McAfee MOVE AntiVirus 2.6.0

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "McAfee MOVE AntiVirus 2.6.0"

Transcription

1 Deployment Guide McAfee MOVE AntiVirus For use with epolicy Orchestrator 4.5.0, Software

2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee MOVE AntiVirus Deployment Guide

3 Contents Preface 5 About this guide Audience Conventions Find product documentation Introduction 7 What's in this guide How the software works Components and what they do Common deployment scenarios 9 Clusters with dedicated master images Deploy McAfee MOVE AV Multi-Platform in a cluster Clusters with shared master images Deploy McAfee MOVE AV Multi-Platform in a cluster with shared VMs Distributed Resource Scheduler and High Availability Scalability guidelines 17 Impact on VM density Optimized performance settings Best practices A Configuring VLANs in VMware vsphere clusters 21 Prerequisites for creating VLANs Configure a VMware vshield VLAN using a VDS Configure VLAN using a virtual switch Configure the DHCP server in virtual guest tagging mode B Deploying High Availability servers in a cluster 25 Create NLB server clusters Install Network Load Balancing Create a server cluster Schedule the monitor script on each Offload Scan Server Index 29 McAfee MOVE AntiVirus Deployment Guide 3

4 Contents 4 McAfee MOVE AntiVirus Deployment Guide

5 Preface This guide provides the information you need to install your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee MOVE AntiVirus Deployment Guide 5

6 Preface Find product documentation Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee MOVE AntiVirus Deployment Guide

7 1 Introduction 1 This document provides guidelines for deploying McAfee MOVE AntiVirus Multi Platform in different Virtual Desktop Infrastructure (VDI) environments. McAfee MOVE AV Multi Platform scalability information is also included. This document assumes that the user has a basic understanding of McAfee MOVE Antivirus functionality. For more information on McAfee MOVE AV functionality, see the McAfee MOVE Antivirus Product Guide. We recommend that you read the entire document before starting a deployment of McAfee MOVE AV Multi Platform. Contents What's in this guide How the software works Components and what they do What's in this guide This guide is organized to help you find the information you need. This document outlines recommended deployment strategies and usage tips to help you get the most from your McAfee MOVE AV installation while having the smallest possible impact on performance. How the software works Traditional security solutions for virtual environments run as an anti virus application on every VM on the hypervisor. This results in reduced VM density per hypervisor, and places a heavy burden on disk, CPU, and memory usage. The Multi Platform deployment option offloads all scanning to a dedicated VM an Offload Scan Server that runs McAfee VirusScan Enterprise software. Guest VMs are no longer required to run anti virus software locally, which results in improved performance related to anti virus scanning, and increased VM density per hypervisor. McAfee MOVE AV Multi Platform 2.6 supports both on access and on demand scanning: On access scanning Examines files on your computer as they are accessed, providing continuous, real time detection of threats. On demand scanning Examines all files on virtual machines for potential threats. Use on demand scans to supplement the continuous protection that the on access scanning offers, and to schedule regular scans at times that do not interfere with your work. McAfee MOVE AntiVirus Deployment Guide 7

8 1 Introduction Components and what they do Components and what they do This diagram explains how each component performs specific functions to keep your environment protected. epolicy Orchestrator Communicates with the McAfee Agent, manages the Multi Platform configuration, and provides reports on malware discovered within your virtual environment. Hypervisor Allows multiple operating systems to run concurrently on a hosted system. The hypervisor is a virtual operating platform that manages the execution of the guest operating system. McAfee Agent Communicates with epolicy Orchestrator, applies policy to each virtual machine, and deploys the McAfee MOVE AV client. McAfee MOVE AV client Allows virtual machines to consult the Offload Scan Server for file scanning and malware detection. Enforces actions on the client when a threat is detected. Includes the mvadm command line utility. McAfee MOVE AV Offload Scan Server Provides offloaded scanning support for virtual machines, which minimizes the performance impact on virtual desktops. McAfee MOVE AV client extension Provides policies and controls for configuring and managing McAfee MOVE AV client behavior through epolicy Orchestrator. McAfee MOVE AV Offload Scan Server extension Provides policies and controls for configuring and managing McAfee MOVE AV offload server behavior through epolicy Orchestrator. McAfee VirusScan Enterprise Provides anti virus protection for VMs and communicates with the Offload Scan Server and the GTI servers. For information on the other products in the solution, download their documentation from the McAfee Technical Support ServicePortal at 8 McAfee MOVE AntiVirus Deployment Guide

9 2 2 Common deployment scenarios Here are some common scenarios for McAfee MOVE AntiVirus deployment. Contents Clusters with dedicated master images Clusters with shared master images Distributed Resource Scheduler and High Availability Clusters with dedicated master images In this scenario, the master images are associated with a cluster or pool, and are not shared across clusters or pools. Deployment approach You must create a dedicated McAfee MOVE AV Multi Platform Offload Scan Server for each cluster or pool. For each master image associated with a cluster: 1 Install and configure the McAfee MOVE AV client. 2 Configure a McAfee MOVE AV Multi Platform policy with the address of the McAfee MOVE AV Offload Scan Server. You are creating a single cluster specific policy and applying it to all master images associated with a cluster. To enforce cluster specific McAfee MOVE AV policies from epolicy Orchestrator: McAfee MOVE AntiVirus Deployment Guide 9

10 2 Common deployment scenarios Clusters with dedicated master images 1 Create cluster specific groups in epolicy Orchestrator. 2 Sort VMs in cluster specific groups in epolicy Orchestrator using the tagging feature. 3 Enforce a cluster specific McAfee MOVE AV policy to cluster groups. Figure 2-1 McAfee MOVE AV deployment for clusters with dedicated master images Deploy McAfee MOVE AV Multi-Platform in a cluster Deploying McAfee MOVE AV Multi Platform in a cluster requires extra configuration work. To install multiple McAfee MOVE AV Offload Scan Server VMs in a cluster for High Availability (HA) and load balancing, see Appendix B: Deploying High Availability servers in a cluster. To review McAfee MOVE AV Offload Scan Server installation steps, see the McAfee MOVE AntiVirus Product Guide. You don't need to configure a secondary Offload Scan Server. High Availability and load balancing can be achieved by using an industry standard load balancing solution, such as Microsoft Network Load Balancing (NLB). McAfee MOVE AV Multi Platform 2.6 supports Fully Qualified DNS names, which allows for DNS Round Robin Load Balancing. This type of load balancing distributes client requests across multiple servers. Task 1 Install a McAfee MOVE AV Multi Platform Offload Scan Server in each cluster. 2 Install the McAfee MOVE AV client on each master image. For details, see the McAfee MOVE AntiVirus Product Guide. 3 Configure the policy parameters on each master image. > mvadm config set Serveraddress1=<IP Address, host name, or domain name of MOVE AV server> > mvadm enable 10 McAfee MOVE AntiVirus Deployment Guide

11 Common deployment scenarios Clusters with dedicated master images 2 4 Verify that the protection status is enabled on each master image by executing the mvadm status command. 5 Create cluster specific tags in each master image. a Add the CustomProps registry key entry at this location. 32 bit: HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator \Agent 64 bit: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Network Associates\ePolicy Orchestrator\Agent b Create a string value named CustomProps1, then edit it to set the value data to the <cluster name>. 6 Stop the McAfee Framework service. 7 Delete the AgentGUID registry key. 32 bit: HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator\Agent 64 bit: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Network Associates\ePolicy Orchestrator\Agent 8 Shut down the master image. 9 Create cluster specific tags in epolicy Orchestrator. a Click Menu Systems Tag Catalog, then click Tag Action New Tag. b c d e Specify the tag name, then click Next. From the Available Properties list, select Custom 1, set it's value to the cluster name, then click Next. Select On each agent server communication and when a "Run Tag Criteria" action is taken, then click Next. Review the summary, then click Save. 10 Create cluster specific subgroups in the epolicy Orchestrator system tree. a Click Menu Systems System Tree. b c Select System Tree Action New Subgroup. Enter the subgroup name for the cluster, then click OK. 11 Sort the subgroups. a Click Menu Systems System Tree. b c d Click the Group Details tab, then edit the sorting criteria. Select Systems that match any of the criteria below (IP addresses and/or tags). Click Add Tags, select the cluster specific tags, then click Save. 12 Enable system tree sorting for the VMs in epolicy Orchestrator. a Click Menu Systems System Tree, then select all VMs. b Select Actions Directory Management Change Sorting Status. McAfee MOVE AntiVirus Deployment Guide 11

12 2 Common deployment scenarios Clusters with shared master images c d Select Enable System Tree sorting on selected systems. Click OK. If some VMs in epolicy Orchestrator are under the Lost&Found group and sorting status is enabled, the VMs will not be sorted based on the agent server communication. These systems will only be tagged. To manually sort the VMs, select all systems and choose Actions Directory Management Sort Now. 13 Create and enforce a cluster specific policy to each cluster group in epolicy Orchestrator. 14 Start the VMs. After the VMs start, they are sorted into cluster specific groups in epolicy Orchestrator at the first agent server communication interval. Clusters with shared master images In this scenario, the master images are shared and used to provision VMs across multiple clusters or pools. Each cluster has its own McAfee MOVE AV Offload Scan Server. Install and configure the McAfee MOVE AV client on each master image. A single image is used for VMs across multiple clusters, so only one Offload Scan Server address can be configured in the policy for the master image. This results in the issue of configuring the McAfee MOVE AV client policy with the IP address of the cluster specific Offload Scan Server. This issue can be resolved by creating a dedicated Virtual Local Area Network (VLAN) for each cluster. Across the configured VLANs, the Offload Scan Servers are assigned the same IP address. The McAfee MOVE AV client policy in the master images is configured to use the IP address of the Offload Scan Server. The result is that the client and Offload Scan Server communicate within a cluster or pool specific VLAN. VMware vsphere solution Here is an overview of the process. If VDS is available: 1 Create a VLAN for each cluster. 2 Add all the VMs in cluster to the VLAN. 3 Use the DHCP server to assign IP addresses to VMs in all VLANs. 4 Add the DHCP server to all VLANs with the trunking feature, so that the DHCP server can assign IP addresses to all VMs. If VDS is unavailable: 1 Create a VLAN with the same ID used on the vswitch and on all hypervisors belonging to a cluster. 2 Make sure that the VLAN ID for each cluster is unique. 12 McAfee MOVE AntiVirus Deployment Guide

13 Common deployment scenarios Clusters with shared master images 2 3 Use the DHCP server to assign IP addresses to VMs in all VLANs. 4 Make the DHCP server a member of all VLANs using a VLAN ID or This ensures that the DHCP server can assign IP addresses to all VMs. Figure 2-2 McAfee MOVE AntiVirus deployment using a VDS McAfee MOVE AntiVirus Deployment Guide 13

14 2 Common deployment scenarios Clusters with shared master images This figure highlights deployment on two clusters using a VDS. Figure 2-3 McAfee MOVE AntiVirus deployment using a VDS This figure highlights a deployment using a VDS. In both scenarios, a VLAN is configured in each cluster and each VLAN has a unique ID. Deploy McAfee MOVE AV Multi-Platform in a cluster with shared VMs This scenario is designed for environments that share virtual machines across clusters. You don't need to configure a secondary Offload Scan Server. High Availability and load balancing can be achieved by using an industry standard load balancing solution, such as Microsoft Network Load Balancing (NLB). McAfee MOVE AV Multi Platform 2.6 supports Fully Qualified DNS names, which allows for DNS Round Robin Load Balancing. This type of load balancing distributes client requests across multiple servers. To do this... Set up VLANs Install multiple Offload Scan Servers in a cluster for High Availability and load balancing Installation instructions See this... Appendix A: Configuring VLAN in vsphere clusters Appendix B: Deploying High Availability servers in a cluster McAfee MOVE AntiVirus Product guide Task 1 Create a VLAN for each cluster. 2 Install the Offload Scan Server in each cluster. 3 Install a McAfee MOVE AV client on each master image. 14 McAfee MOVE AntiVirus Deployment Guide

15 Common deployment scenarios Distributed Resource Scheduler and High Availability 2 4 Configure the policy parameters on the master image. > mvadm config set Serveraddress1=<IP Address, host name, or domain name of MOVE AV server> > mvadm enable 5 Verify that the protection status is enabled on the master image by entering the mvadm status command. 6 Configure the policy in epolicy Orchestrator and apply it to My Organization in the System Tree. 7 Delete the AgentGUID registry value. 32 bit: HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator\Agent 64 bit: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Network Associates\ePolicy Orchestrator\Agent 8 Shut down the master image and provision all VMs from the master image. Distributed Resource Scheduler and High Availability McAfee MOVE AntiVirus is compatible with VMware Distributed Resource Scheduler (DRS) and High Availability (HA). McAfee MOVE AV clients can be migrated to another hypervisor or cluster. We recommend not migrating any Offload Scan Servers across clusters or hypervisors because it could disrupt the connection between McAfee MOVE AV clients and the Offload Scan Server. If that communication is terminated, protection is disabled until the McAfee MOVE AV clients re establish connection with the Offload Scan Server. We also recommend that you create affinity rules for the Offload Scan Server to disable automatic migration to a different hypervisor. McAfee MOVE AntiVirus Deployment Guide 15

16 2 Common deployment scenarios Distributed Resource Scheduler and High Availability 16 McAfee MOVE AntiVirus Deployment Guide

17 3 Scalability 3 guidelines These guidelines allow you to fine tune your Offload Scan Server settings so you can improve performance, balance servers to handle downtime, and enable scanning capabilities. Contents Impact on VM density Optimized performance settings Best practices Impact on VM density Here are the results from tests we ran to calculate the product's impact on hypervisor VM density. System details Performance tool Login VSI 3.5 Workload Heavy McAfee MOVE AV Offload Scan Server Windows 2008 R2 SP1 (x64), 4 GB RAM, 4vCPU McAfee MOVE AV client Windows 7 SP1 (X64), 1024 MB RAM, 1 vcpu Hypervisor 1 hypervisor with ESX 4.1, Citrix PVS 5.6 having 96 GB of RAM, 12 Cores with 3.324GHz, Fibre channel disc storage Test results Agent OS Windows 7 (x64) Hypervisors VMs in a cluster VSI maximum hit VSI maximum Network and disk usage Yes 86 Network: 15,000 KBps Disk: 12,500 KBps Login time (sec) Offload Scan Servers in a cluster Best practices Keep Offload Scan Servers on different hypervisors to ensure High Availability in case one hypervisor goes down. Keep a minimum of two Offload Scan Servers in a cluster to achieve High Availability. Add additional Offload Scan Servers if you are hitting the maximum range frequently. McAfee MOVE AntiVirus Deployment Guide 17

18 3 Scalability guidelines Optimized performance settings Optimized performance settings You can fine tune your Offload Scan Server settings to optimize performance. General guidelines The number of clients that can connect to a single Offload Scan Server depends on these factors: Server hardware Network availability Workload per client The optimal configuration is different in every environment. The primary criteria for determining the optimal number of clients a single Offload Scan Server can support is the number of concurrent client scan requests. Performance degrades when it receives more concurrent scan requests than it is configured to handle. The Offload Scan Server can handle a maximum of 3,000 concurrent active scan connections: Heartbeats Scan requests Server side cache requests If the server has reached its maximum of 3,000 active connections, any new connection is accepted, but queued for handling until one of the 3,000 active connections completes. Each client has a maximum of six active connections to an Offload Scan Server (one connection for a heartbeat and five for scan and cache check requests), limiting the Offload Scan Server to effectively handle a maximum of 500 clients before the connections start to queue. You can increase the number of clients connected to a single Offload Scan Server if the number of concurrent scan requests does not exceed the configured Concurrent Scans value. If this value is exceeded, server performance begins to rapidly decline. The fewer scan requests received by the Offload Scan Server, the more clients it can support. While an Offload Scan Server can theoretically support up to 500 clients (equal to 3,000 possible overall connections) the limiting factor is the number of concurrent scan requests that the clients trigger. Using test hardware (a hypervisor having 12 CPUs at GHz, 96 GB RAM, fibre channel disc storage, with 4 vcpus and 4 GB RAM dedicated to the Offload Scan Server), we determined that the maximum number of concurrent scans that could be supported without degrading performance was around 400. If you deploy the McAfee MOVE AV client to server class machines, you could reach the concurrent scan's upper limit much sooner compared to a deployment to desktop systems. Important statistics When fine tuning your environment, we recommend monitoring these aspects of the Offload Scan Server: CPU usage The CPU usage is often at 100% when it's under heavy load. However, if the Offload Scan Server is under heavy load and the CPU drops to 50% this is an indication the server is overwhelmed. Statistics Use the mvadm stats command to retrieve these. Look for the Idle Threads number. It's important that Idle Threads don't fall to 0, as scan requests begin to compete for scan slots. You want to avoid this situation because it's an indication that too many client scan requests are coming in. Network performance Make sure the network connection is not at or near maximum. 18 McAfee MOVE AntiVirus Deployment Guide

19 Scalability guidelines Best practices 3 Ways to improve performance Consider these actions to increase server performance: Increase scan server CPU power. The CPU is the primary limiting factor in an Offload Scan Server's performance. Ensure high network availability. Increase RAM, but only to a maximum of 4 GB. The Offload Scan Server is a 32 bit application and cannot benefit from additional RAM beyond 4 GB. Exclude the client side log and text files if the Offload Scan Server becomes overwhelmed. This reduces the number of scan requests. Schedule DAT updates during non peak hours and make sure you are using McAfee Agent 4.5 Patch 2 or later. DAT updates can place a large load on the Offload Scan Server. Large files and network scanning Enabling McAfee MOVE AntiVirus network scanning capabilities, then accessing large files across the network, greatly increases the access time for network based files. Distributed File Systems (DFS) are not supported by McAfee MOVE AntiVirus or McAfee MOVE Scheduler, so we recommend scanning a file using a scanner nearest to the file itself. If a file resides on a network share, rather than enabling McAfee MOVE AntiVirus network scanning, use the McAfee anti virus product on the system where the file resides to scan the file. If the file resides on a NetApp Filer, we recommend using VirusScan Enterprise to scan the file. With this approach, you maintain good performance while still providing protection. One manifestation of large files and network scanning is seen when using XenApp6 to stream the virtual version of Microsoft Word To improve the application's launch time in this environment, exclude these processes from anti virus scanning: RadeLauncher.exe RadeSvc.exe RadeObj.exe Best practices These tips and techniques provide information about quarantined files in non persistent VMs, balancing servers to handle downtime, and scanning images in a VMware environment. Quarantined files in non persistent virtual machines In a non persistent virtual machine, the quarantine folder contents might not be saved when a user logs off or reboots the virtual machine. The usual workaround is to specify the quarantined folder somewhere in the user's home directory. However, if using the Windows roaming profile feature, the quarantine folder can't be saved in the user's home directory because their home directory becomes a network location in that environment. Balancing Offload Scan Servers to handle downtime In an environment with two Offload Scan Servers (ScanServer1 and ScanServer2), it's important to make sure each server can handle the load when the other goes offline. When you determine the number of VMs one Offload Scan Server can handle, split that number of VMs roughly in half by some criteria such as even or odd MAC addresses. Assign one half of your VMs to server1 as their primary McAfee MOVE AntiVirus Deployment Guide 19

20 3 Scalability guidelines Best practices scan server and server2 as their secondary. With these assignments, each Offload Scan Server runs at approximately half capacity, able to absorb the load when the other goes offline all accomplished without any configuration changes. Scanning offline virtual images in a VMware environment When VirusScan Enterprise for Offline Virtual Images begins scanning an offline VM, it locks the image until the scan is complete. The virtual machine cannot be started until the scan is complete. Use a policy that schedules offline virtual image scanning in off peak hours only. 20 McAfee MOVE AntiVirus Deployment Guide

21 A Configuring VLANs in VMware vsphere clusters If you use the same master image to provision virtual machines in multiple clusters, we recommend that you create a dedicated VLAN in each cluster to handle McAfee MOVE AntiVirus deployment. This configuration helps maintain the same IP address for the Offload Scan Server across all VLANs. You can create VLANs using a virtual switch or a virtual distributed switch. Contents Prerequisites for creating VLANs Configure a VMware vshield VLAN using a VDS Configure VLAN using a virtual switch Configure the DHCP server in virtual guest tagging mode Prerequisites for creating VLANs These conditions must exist for McAfee MOVE AntiVirus to work in a VMware vshield VLAN environment. The VDS is available. Multiple VDS are available with the VMware Enterprise Plus license. For all hypervisors selected for McAfee MOVE AntiVirus communication, the physical Network Interface Cards (NIC) are connected to the trunk port of the physical switch. One virtual NIC is added to each VM. A dedicated virtual machine is hosting the DHCP server. All VLANs are configured on the physical switch. McAfee MOVE AntiVirus Deployment Guide 21

22 A Configuring VLANs in VMware vsphere clusters Configure a VMware vshield VLAN using a VDS Configure a VMware vshield VLAN using a VDS A VLAN must be configured in a specific way to be compatible with McAfee MOVE AV. If you are using an existing VDS, skip steps 1 and 2. Task 1 Create a VDS. 2 Add the physical NICs of all hypervisors in the VDS that are selected for VLAN. A single VDS supports 64 hypervisors. If you are using more than 64 hypervisors, create a new VDS. 3 Create a port group for each cluster on the VDS. 4 Assign a unique VLAN ID to each port group. 5 Add virtual Network Interface Cards (vnic) to all VMs. 6 Add all VMs to the cluster VLAN by using the vnic of each VM. 7 Create VLANs on the physical switch with the same VLAN ID as created on the VDS. 8 Allocate IP addresses to VMs in the VLANs by configuring the DHCP server. a Create a port group on the VDS and select VLAN Trunking. b c d Specify the range of VLANs to accommodate all VLANs created for the clusters. Add the DHCP server to the port group. Configure the DHCP VM in VGT (Virtual Guest Tagging) mode to make it a member of all cluster VLANs so that a single DHCP server can be used to assign IP addresses to all VMs. See Configuring the DHCP server in Virtual Guest Tagging mode for further information. Configure VLAN using a virtual switch A VLAN can be created using a virtual switch, so that it's compatible with McAfee MOVE AntiVirus. Task 1 Create a port group on vswitch for all hypervisors in the cluster. 2 Assign the VLAN ID to the port group in each vswitch. 3 Add a vnic to all virtual machines. 4 Add the VMs to the cluster VLAN by using the vnic of each VM. 5 Create VLANs on the physical switch with the same VLAN ID you created on the virtual switches. 6 Allocate IP addresses to the VMs in all VLANs by configuring the DHCP server. a Create a port group on the vswitch of the hypervisor where the DHCP server is hosted, and set the VLAN ID to b Add the DHCP server to the port group (VLAN ID = 4095). c Configure the DHCP virtual machine in virtual guest tagging mode to make it a member of all cluster VLANs. This means that a single DHCP server can be used to assign IP addresses to all VMs. For more information, see Configure the DHCP server in virtual guest tagging mode. 22 McAfee MOVE AntiVirus Deployment Guide

23 Configuring VLANs in VMware vsphere clusters Configure the DHCP server in virtual guest tagging mode A Configure the DHCP server in virtual guest tagging mode You must configure the DHCP server virtual machine in virtual guest tagging mode for use in VLANs. Task 1 Install the DHCP server on the VM and select class B address for scoping. Create a single scope for IP addresses of all VMs across different cluster VLANs. 2 Add a type E1000 virtual NIC to the DHCP server VM. 3 Install the Intel driver that supports VGT. You can download the Intel driver from htm. 4 Right click the vnic icon on the DHCP server and select Properties Configure VLANs. 5 Add the cluster VLANs. A new network adapter is automatically added for each VLAN. 6 Specify a static IP address for the network adapter. Considering the virtual device infrastructure size, use the class B addressing scheme that provides almost 60,000 unique IP addresses. McAfee MOVE AntiVirus Deployment Guide 23

24 A Configuring VLANs in VMware vsphere clusters Configure the DHCP server in virtual guest tagging mode 24 McAfee MOVE AntiVirus Deployment Guide

25 B Deploying High Availability servers in a cluster In a typical Virtual Device Infrastructure (VDI) deployment scenario, multiple hypervisors are included in a cluster. It is necessary to deploy multiple Offload Scan Server virtual machines for load balancing and High Availability. You can deploy multiple Offload Scan Server VMs in a cluster by using the Microsoft Network Load Balancing (NLB) service. The number of servers you deploy must follow the scalability guidelines. The group of Offload Scan Servers managed by the NLB service is referred to as the NLB server cluster. The NLB server cluster is transparent to McAfee MOVE AV clients, and these clients use a virtual IP address to communicate with the NLB server cluster. The NLB server cluster's virtual IP address is configured with the McAfee MOVE AV policy in epolicy Orchestrator. McAfee MOVE AntiVirus Deployment Guide 25

26 B Deploying High Availability servers in a cluster When using NLB server clusters, you don't need to deploy secondary Offload Scan Servers because High Availability is provided by the NLB server cluster. To monitor the health of the Offload Scan Server, deploy the external monitoring script provided with the McAfee MOVE AV deployment kit. Figure B-1 NLB server cluster clusters using dedicated master images for VMs Figure B-2 NLB server cluster clusters sharing master images for VMs 26 McAfee MOVE AntiVirus Deployment Guide

27 Deploying High Availability servers in a cluster Create NLB server clusters B Create NLB server clusters These tasks create a McAfee MOVE AntiVirus compatible server cluster. Tasks Install Network Load Balancing on page 27 Network Load Balancing must be installed before you can create a server cluster. Create a server cluster on page 27 Create the cluster after the Network Load Balancing feature is installed. Schedule the monitor script on each Offload Scan Server on page 28 McAfee provides a script that checks the health of an Offload Scan Server and controls scan traffic based on load. Install Network Load Balancing Network Load Balancing must be installed before you can create a server cluster. Before you begin Make sure that all Offload Scan Server VMs in the cluster are in the same domain and subnet. By default, this feature isn't installed on Windows Server 2008 R2. Task 1 Navigate to Administrative Tools Server Manager, then select Select Features Add Features. 2 Select Network Load Balancing, then click OK. Create a server cluster Create the cluster after the Network Load Balancing feature is installed. Task 1 Navigate to Administrative Tools Network Load Balancing Manager, then select Cluster New Cluster: a Enter the IP address of the Offload Scan Server, then click Connect. b c Select the interface name based on your setup (using VLAN or not), then click Next. Review the information, then click Next. 2 In the New Cluster: Cluster IP Addresses window, click Add. a Select Add IPv4 address, then enter the virtual IP address of the servers to include in the NLB server cluster. b Click OK, then click Next. 3 In the New Cluster: Cluster Parameters window: a Enter the cluster name in the Full Internet name field. b Select Multicast, then click Next. 4 In the New Cluster: Port Rules window, click Edit: a In the Add/Edit Port Rule window, deselect All. b Select the virtual IP address of the NLB cluster and specify the port range from 9053 to 9053, or the non default port you selected during the Offload Scan Server installation. McAfee MOVE AntiVirus Deployment Guide 27

28 B Deploying High Availability servers in a cluster Create NLB server clusters c d Set the protocol to TCP, then click OK. Set the Filtering mode to Multiple host, and set the Affinity to None. 5 Click Finish to create the cluster. Schedule the monitor script on each Offload Scan Server McAfee provides a script that checks the health of an Offload Scan Server and controls scan traffic based on load. If a server is down or not responding, the script removes the host from the NLB server cluster. After the Offload Scan Server returns, the script automatically adds the host back to the NLB server cluster. This script also places a log entry in the Windows Event Viewer when either event occurs. Task 1 Navigate to Administrative Tools Task Scheduler, then select Create Task in the Actions panel. 2 Select Run whether user is logged on or not and Do not store password. 3 On the Triggers tab, click New: a In the Begin the task list, select At startup. b Click OK. 4 On the Action tab, click New. a In the Action list, select Start a program. b c d In the Program Script field, enter cscript.exe. In the Add arguments field, specify move av monitor.vbs. Click OK. 5 On the Conditions tab, deselect Start the task only if the computer is on AC power. 6 Click OK to schedule the task. 28 McAfee MOVE AntiVirus Deployment Guide

29 Index A about this guide 5 B best practices non-performance tips 19 performance 18 C clusters deployment 10 shared master images 12 with dedicated master images 9 conventions and icons used in this guide 5 D dedicated master images deployment strategy 9 deployment cluster with dedicated master images 9 cluster with shared master images 12 clusters 10 overview 8 strategy 8 Distributed Resource Scheduler VMware 15 documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 H High Availability compatibility 15 hypervisor migration restrictions 15 I installation strategy 8 M McAfee ServicePortal, accessing 6 N network scanning large files 18 O offline virtual images scanning in VMware 19 Offload Scan Server improving performance 18 load balancing 19 number per cluster 17 P performance data 17 improving 18 virtual applications 18 Q quarantine non-persistent virtual machines 19 S scalability guidelines 17 ServicePortal, finding product documentation 6 T Technical Support, finding product information 6 V virtual machine density 17 VLAN prerequisites 21 W what's in this guide 7 McAfee MOVE AntiVirus Deployment Guide 29

30 00

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Quick Start Guide. McAfee Product Improvement Program 1.1.0

Quick Start Guide. McAfee Product Improvement Program 1.1.0 Quick Start Guide McAfee Product Improvement Program 1.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee SaaS Archiving

McAfee SaaS  Archiving Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Endpoint Encryption for Files and Folders 4.2

McAfee Endpoint Encryption for Files and Folders 4.2 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy 1.2

McAfee Client Proxy 1.2 Product Guide Revision B McAfee Client Proxy 1.2 For use with epolicy Orchestrator 4.6 and 5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE / VMware Collaboration Best Practices

McAfee MOVE / VMware Collaboration Best Practices McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

McAfee Client Proxy 2.1.2

McAfee Client Proxy 2.1.2 Product Guide Revision A McAfee Client Proxy 2.1.2 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2016 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee VirusScan Enterprise for Linux 1.9.0

McAfee VirusScan Enterprise for Linux 1.9.0 Configuration Guide McAfee VirusScan Enterprise for Linux 1.9.0 For use with epolicy Orchestrator 4.5, 4.6 and 5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee MOVE AntiVirus 3.6.0

McAfee MOVE AntiVirus 3.6.0 Release Notes McAfee MOVE AntiVirus 3.6.0 For use with McAfee epolicy Orchestrator Contents About this document About the product New features Installation instructions Known issues Find product documentation

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.1.0 For use with epolicy Orchestrator software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee. b Under Self Service, click Product Documentation. d Download the model S7032 installation guide.

McAfee. b Under Self Service, click Product Documentation. d Download the model S7032 installation guide. Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

McAfee Endpoint Encryption for Files and Folders 4.2

McAfee Endpoint Encryption for Files and Folders 4.2 User Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

McAfee Endpoint Encryption 7.0

McAfee Endpoint Encryption 7.0 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Configuring Windows Server Clusters

Configuring Windows Server Clusters Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed

More information

McAfee Firewall Enterprise Control Center

McAfee Firewall Enterprise Control Center Installation and Migration Guide Revision A McAfee Firewall Enterprise Control Center COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Policy Auditor 6.2.0 software Installation Guide

McAfee Policy Auditor 6.2.0 software Installation Guide McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Install Guide for JunosV Wireless LAN Controller

Install Guide for JunosV Wireless LAN Controller The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller

More information

VMware for Bosch VMS. en Software Manual

VMware for Bosch VMS. en Software Manual VMware for Bosch VMS en Software Manual VMware for Bosch VMS Table of Contents en 3 Table of contents 1 Introduction 4 1.1 Restrictions 4 2 Overview 5 3 Installing and configuring ESXi server 6 3.1 Installing

More information

McAfee Network Threat Response (NTR) Manager Version 4.0

McAfee Network Threat Response (NTR) Manager Version 4.0 Installation Guide McAfee Network Threat Response (NTR) Manager Version 4.0 Updated: 11.22.13 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Technical Report Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp June 2015 TR-4286 Abstract An antivirus solution is key for enterprises

More information

McAfee Data Loss Prevention and later Virtual Appliance

McAfee Data Loss Prevention and later Virtual Appliance Installation Guide Revision B McAfee Data Loss Prevention 9.3.2 and later Virtual Appliance About McAfee Data Loss Prevention on virtual machines McAfee Data Loss Prevention (McAfee DLP) offers the option

More information

VMware vsphere 5.0 Evaluation Guide

VMware vsphere 5.0 Evaluation Guide VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....

More information

McAfee Rogue System Detection 5.0.1

McAfee Rogue System Detection 5.0.1 Product Guide McAfee Rogue System Detection 5.0.1 For use with epolicy Orchestrator 5.1 or 5.1.1 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com

More information

Bosch Video Management System High availability with VMware

Bosch Video Management System High availability with VMware Bosch Video Management System High availability with VMware en Technical Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 Restrictions 4 2 Overview 5 3

More information

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide This document supports the version of each product listed and supports all subsequent versions until a new edition replaces

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

Required Virtual Interface Maps to... mgmt0. bridge network interface = mgmt0 wan0. bridge network interface = wan0 mgmt1

Required Virtual Interface Maps to... mgmt0. bridge network interface = mgmt0 wan0. bridge network interface = wan0 mgmt1 VXOA VIRTUAL APPLIANCE KVM Hypervisor In-Line Deployment (Bridge Mode) 2012 Silver Peak Systems, Inc. Support Limitations In Bridge mode, the virtual appliance only uses mgmt0, wan0, and lan0. This Quick

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

McAfee Agent Handler

McAfee Agent Handler McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

User Guide for VMware Adapter for SAP LVM VERSION 1.2

User Guide for VMware Adapter for SAP LVM VERSION 1.2 User Guide for VMware Adapter for SAP LVM VERSION 1.2 Table of Contents Introduction to VMware Adapter for SAP LVM... 3 Product Description... 3 Executive Summary... 3 Target Audience... 3 Prerequisites...

More information