. 3 In the Executable Name field, type a value. To remove a process from the block list, click Delete. 38 McAfee Client Proxy 2.0 Product Guide

39 Configuring Client Proxy using the Control Console Deploy to end-user computers using other systems 6 Deploy to end-user computers using other systems We recommend using McAfee epo to deploy McAfee endpoint software products. Various methods of manual deployment are possible in cases where deployment with McAfee epo is either unfeasible or not wanted. One such method is described in McAfee KnowledgeBase article KB After deploying the client software with one of these methods, deploy the policy manually. For option definitions, click? in the interface. 1 Create a policy in Web Gateway or SaaS Web Protection. Save the policy to a file named mcppolicy.opg. 2 Copy the policy file to the following folder on the Mac OS X endpoint computer: /usr/local/ McAfee/Mcp/policy/. View status and configuration details View status and configuration details using the McAfee menulet. 1 From your OS X-based system, click the McAfee menulet and select About McAfee Endpoint Protection for Mac. In the Client Proxy section, the following information is displayed: Client Proxy version and build number Policy modified date Policy name Proxy server Policy revision 2 From the menulet, select the dashboard. The message: Client Proxy: Redirecting indicates that you are connected to the proxy server. Suspend policy enforcement To temporarily cancel policy enforcement on end-user computers, end users request a release code from the administrator. The end user requests a release code for their computer. The administrator uses Help Desk to create and issue the code, which is valid for a specified time period. The procedure is described in the Configuring and using McAfee Client Proxy with McAfee epo chapter. See also Suspending policy enforcement on page 23 McAfee Client Proxy 2.0 Product Guide 39

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

McAfee Endpoint Encryption for Files and Folders 4.2

McAfee Endpoint Encryption for Files and Folders 4.2 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions

More information

McAfee Endpoint Encryption 7.0

McAfee Endpoint Encryption 7.0 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3 The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release. Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Policy Auditor 6.2.0 software Installation Guide

McAfee Policy Auditor 6.2.0 software Installation Guide McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Data Loss Prevention Endpoint 9.4.100

McAfee Data Loss Prevention Endpoint 9.4.100 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.4.100 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054,

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Data Loss Prevention Endpoint 9.4.0

McAfee Data Loss Prevention Endpoint 9.4.0 Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.4.0 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Endpoint Encryption Reporting Tool

McAfee Endpoint Encryption Reporting Tool McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Administration Guide. McAfee SaaS Email Archiving

Administration Guide. McAfee SaaS Email Archiving Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

McAfee Drive Encryption 7.1.0

McAfee Drive Encryption 7.1.0 Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

McAfee Drive Encryption 7.1

McAfee Drive Encryption 7.1 Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Data Loss Prevention Endpoint 9.3.416

McAfee Data Loss Prevention Endpoint 9.3.416 Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.416 For use with McAfee epolicy Orchestrator Contents About this release Resolved issues Installation instructions Known issues Find product

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

McAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise

McAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise McAfee DAT Reputation Implementation Guide Version 1.0 for Enterprise McAfee DAT Reputation... 2 What is McAfee DAT Reputation?... 2 Rollout phases: Elective Download, AutoUpdate & AutoEnable... 3 DAT

More information

Receiver Updater for Windows 4.0 and 3.x

Receiver Updater for Windows 4.0 and 3.x Receiver Updater for Windows 4.0 and 3.x 2015-04-12 05:29:34 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver Updater for Windows 4.0 and 3.x...

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Product Guide. McAfee Agent 4.8.0

Product Guide. McAfee Agent 4.8.0 Product Guide McAfee Agent 4.8.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information