Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
|
|
- Egbert Flowers
- 8 years ago
- Views:
Transcription
1 Integration Guide Manager for use with epolicy Orchestrator 4.6
2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 Manager Integration Guide
3 Contents Preface 5 About this guide... 5 Audience... 5 Conventions... 5 Finding product documentation Introduction 7 Joint solution... 7 Joint solution benefits... 8 Manager visibility Architecture Manager epo extension 11 Asset information RSD API Extended table Additional device attributes ( Manager only) Queries Attributes per query Installation 17 Prerequisites TCP/IP communication Configure Manager Console database accessibility Install and configure the Manager epo extension Install the Manager epo extension Configure the Manager epo extension Configure a scheduled task for the epo Extension Verify Manager epo extension operation Populate the epo System Tree Manager Integration Guide 3
4 4 Manager Integration Guide
5 Preface This guide provides the information you need to configure, use, and maintain your McAfee product. About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who are responsible for configuring the product options on their systems, or for updating their systems. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Bold User input, Path, or Code Hypertext Note: Tip: Important/Caution: Warning/Danger: Title of a book, chapter, or topic; introduction of a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program; a code sample. A live link to a topic or to a website. Additional information, like an alternate method of accessing an option. Suggestions and recommendations. Valuable advice to protect your computer system, software installation, network, business, or data. Critical advice to prevent bodily harm when using a hardware product. Manager Integration Guide 5
6 Introduction Finding product documentation Finding product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access User documentation Do this 1 Click Product Documentation. 2 Select a Product, then select a Version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 Manager Integration Guide
7 1 Introduction The successful integration of Manager and McAfee epolicy Orchestrator provides added network visibility for the enterprise, enabling comprehensive security, configuration, compliance, and risk management on the network. Contents Joint solution Manager Integration Guide 7
8 Introduction Joint solution Manager Architecture Joint solution You can t secure what you can t see. Through comprehensive real-time network, device, and user intelligence, Manager provides total network visibility to McAfee epolicy Orchestrator (McAfee epo ) software, enabling effective security and risk management for all devices across your entire network. Real-time awareness of all devices on a network is critical to maintaining a secure and compliant network, quantifying the risk exposure, and enabling faster corrective actions to mitigate risk. The business problem Despite major investments in technology, few organizations are able to maintain an up-to-date inventory or provide documentation about the devices connected to their networks. As a result, a knowledge gap exists between the perceived security state and the actual security state of the network. The outcome? and security measures are not fully applied, risk cannot be accurately determined, and organizations find themselves unable to manage devices they are not aware of. Manager: know what you are protecting Manager is an agentless software solution that works in real time to detect, identify, profile, and audit all devices connected to a network, whether physical or virtual, managed or unmanaged. Using a smart combination of passive and active network discovery technologies, it provides 24/7/365 network, device, and user intelligence. Manager maintains a realtime inventory of the devices connected to the network, their profiles, and the identities of those using the devices. With Manager, you get the information you need to maintain a clear picture of your dynamically changing network. According to a study, Manager detects as many as 20 percent to 50 percent more devices residing on a network than would have otherwise been accounted for. Manager is vendor agnostic and does not require any integration with your network infrastructure. Joint solution benefits Manager augments McAfee s visibility of devices connected to the network, enabling comprehensive security, configuration, compliance, and risk management on the network. McAfee has achieved this by integrating Manager with McAfee epo software, the centralized platform that manages all endpoint security and compliance solutions from McAfee. As part of the integration with the McAfee epo platform, Manager updates the McAfee epo asset database in near real-time, allowing the McAfee epo platform to maintain a more complete, accurate, and up-to-date inventory of the devices, their profiles, and the identities of those using the devices. Combining the data from existing McAfee solutions and Manager, the McAfee epo platform now becomes the single source of truth about the network. This integration provides the 8 Manager Integration Guide
9 Introduction Joint solution foundation for effectively managing security, compliance, and risk against all devices across your entire network. Integration Benefits Security measures can be fully applied Risk can be completely and accurately measured and assessed according to the actual state of the network Workflows can be defined as a response to changes on the network, and security and compliance status can be more effectively controlled Security solutions from McAfee, as well as from other McAfee Security Innovation Alliance (SIA) partners that leverage the McAfee epo asset database, can deliver more complete protection across the entire network Manager Integration Guide 9
10 Introduction Manager Manager Total network visibility with real-time network, device, and user intelligence Manager provides a 360 view into the actual state of your network security. It builds and maintains a complete and accurate inventory of ALL devices operating on the enterprise network. Utilizing unique profiling technology, Manager provides meaningful network, device and user intelligence, thereby reducing ambiguity and enabling better decision making based on accurate and in-depth audit information. Network, device, and user information is continuously collected to reflect the actual current state of the network. Manager detects 20%-50% of additional devices residing on an enterprise network, which otherwise would not be accounted for. Manager can integrate with your security ecosystem to enhance the operation of your existing security products and provide total network visibility with real-time network intelligence. The Manager s unique approach is an agentless solution; it does not require any integration with infrastructure components and is vendor agnostic. Architecture The Manager solution suite is a distributed application where Sensors are deployed in different organizational locations and report to a centralized console. A Sensor can be installed as an appliance and as a virtual appliance, and can be remotely deployed. The Manager Console is a software-based application that enables IT management to easily control multiple Manager Sensors deployed on multiple distributed networks. The Manager Console consolidates information from hundreds of Sensors into a unified management view using a single web-based user interface. The Manager Sensor and the Manager Console are software basedproducts shipped as an ISO image including the underlying hardened Linux operating system (based on the Debian Linux distribution) and the Manager application. 10 Manager Integration Guide
11 Manager epo extension Asset information 2 Manager epo extension The Manager epo extension is used to update the McAfee epo asset database in near real-time, allowing the McAfee epo platform to become the single source of truth about the network. The integration makes use of the rogue system detector (RSD) API. The Manager epo extension is used to communicate with the Manager BSA Console s PostgreSQL database on a regular basis (down to 1 minute intervals) and to receive delta updates about the network, its devices, and its users. Contents Asset information Queries Asset information RSD API The following device attributes are populated using the RSD API: Table 1: Attributes populated using the RSD API Attribute Name MAC Address IP Address OS Family OS Platform Description The MAC address of the device. The IP address or addresses of the device. The operating system family name (for example, Microsoft Windows). The underlying OS platform (a known epo platform, such as AIX, BSD, HP-UX, IRIX, Macintosh, Linux, Windows, Sun; OR a unique device capability detected by Manager, i.e., Switch, Router, Wireless, Printer, Print Server, VoIP, UPS, Firewall, Storage device, and KVM over IP, Mobile, and so on). Using the epo OS Platform field (or the Extended Table's Capability field), it is now possible to find all of the switches, the VoIP infrastructure, the printers, the mobile devices and so on. OS Version DNS Name The exact version of the operating system. The DNS name of the device. Manager Integration Guide 11
12 Manager epo extension Asset information Attribute Name NetBIOS Name Domain Name User Source ID Description The Windows NetBIOS name of the device (if applicable). The Windows domain name for the device. The username of the user using the device. An identifier linking the information to its source. Extended table Manager uses an extended table, created on epo using the RSD API, to populate additional attributes of a device and its user. Table 2: Additional attributes populated using the extended table Attribute Name Capability Offline / Online Status Authorization Switch IP Switch Port Physical Location VLAN ID Device Group Virtual Host Virtual Type First Name Last Name User Department Description The capability or function performed by the device (DHCP Server, DC, Printer, Router, Storage Device, Switch, Virtual Host, Virtual Guest, Mobile, and so on). The status of the device whether connected to the network (online), or not (offline). The authorization status of the devices. Authorization enables users to easily distinguish between known devices and unknown (rogue) devices. It also enables the detection of unauthorized (rogue) devices connecting to the network in real-time. The IP address of the switch to which the device is connected. The port number on the switch to which the device is connected. The physical location of the device. The VLAN ID of the device (if assigned). The group(s) a device is associated with (assigned by the user). The IP address of the Virtual Host machine hosting the Virtual Guest (applicable for virtual guests only). The type of the virtualization solution used (for example, VMware ESX server 3i 3.5.0). Applicable for virtual machines only. The first name of the actual name of the user logged on to the device. The last name of the actual name of the user logged on to the device. The user s department. 12 Manager Integration Guide
13 Manager epo extension Queries Attribute Name User Groups User Address Sensor IP / Name Services and Protocols* Software* Description The LDAP groups with which the user is associated. The address of the user. The reporting Sensor. The device s available network services. Includes the identification of the service, protocol, server and version used. The software installed on the device. The information is formatted using CPE. Using the additional device and user attributes, populated into the extended table, it is possible to distinguish between virtual to physical assets, detect rogue devices, locate devices on the network, determine whether or not a device is connected to the network, and so on. Additional device attributes ( Manager only) The following attributes are currently available only from Manager: Table 3: Attributes available only from Manager Attribute Name Device Criticality Hardware Services and Processes Description The criticality level of the device (assigned by the user). The hardware used on the device. Running processes and services detected to be operating on the device. Queries To simplify the task of populating assets from the rogue system detection into the system tree, Manager has introduced a number of built-in queries. These queries can also be used as the basis for different reports. Table 4: Built-In Queries Query Group Query Name Description Android Devices Android Smartphones Android Tablets Lists Android-based devices. Lists Android Smartphones. Lists Android Tablets. Manager Integration Guide 13
14 Manager epo extension Queries Query Group Query Name Description Apple ios Devices Apple ipad Devices Apple iphones Blackberry Devices Blackbery Smartphones Blackberry Tablets Detected Devices DHCP Servers and Relays Domain Controllers Firewalls IP PBX KVM over IP Linux-based Devices Mac OS Devices Mcafee Asset Manager Sensors Microsoft Windows-based Devices Mobile Devices Network services per device Lists Apple ios-based devices. Lists Apple ipad devices. Lists Apple iphones. Lists Blackberry devices. Lists Blackberry Smartphones. Lists Blackberry Tablets. Lists all detected devices. Lists the DHCP servers in the monitored networks. Lists the domain controllers in the monitored networks. Lists the devices that have a personal firewall enabled. Lists the IP PBX (Voice over IP) devices in the monitored networks. Lists all KVM over IP devices in the monitored networks. Lists all Linux devices in the monitored networks. Lists all devices running Mac OS. Lists all Manager Sensors. Lists all devices running Microsoft operating systems. Lists all mobile devices. Lists the available network services per device. Includes the identification of the service, protocol, server and version used. 14 Manager Integration Guide
15 Manager epo extension Queries Query Group Query Name Description Network services per service name Print Servers Printers Routers Smartphones Software inventory per device Software inventory per software name Software inventory top 25 Storage Switches Tablets Uncontrolled Microsoft Windows Devices Unknown UPS Virtual Devices VoIP Phones Windows Phone Devices Lists the available network services per service name. Includes the identification of the service, protocol, server and version used. Lists all the print servers running in the monitored networks. Lists all the printers in the monitored networks. Lists all the routers in the monitored networks. Lists all Smartphones. Lists the software inventory per device. Lists the software inventory per software name. Lists the 25 most installed software programs. Lists all the storage devices in the monitored networks. Lists all switches in the monitored network. Lists all Tablets. Lists all devices running a Microsoft Windows operating system that the organization has no control over (either not part of the main organizational domain, or that their settings were modified not allowing remote auditing). Knowledge with regards to their existence or the state of their configuration is missing by the organization. Lists all the devices for which the operating system has not been recognized. Lists all UPS devices in the monitored network. Lists all the virtual host and guest devices in the monitored networks (VMware, XEN, Microsoft Hyper-V, and Virtual boxes). Lists all the voice over IP phones on the monitored networks. Lists all Windows phone devices. Manager Integration Guide 15
16 Manager epo extension Queries Query Group Query Name Description Wireless Access Points Lists all the Wireless access point devices. Attributes per query The following network, device, and user attributes are visible when using any query (except for switches and virtual device queries): Manager Sensor, Authorized, Capabilities, Last Detected IP Address, OS Family, OS Platform, OS Version, NetBIOS Name, DNS Name, VLAN ID, Last Detected MAC Address, Switch IP, Switch Port, Users, Domain and Device Group. The following columns are visible for the Switches query: Manager Sensor, Authorized, Capabilities, Last Detected IP Address, OS Family, OS Platform, OS Version, DNS Name, VLAN ID, Last Detected MAC Address, Switch IP, Switch Port and Device Group. The following columns are visible for the Virtual Devices query: Manager Sensor, Authorized, Capabilities, Last Detected IP Address, OS Family, OS Platform, OS Version, NetBIOS Name, DNS Name, VLAN ID, Last Detected MAC Address, Switch IP, Switch Port, Users, Domain, Device Group, Virtual Host and Virtual Type. Note The Last Detected IP Address, Last Detected MAC Address, and Users attributes are named by McAfee epo. 16 Manager Integration Guide
17 Installation Prerequisites 3 Installation Contents Prerequisites Install and configure the Manager epo extension Populate the epo System Tree Prerequisites TCP/IP communication Communication between the Manager epo extension and the Manager Console s PostgreSQL database is initiated by the extension on a regular basis. To allow communication from the McAfee epo server on which the Manager epo extension is installed to the Manager Console s database, verify that TCP port 5432 is allowed. Configure Manager Console database accessibility On default installations of the Manager Console, the PostgreSQL database is not exposed to remote communications due to hardened security. This section describes the configuration changes required to allow the Manager extension to connect to the database. Task 1 Log in to the Manager Console with the root user. 2 Open the file: /usr/lib/insightix/management/memory_conf/current_config/postgresql_add.conf for editing. 3 Add the following new line to the file: listen_addresses= '*' 4 Save your changes. 5 Switch to the Postgres user by issuing the following command: su postgres Manager Integration Guide 17
18 Installation Install and configure the Manager epo extension 6 Open the file: /etc/postgresql/9.1/main/pg_hba.conf for editing. 7 Under IPv4 local connections, add the following line if it does not exist: host all all /0 md5 8 Save your changes. 9 Switch back to the root user by executing the following command: exit 10 Stop the Manager Console by issuing the following command: monit stop all 11 Restart the PostgreSQL database by issuing the following command: /etc/init.d/postgresql-9.1 restart 12 Start the Manager Console by issuing the following commands: monit start all 13 Open the file: /usr/lib/insightix/management/conf/msconfig.properties then look for the username under the dbuser and for the database password under the dbpwd field. This password will later be used to configure the Manager epo extension. Install and configure the Manager epo extension The installation and configuration of the Manager epo extension is performed in the following stages: Install the Manager epo extension Configure the Manager epo extension Configure a scheduled task for the epo extension Verify Manager epo extension operation Install the Manager epo extension This section describes how to install the Manager epo extension. Task 1 Log in to the McAfee epo Server. 2 Select Menu Software Extensions. 18 Manager Integration Guide
19 Installation Install and configure the Manager epo extension 3 Click Install Extensions. 4 Click Browse, then select the Manager epo extension zip file. 5 Click OK to accept and close the popup window. 6 Click OK to install the extension under the Install Extensions window. The extension is added to the list of installed extensions. Configure the Manager epo extension This section describes how to perform the initial configuration of the Manager extension. Task 1 Select Menu Configuration Registered Servers to display the Registered Servers page. 2 Click New Server. The Description tab of the Registered Server Builder wizard is displayed. 3 From the Server Type dropdown list, select MAM Console Server. 4 In the Name field, enter a name for this server. 5 (Optional) In the Notes field, enter any relevant information, then click Next. The Details tab is displayed. 6 In the Database Server field, enter the Database server IP address or hostname. 7 Verify the following default settings appear: Database Name: mc Port Number: 5432 User Name: mc 8 In the Password field, enter the database password. 9 In the Time interval between full reloac cycles field, configure the interval (in hours) between reload cycles. (The default setting is 72 hours.) 10 Click Save. The Registered Servers page is displayed, listing the new Manager Console as a registered server. Configure a scheduled task for the epo extension This section describes how to configure the epo scheduled task for the Manager epo extension. Task 1 Select Menu Automation Server Tasks to display the Server Tasks page. 2 Click New Task. Manager Integration Guide 19
20 Installation Populate the epo System Tree The Description tab of the Server Task Builder is displayed. 3 In the Name field, enter a name for the task. 4 In the Schedule Status section, verify that Enable is selected, then click Next. The Actions tab is displayed. 5 From the 1. Actions dropdown list, select Manager Detected Systems. 6 From the Select the Server Name dropdown list, select Manager Console Server, then click Next. The Schedule tab is displayed. 7 From the Schedule Type dropdown list, select Advanced to enable specifying the scheduling interval for executing the task. 8 In the Start Date field, set the current date. 9 Verify that the End Date is set to No end date. The Schedule attribute is configured using a cron-like syntax. For example, to schedule the task to run every 15 minutes, use the following syntax: 00 0/15 * * *? 10 Click Next to display the Summary tab. 11 Verify that the task information is correct, then click Save. The new task appears in the Server Tasks tab, with the scheduled execution of the first run of the task is indicated in the Next Run column. You can manually force the run by clicking Run. Verify Manager epo extension operation This section describes how to verify the operation of the Manager epo extension. Task 1 Select Menu System Detected Systems to display the Detected Systems tab. This is where the information extracted from Manager is populated. 2 Verify that information is displayed. Populate the epo System Tree To enable McAfee epo to make use of the asset information provided by Manager, it must be populated into the System Tree. Task manual import 1 Select Menu System Detected Systems to display the Detected Systems tab. This is where the information extracted from Manager is populated. 2 Select the checkboxes of the devices that you want to import into the system tree. 3 Select Action Add to System Tree. Task automatic import 1 Select Menu Automation Server Tasks to display the Server Tasks page. 20 Manager Integration Guide
21 Installation Populate the epo System Tree 2 Click New Task to set a new task. 3 Set up a new automated task using the built-in Manager queries (i.e., Run Query), as described in Queries. 4 Repeat these steps until you have successfully populated the System Tree. Manager Integration Guide 21
McAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Client Proxy 1.0.0 Software
Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Asset Manager Sensor
Installation Guide McAfee Asset Manager Sensor Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationInstallation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances
Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationBest Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Policy Auditor 6.2.0 software Installation Guide
McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationProduct Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationVirtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationSetup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
More informationMcAfee Policy Auditor 6.2.0 software
McAfee Policy Auditor 6.2.0 software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationMcAfee Data Loss Prevention 9.3.0
Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee Endpoint Encryption 7.0
Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee
More informationInstallation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationBest Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationepolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationInstallation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee Enterprise Mobility Management 12.0 Software
Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationBest Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee VirusScan Enterprise for Storage 1.1.0
Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationInstallation Guide. McAfee Vulnerability Manager 7.5
Installation Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
More informationProduct Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0
Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationProduct Guide. McAfee epolicy Orchestrator 5.3.0 Software
Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationProduct Guide. McAfee epolicy Orchestrator 5.0.0 Software
Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationAdministrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances
Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationThe client transfer between epo servers guide. McAfee Drive Encryption 7.1.3
The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationDetecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
More informationMcAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationProduct Guide. McAfee Agent 4.8.0
Product Guide McAfee Agent 4.8.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationMcAfee Endpoint Encryption for PC 6.2
EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee Vulnerability Manager 7.5
Product Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationhttp://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationAdministration Guide Revision E. Account Management. For SaaS Email and Web Security
Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationMcAfee Drive Encryption 7.1
Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationAbout Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationAdministration Guide. McAfee SaaS Email Archiving
Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationMcAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMigration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x
Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationMcAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationConsolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.
Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationProduct Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationMcAfee Threat Intelligence Exchange 1.0.1 Software
Release Notes McAfee Threat Intelligence Exchange 1.0.1 Software Contents About this release Installation instructions New features Resolved issues Known issues Product documentation About this release
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Vulnerability Manager 7.5.1
McAfee Vulnerability Manager 7.5.1 The McAfee Vulnerability Manager 7.5.1 quarterly release adds features to the product without having to wait for the next major release. This release notes file contains
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationMcAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6
McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationInstallation Guide Revision A. McAfee Web Gateway 7.4.0
Installation Guide Revision A McAfee Web Gateway 7.4.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationMcAfee Drive Encryption 7.1.0
Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationProduct Guide. McAfee Agent 5.0.1. For use with McAfee epolicy Orchestrator
Product Guide McAfee Agent 5.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationNetwork Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1
Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationKaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
More informationRelease Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
More information