Product Guide. McAfee Endpoint Security for Mac Threat Prevention

Size: px
Start display at page:

Download "Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0"

Transcription

1 Product Guide McAfee Endpoint Security for Mac Threat Prevention

2 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, , TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Evader, Foundscore, Foundstone, Global Threat Intelligence, McAfee LiveSafe, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee TechMaster, McAfee Total Protection, TrustedSource, VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Endpoint Security for Mac Threat Prevention Product Guide

3 Contents Preface 7 About this guide Audience Conventions Find product documentation Introduction 9 Why you need security for Mac Product features Protecting your standalone Mac 2 Installing the software on a standalone Mac 13 Hardware and software requirements Install the software Install the software using wizard Install the software from the command line (silent installation) Supported upgrades on a standalone Mac Upgrade the software on a standalone Mac Test the installation Test the Threat Prevention feature Default settings Recommended post-installation tasks Uninstall the software from a standalone Mac Using the software on a standalone Mac 21 Security status View your Mac security status Recent events summary View event log Remove event log View the quarantined items Remove or restore the quarantined item Update the DAT and Engine Run a system scan Configure custom scan tasks Create a scan task Change settings in an existing scan task Remove an existing scan schedule Configuring protection settings on a standalone Mac 27 General protection options Enable or disable protection features Threat Prevention How Threat Prevention works McAfee Endpoint Security for Mac Threat Prevention Product Guide 3

4 Contents Types of scan Configure on-access scan preferences Configure on-demand scan preferences Exclude files or directories from scanning Best practices for Threat Prevention Configure an update schedule Configure the repository list Configure proxy settings Configure the DAT update schedule Debug logging Enable or disable debug logging Troubleshooting 37 Run the repairmsc utility Protecting your managed Mac 6 Installing the software on a Mac managed with McAfee epo 41 System requirements Check in the package to the McAfee epo server Check in the package using Software Manager Check in the package manually Install the extensions to the McAfee epo server Install the extensions using Software Manager Install the extensions manually Install the client software on a managed Mac using the installation URL Create an installation URL Install the software with an installation URL on a managed Mac Deploy the software from McAfee epo Test the installation Remove the software from a managed Mac Remove the software extensions Remove the software Installing the software on a Mac managed with McAfee epo Cloud 47 McAfee epo Cloud components System requirements Installation overview Accessing the McAfee epo Cloud account Install the client software on a managed Mac using the installation URL Create an installation URL Install the software with an installation URL Deploy the client software from McAfee epo Cloud Managing the software with McAfee epo and McAfee epo Cloud 51 Using Endpoint Security extensions as common extensions Manage policies Create or modify policies Assign policies Threat Prevention policy Configure On-Access Scan policy Configure On-Demand Scan policy (Full Scan) Configure an On-Demand Scan policy (Quick Scan) Exclude files or directories from scanning Schedule a full or quick scan on managed Mac Schedule a custom on-demand scan McAfee Endpoint Security for Mac Threat Prevention Product Guide

5 Contents Schedule the DAT update Queries and reports Queries for Threat Prevention Other queries Index 63 McAfee Endpoint Security for Mac Threat Prevention Product Guide 5

6 Contents 6 McAfee Endpoint Security for Mac Threat Prevention Product Guide

7 Preface This guide provides the information you need to work with your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who use the computer where the software is running and can access some or all of its features. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Endpoint Security for Mac Threat Prevention Product Guide 7

8 Preface Find product documentation Find product documentation After a product is released, information about the product is entered into the McAfee online Knowledge Center. 1 Go to the Knowledge Center tab of the McAfee ServicePortal at 2 In the Knowledge Base pane, click a content source: Product Documentation to find user documentation Technical Articles to find KnowledgeBase articles 3 Select Do not clear my filters. 4 Enter a product, select a version, then click Search to display a list of documents. 8 McAfee Endpoint Security for Mac Threat Prevention Product Guide

9 1 Introduction 1 McAfee Endpoint Security for Mac Threat Prevention protects your Mac from viruses, spyware, trojan horses, and other malware threats. You can use the software on standalone and managed Mac systems. For a standalone Mac You or your Mac administrator can install the software and configure settings using the interface. For a managed Mac Your system administrator sets up and configures security policies using these servers. McAfee epolicy Orchestrator (McAfee epo ) McAfee epolicy Orchestrator Cloud (McAfee epo Cloud) Contents Why you need security for Mac Product features Why you need security for Mac Systems without protection might result in a security breach such as data loss, misuse of personal and business information, and system disorder. New products and technologies broaden opportunities for new security threats and challenges. The motive behind these threats is to interrupt and espionage your system or destruct the data and the system functionality completely. The targeted security threats devised by cyber criminals and hackers are evolving consistently and increasing the risk consistently. The analyst reports say that the overall malware samples reached more than 350 million implying the importance of securing your Mac from the threats. The list of threats and reported vulnerabilities that can harm your Mac are: Threat category Malware Spyware Potential threat Directs the user to access malicious items that can infect the Mac. Examples: Flashback Trojan, Fake AV Tracks every key you type to access sensitive information, such as user name and password and other personal details. Example: Keyloggers Botnet breakdowns Infects your system or network and controls it remotely to spread malware. Based on the modules that you have installed and enabled, McAfee Endpoint Security for Mac protects your Mac from malware, network threats, and web-based threats. McAfee Endpoint Security for Mac Threat Prevention Product Guide 9

10 1 Introduction Product features Product features These are the main features of McAfee Endpoint Security for Mac. Threat Prevention On-Access Scan Scans files and directories for threats whenever users access them. On-Demand Scan Schedules a scan on files and directories at specific times. Each on-demand scan contains its own policy settings. You can also run Full Scan or Quick Scan on a Mac. Exclusion of files and directories from scanning Excludes specific files and directories from on-access scanning and on-demand scanning using criteria such as file type, extension, file age, or wildcards. Option to scan network volumes, compressed files, and Apple s Exclude or include mounted network volumes, compressed files, and Apple s from scanning. Option to retain client-side exclusions Overwrites or retains the client exclusion list for on-access scanning in a managed environment Engine support Pre-packaged with the latest 5800 engine that provides enhanced detection capabilities. Common Policy Self Protection Protects the security software files and folders from malware and from being changed or deleted. Password protection for client interface Configure different access levels for users as needed. You can also prevent users from changing the protection preferences. Password protection for uninstallation Set password protection for the client software to prevent removal of the software from the Mac. General Common extensions to manage Windows and Macintosh systems Use Endpoint Security extensions as common extensions to manage policies for your Windows and Mac systems. Common McAfee epo Dashboard and queries Use the McAfee epo dashboard to view the status of managed Mac and Windows systems. Turn off protection using the command-line option during product deployment You can disable Threat Prevention protection using the command-line option from the McAfee epo server when deploying the software on managed Mac systems. For more information about using the command-line option, see McAfee KnowledgeBase article KB Support for McAfee epo Cloud Support for McAfee epo Cloud to manage policies for your Mac. Option to select protection modules You can install one or all protection modules on a standalone Mac as needed. Menulet for easy access of the software interface Easy access to the user interface by clicking the McAfee menulet from the status bar. Enable debug logging from client interface Enable debug logging for the modules that you have installed using the client interface. 10 McAfee Endpoint Security for Mac Threat Prevention Product Guide

11 Protecting your standalone Mac Install the software, analyze the default settings, and configure protection preferences for your standalone Mac. Chapter 2 Chapter 3 Chapter 4 Chapter 5 Installing the software on a standalone Mac Using the software on a standalone Mac Configuring protection settings on a standalone Mac Troubleshooting McAfee Endpoint Security for Mac Threat Prevention Product Guide 11

12 Protecting your standalone Mac 12 McAfee Endpoint Security for Mac Threat Prevention Product Guide

13 2 Installing the software on a standalone Mac Install the software on a standalone Mac using the wizard or from the command line. Contents Hardware and software requirements Install the software Supported upgrades on a standalone Mac Test the installation Default settings Recommended post-installation tasks Uninstall the software from a standalone Mac Hardware and software requirements Make sure that your standalone Mac meets these requirements for successful installation. Component Hardware Requirement Mac that can run the supported operating system configuration. Operating system El Capitan x (client and server) If you are using McAfee Agent 5.x on your Mac, you must upgrade it to McAfee Agent with Hotfix HF before upgrading the operating system to El Capitan. Otherwise, the communication between the McAfee epolicy Orchestrator (McAfee epo ) server and the Mac fails, and you would be unable to manage the Mac from the McAfee epo server. For more information about the McAfee Agent known issues with El Capitan, see McAfee KnowledgeBase article KB Yosemite x (client and server) Mavericks 10.9.x (client and server) Browser Safari 7.1.x, 8.0.x, and 9.0.x McAfee Endpoint Security for Mac Threat Prevention Product Guide 13

14 2 Installing the software on a standalone Mac Install the software Install the software Install the software on a standalone Mac using the wizard or the command line. s Install the software using wizard on page 14 The wizard guides you through the steps to install the software on your standalone Mac. Install the software from the command line (silent installation) on page 14 You can use the command line to install the software without user intervention. Install the software using wizard The wizard guides you through the steps to install the software on your standalone Mac. 1 Download McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number.dmg to a temporary location on your Mac, then double-click it to mount. 2 Double-click McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number.pkg to open the wizard. During the installation, the installer prompts you to select modules for installation. You can select one or multiple modules. To install a module later, you must start the installation wizard. If the modules are grayed out, it indicates that the installer has detected the competitor software on your Mac. You must uninstall it before installing the module. For more information, see McAfee Knowledgebase article KB Follow the prompts to install the software. To install the module that you have already installed, you must start the installation wizard, then select the module as needed. When you re-install the module, the protection settings that you configured previously are retained. Install the software from the command line (silent installation) You can use the command line to install the software without user intervention. 1 Download McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number.dmg to a temporary location on your Mac, then double-click it to mount McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number.pkg. 2 Copy the McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number>.pkg file to a temporary location on your Mac. 3 Open a Terminal window and change the working directory to the one where you saved the McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number>.pkg file. 14 McAfee Endpoint Security for Mac Threat Prevention Product Guide

15 Installing the software on a standalone Mac Supported upgrades on a standalone Mac 2 4 Type the following command, then press return. sudo installer -pkg McAfee-Endpoint-Security-for-Mac-<version>-standalone-<build_number>.pkg.pkg target / 5 Type the administrator password, then press return. The following message appears. The Install was successful. To install individual protection module using the command-line, see McAfee KnowledgeBase article KB Supported upgrades on a standalone Mac McAfee Endpoint Security for Mac supports upgrading the software and migrating the preferences from the previous versions of the software. You can upgrade the software from: McAfee Endpoint Protection for Mac 2.x McAfee Endpoint Security for Mac 10.0 McAfee VirusScan for Mac 9.x Upgrading from McAfee Endpoint Protection for Mac 2.x When you upgrade the software, the respective preferences are migrated according to the modules you select. When you upgrade the software from the previous version, the existing software is removed completely but the preferences for all modules are saved. When you install a module, the respective preferences are migrated. For example: If you select... Threat Prevention Migrated preferences... Anti-malware Since Application Protection module is not part of McAfee Endpoint Security for Mac, the Application Protection preferences are migrated only when you install the McAfee Application Protection 2.3 software. For more information, see McAfee Application Protection product guide. When you migrate the preferences from McAfee Endpoint Protection for Mac or McAfee VirusScan for Mac, the Quarantine scan action is migrated to Delete, and the Notify scan action is migrated to Deny. Upgrading from McAfee Endpoint Security for Mac 10.0 When you upgrade the software, the respective existing preferences are migrated according to the module you select. For example: If you select... Threat Prevention Migrated preferences... Threat Prevention Upgrading from McAfee VirusScan for Mac 9.x When you upgrade the software, the existing anti-malware preferences are migrated. McAfee Endpoint Security for Mac Threat Prevention Product Guide 15

16 2 Installing the software on a standalone Mac Test the installation Upgrade the software on a standalone Mac You can upgrade the software and migrate the existing configuration settings. Before you begin Before upgrading the software, make sure that your system meets all requirements. 1 Install the software using the wizard. For more information, see Install the software using wizard. 2 Make sure that all existing preferences are migrated to the new version. Test the installation Test the software to make sure that it is installed properly and can protect your Mac. s Test the Threat Prevention feature on page 16 Access the EICAR standard anti-virus test file to test the Threat Prevention feature. Test the Threat Prevention feature Access the EICAR standard anti-virus test file to test the Threat Prevention feature. This file is the combined effort by anti-virus vendors to implement one standard that customers can use to validate the anti-virus software. 1 Go to the EICAR website 2 Click DOWNLOAD ANTI MALWARE TESTFILE, then click DOWNLOAD. 3 From the Download area using the standard protocol http section, click the file eicar.com.txt. For the test to be successful, McAfee Endpoint Security for Mac displays a Notification 1 detection(s) found on your system. with the relevant details. Default settings Once installed, McAfee Endpoint Security for Mac starts protecting the Mac immediately based on the default configurations defined. Refer to these default settings, and configure them for your environment. General Feature Threat Prevention Default settings Enabled 16 McAfee Endpoint Security for Mac Threat Prevention Product Guide

17 Installing the software on a standalone Mac Default settings 2 Threat Prevention Feature Threat Prevention Default settings On-Access Scan: Scan files while Write Maximum scan time for a file 45 seconds for a file. When a virus is found Clean If clean fails Delete When a spyware is found Clean If clean fails Delete Also scan: Archives & Compressed Files Disabled Apple Mail messages Disabled Network Volumes Disabled On-Demand Scan: When a virus is found Clean If clean fails Delete When a spyware is found Clean If clean fails Delete Archives & Compressed Files Enabled Apple Mail messages Enabled Network Volumes Disabled Exclusions None Update Feature Update Default settings In Repository List Repository Name McAfeeHttp, McAfeeFtp In Proxy Settings Proxy settings Do not use a proxy In Schedule Schedule Daily at 4:45 PM (local time) Logging Feature Logging Default settings In Enable Debug Logging Threat Prevention Disabled McAfee Endpoint Security for Mac Threat Prevention Product Guide 17

18 2 Installing the software on a standalone Mac Recommended post-installation tasks Recommended post-installation tasks Perform these tasks to make sure that the protection configuration does not affect the business routines. Update the content files Perform an on-demand scan Threat Prevention Description After installation, McAfee Endpoint Security for Mac automatically updates the content files to protect the Mac from the latest threats. By default, this update is scheduled at 4.45 pm local time every day. When the files are updated for the first time, it may take longer time to download the full content. The subsequent updates will be incremental. You can view the content files last update details in the Console page. Run an on-demand-scan to scan the local volumes, after you install the software to clean the infected files that are not accessed by but reside in the Mac. Configure the On-Demand Scan task to define: The items to scan (files, folders, and drives) Set frequency of scan (daily, weekly, monthly, or immediately) Define the action when malware is found (Delete or Clean) McAfee Endpoint Security for Mac comes with the default settings. Verify that the default settings are consistent with your organization policies and provides complete protection against malware. Uninstall the software from a standalone Mac You can uninstall the software or specific modules from a Mac using the command line. Before you begin You must have administrator rights to uninstall the software. 18 McAfee Endpoint Security for Mac Threat Prevention Product Guide

19 Installing the software on a standalone Mac Uninstall the software from a standalone Mac 2 1 Open a Terminal window. 2 Type the following command, then press return. To remove... All modules Threat Prevention module Use this command... sudo /usr/local/mcafee/uninstall EPM sudo /usr/local/mcafee/uninstall ThreatPrevention The uninstallation command is case sensitive. 3 Type the administrator password when prompted. When Uninstallation is enabled in Endpoint Security Common policy, uninstalling the software using the command line prompts you to type the password set by your McAfee epo server administrator. When the software is uninstalled, the following message appears: Product has been uninstalled successfully. When you uninstall the software, the McAfee Agent is not uninstalled from the system. This is because that it might be used by other products. Refer to the product guide of your McAfee Agent version for more information. McAfee Endpoint Security for Mac Threat Prevention Product Guide 19

20 2 Installing the software on a standalone Mac Uninstall the software from a standalone Mac 20 McAfee Endpoint Security for Mac Threat Prevention Product Guide

21 3 Using 3 the software on a standalone Mac Access the McAfee Endpoint Security for Mac Console page to view your Mac security status and events details. You can also view the quarantined items, configure scan schedules, and update the DAT and engine. Contents Security status View your Mac security status Recent events summary View event log Remove event log View the quarantined items Remove or restore the quarantined item Update the DAT and Engine Run a system scan Configure custom scan tasks Security status View the security status and the protection features that are enabled or disabled on your Mac. Use the dashboard to know the status of: Threat Prevention Firewall Web Control View your Mac security status The Status page displays the security status of your Mac, the protection modules installed, and their status. You can view recent events summary and the last successful DAT or Engine update time. The events that appear in the Status page are read-only. To view your Mac security status and the protection modules installed: 1 click the McAfee menulet on the status bar, select Console Status. The Status page also displays the protection modules that are installed on you Mac and their status. McAfee Endpoint Security for Mac Threat Prevention Product Guide 21

22 3 Using the software on a standalone Mac Recent events summary Recent events summary You can view the summary of recent five events in Status page. The events summary includes: Details of malware detected from on-access scan. Status of scan task with number of malware detected from on-demand scan. Threat Prevention update status with DAT version details. Recent events displays only the summary of events. To view the complete details of events, navigate to the Event Log page, then double-click the particular event. View event log View and analyze event log to understand the software activity information. The Event Log page displays all events with details for malware detection, scan schedules, and Threat Prevention update. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard, click Event Log. Twenty events are listed per page and you can use arrow keys to navigate through pages. 3 Double-click the event you want to view. Threat Prevention Update Displays the DAT version, engine version, and the status of the update. On-Access Scan Displays the application that accessed the malware, status of detection found, and total number of detections with the details. On-Demand Scan Displays number of files scanned, name and location of infected files, if found, and action taken. You can sort events based on Event, Type or Date & Time. Remove event log Remove event log from the History page. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard, click Event Log. 3 Click, type the administrator password, then click OK 4 Select the event, then click Delete. 22 McAfee Endpoint Security for Mac Threat Prevention Product Guide

23 Using the software on a standalone Mac View the quarantined items 3 5 Click OK to remove the events. You can't restore the events once you remove them from the list. 6 Click to prevent further changes. View the quarantined items The Quarantine feature isolates dangerous or suspicious malware that could harm your Mac otherwise. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard, click Quarantine. The quarantine page displays the original path of items quarantined with date and time of the event. Remove or restore the quarantined item The Quarantine page displays the list of quarantined items with the path, date, and time. You can restore the quarantined items, only if you are sure that they are non-malicious items, otherwise you can remove them. Before you begin You must have administrator rights to remove or restore the quarantined item from the list. Before restoring an item, we recommend that you send it to McAfee Labs for testing. To submit a sample to McAfee Labs, see McAfee KnowledgeBase article KB Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard, click Quarantine. 3 Click, type the administrator password, then click OK. To restore, select the quarantined item, click Restore, then click OK to confirm. To remove, select the quarantined item, click Delete, then click OK to confirm. You can't restore the items that are deleted from the quarantined list. 4 Click to prevent further changes. McAfee Endpoint Security for Mac Threat Prevention Product Guide 23

24 3 Using the software on a standalone Mac Update the DAT and Engine Update the DAT and Engine Always keep the DAT and Engine up to date to protect your Mac from the latest threats. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard, click Update Now. 3 Click Start Update to initiate the DAT update task. Upon completion, the update summary appears with the engine version, DAT version, update status, and DAT creation date in the Threat Prevention Update section. You can view the status and details of Threat Prevention update event in the Event Log page. Run a system scan Perform an on-demand scan on specific files, directories, and local or network-mounted volumes immediately. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console, click Scan Now. 3 From the What to scan drop-down list, select items, then click Start Scan. You can select multiple items by clicking. Configure custom scan tasks Schedule and customize scan tasks based on your requirements, to scan specific files, folders, and volumes periodically. You can also modify or remove the existing schedule. For example, to scan your download folder and music library folder more frequently, you can define a scan schedule for only these two folders. s Create a scan task on page 25 Create scan tasks that automatically run at scheduled periods with the defined parameters. Change settings in an existing scan task on page 25 Change an existing scan schedule to add or remove locations or change the date and time. Remove an existing scan schedule on page 26 Remove the scan schedule when you no longer need it. 24 McAfee Endpoint Security for Mac Threat Prevention Product Guide

25 Using the software on a standalone Mac Configure custom scan tasks 3 Create a scan task Create scan tasks that automatically run at scheduled periods with the defined parameters. 1 Click the McAfee menulet on the status bar, then select Console. 2 Click in the bottom left corner. 3 In the Scan Name field, type a name, then click Create. 4 From the What to scan drop-down list, select the items you want scan. Click or - to remove the location. Documents Scans the user documents folder. Desktop Scans files and folders in desktop. Users Scans the user directory. Applications Scans the applications folders. Localhost Scans the local host. Choose Allows you to select folder or file location to scan. 5 In the When to scan section, select a schedule for the scan task, then click Schedule Scan. Immediately Starts a scan task immediately. If you select to scan items immediately, click Start Scan. Once Scans the defined locations once at the scheduled date and time. Daily Scans the defined locations every day at the scheduled time. You can define the number of occurrence to run the daily scan task or select No End Date to run the schedule without any limit. Weekly Scans the defined locations on a scheduled day and time of every week. You can define the number of occurrence to run the weekly scan task or select No End Date to run the schedule without any limit. Monthly Scans the defined locations on a scheduled date and time of every month. You can define the duration or select No End Date to continue the schedule without any limit. 6 When you see a message that the scan task is scheduled, click OK. 7 Click Schedule Scan. Change settings in an existing scan task Change an existing scan schedule to add or remove locations or change the date and time. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard under Activity, click the scheduled task you want to modify. The scheduled task displays the Last Scan Time and Next Scan Time. 3 Click Modify Scan, make the needed changes, then click Schedule Scan. McAfee Endpoint Security for Mac Threat Prevention Product Guide 25

26 3 Using the software on a standalone Mac Configure custom scan tasks Remove an existing scan schedule Remove the scan schedule when you no longer need it. 1 Click the McAfee menulet on the status bar, then select Console. 2 On the console dashboard, select an existing scan schedule in the left pane. 3 In the bottom left corner of the console, click to remove the selected item. 26 McAfee Endpoint Security for Mac Threat Prevention Product Guide

27 4 Configuring 4 protection settings on a standalone Mac Use Preferences to configure protection settings for the installed modules. Contents General protection options Threat Prevention Configure an update schedule Debug logging General protection options Use the General tab options to enable the required protection preferences on your self-managed Mac. You can enable or disable protection for the modules that you have installed. Threat Prevention Firewall Web Control Enable or disable protection features Enable the protection feature as required for your environment. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 On the General tab, click. 3 Type the password when prompted. 4 Enable or disable the protection as required. 5 Click to prevent further changes. Threat Prevention Threat Prevention protects your Mac from malware threats. Configure the Threat Prevention settings to define actions for on-access scanning and on-demand scanning, and to exclude files and paths from scanning. McAfee Endpoint Security for Mac Threat Prevention Product Guide 27

28 4 Configuring protection settings on a standalone Mac Threat Prevention How Threat Prevention works Threat Prevention protects your Mac from malware threats and unwanted programs by scanning items on your Mac. When enabled, the software scans files, folders on local, network-mounted volumes, and removable media whenever you access or create an item. McAfee Endpoint Security for Mac uses the latest engine that: Performs complex analysis using the malware definition files (DATs) Decodes the contents of the item you access Compares them with the known signatures stored in the DAT files to identify malware Use Threat Prevention preferences to configure actions for on-access scan, on-demand scan, or to exclude files or paths from scanning. Types of scan The software scans files on Mac in two ways, on-demand and on-access. On-access scan Scans files and folders for malware threats and unwanted programs whenever you access them, and takes actions according to the configuration. On-demand scan Scans files and folders for malware threats and unwanted programs at any time or at scheduled time. You can run on-demand scan in two ways. Scan all files Scans files and directories immediately for the locations you have selected in What to Scan. Schedule Scan Scans files and directories configured in What to Scan at the scheduled time. 28 McAfee Endpoint Security for Mac Threat Prevention Product Guide

29 Configuring protection settings on a standalone Mac Threat Prevention 4 How on-access scan works This diagram shows how on-access scan works. McAfee Endpoint Security for Mac Threat Prevention Product Guide 29

30 4 Configuring protection settings on a standalone Mac Threat Prevention How on-demand scan works This diagram shows how on-demand scan works. Configure on-access scan preferences The on-access scan protects your Mac from threats in real time. It scans for malware whenever an item is read from or written to the hard disk, and takes action according to the configuration. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 On the Threat Prevention tab, click, type the administrator password, then click OK. 30 McAfee Endpoint Security for Mac Threat Prevention Product Guide

31 Configuring protection settings on a standalone Mac Threat Prevention 4 3 From the Scan files while drop-down list, select one of these options: Read Scans items when they are read from the hard disk. Write Scans items when they are written to the hard disk. Read & Write Scans items when they are read from or written to the hard disk. 4 In Maximum scan time (in seconds), specify the duration allowed to scan each file. You can specify a value between 10 and The default value is 45. When scanning exceeds the defined time, the software stops scanning the file. 5 From the When a virus is found drop-down list, select one of these options: Clean Clean the item that contains malware. Use the If clean fails drop-down list, to select a secondary action (Delete or Deny). Delete Deletes the item that contains malware. Deny Prevents the user from accessing files with detected threats. Although the software denies access to the file, it still resides in the system. Whenever you select the primary action as Clean or Delete, the item is quarantined by default. 6 From the When a spyware is found drop-down list, select one of these options: Clean Cleans the item that contains spyware. Use the If clean fails drop-down list, to select a secondary action (Deny, Delete, or Allow). Delete Deletes the item that contains spyware. Deny Prevents the user from accessing files with detected threats. Although the software denies access to the file, it still resides in the system. Allow Allows the user to access files with detected threats. Whenever you select the primary action as Clean or Delete, the item is quarantined by default. 7 In Also scan, select where you want to enable scanning: Archives & Compressed Files Apple Mail Messages Network Volumes When these options are selected, McAfee Endpoint Security for Mac detects the threat. But, the primary and secondary actions might vary depending on the options selected. 8 Click to prevent further changes. Configure on-demand scan preferences Schedule an on-demand scan to run immediately, at a scheduled time, or at regular intervals. For information about creating a scan task, see Create a scan task. McAfee Endpoint Security for Mac Threat Prevention Product Guide 31

32 4 Configuring protection settings on a standalone Mac Threat Prevention 1 Click the McAfee menulet on the status bar, then select Preferences. 2 On the Threat Prevention tab, click On-Demand Scan. 3 Click, type the administrator password, then click OK to open the On-Demand Scan page. 4 From the When a virus is found drop-down list, select one of these options: Clean Cleans the item that contains malware. Use the If clean fails drop-down list, to select a secondary action (Delete, Continue scanning) Delete Deletes the item that contains malware. Continue Scanning Continues scanning when a threat is detected. The detected threat still resides in the Mac. 5 From the When a spyware is found drop-down, select one of these options: Clean Cleans the item that contains spyware. Use the If clean fails drop-down list, to select a secondary action (Delete, Continue scanning). Delete Deletes the item that contains spyware. Continue scanning Continues scanning when a threat is detected. The detected threat still resides in the Mac. 6 In Also scan, select where you want to enable scanning: Archives & Compressed Files Apple Mail Messages Network Volumes 7 Click to prevent further changes. Exclude files or directories from scanning Exclude files and folder paths from an on-access scan or on-demand scan. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 Click Threat Prevention, then click Exclusions. 3 Click, type the administrator password, then click OK. 4 Click in the bottom left corner. 5 Select the path of the required files and folders, then click Open. 32 McAfee Endpoint Security for Mac Threat Prevention Product Guide

33 Configuring protection settings on a standalone Mac Threat Prevention 4 6 Select or deselect the On-Access Scan and On-Demand Scan options as needed. Double-click an item to change the name or path that appears in the exclusion list. Use regular expressions to exclude items from scanning. For example, to exclude all files in the desktop from scanning, specify the path as /Users/user/Desktop/* To remove the item from the exclusions list, select it, then click in the bottom left corner of the page (or press fn+delete). If you deselect the On-Access Scan and On-Demand Scan options for a path added to the exclusion list, the path is removed from the exclusion list immediately. 7 Click to prevent further changes. Best practices for Threat Prevention This section describes the best practices to define the preferences for scheduling an on-access scan and an on-demand scan. On-access scan preferences Always enable On-access-Scan because it checks every file the user accesses, and detects malware before it runs. Enable the scan option for the Network Volumes when needed, to scan files copied from or written to any network volumes. On-demand scan preferences Always enable the scan for Archives & Compressed Files while performing on-demand scan. This is recommended if you may have disabled scanning option for these files. On-demand scan schedule Schedule an on-demand scan during non-peak hours (for example, during weekends or maintenance period). When scheduling an on-demand scan for the first time, schedule a full on-demand scan of your entire hard disk. Exclusions You can add regular expressions that match required patterns to exclude multiple files and folders from being scanned. Here are some recommended exclusions: Microsoft Outlook database files Thunderbird database files Encrypted files Generic plist files such as Info.plist or version.plist for on-access scanning Here are some recommended exclusion examples using wildcards: To exclude files with the extension mdb, use *.mdb To exclude each user's Outlook Database files of different Microsoft Office versions, use /Users/*/ Documents/Microsoft\ User\ Data/Office\ *\ Identities/*\ Identity/* McAfee Endpoint Security for Mac Threat Prevention Product Guide 33

34 4 Configuring protection settings on a standalone Mac Configure an update schedule To exclude all Info.plist under /Applications, use /Applications/*/Contents/Info.plist To exclude all version.plist under /Applications, use /Applications/*/Contents/version.plist To exclude files with the extensions jar, rar, or war under /private/var/tmp, use / private/var/tmp/*.?ar Configure an update schedule Configure the repository list that needs to be accessed to update the DAT or Engine, the proxy connection settings, and the update schedule. s Configure the repository list on page 34 Always keep your DAT file up to date to secure your Mac from the latest threats. Configure proxy settings on page 35 Configure Proxy settings if you use proxy servers to connect to the Internet for retrieving packages. Configure the DAT update schedule on page 35 Periodic DAT updates secure your Mac from latest threats. Configure the repository list Always keep your DAT file up to date to secure your Mac from the latest threats. The software is shipped with the configuration that allows access to the McAfee FTP server and HTTP server to download the latest DAT file while your Mac is connected to the Internet. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 Click Update. 3 Click, type the administrator password, then click OK. 4 In Repository Name list box, on the Repository List tab: To add a repository. To delete an existing repository. To deprioritize repositories. To prioritize repositories. 5 In Repository Type, select FTP, HTTP, or a Local repository from where the latest DATs can be downloaded. 6 Specify a Repository URL, Port, User Name, and Password for the repository. 7 On the Schedule tab, define the schedule, then click Apply. 8 Click to prevent further changes. 34 McAfee Endpoint Security for Mac Threat Prevention Product Guide

35 Configuring protection settings on a standalone Mac Configure an update schedule 4 Configure proxy settings Configure Proxy settings if you use proxy servers to connect to the Internet for retrieving packages. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 Click Update, then click the Proxy Settings tab. 3 Click, type the administrator password, then click OK. 4 Select whether to use a proxy. Do not use a proxy Configure proxy settings manually 5 Select Use these settings for all proxy types to specify the same IP address and port number for all proxy types. 6 Select FTP or HTTP server, then type the IP address and port number of the selected server. 7 Select Use authentication, then type the user name and password for the server. 8 To bypass a proxy server for specific domains, select the Specify exceptions, then type the domain name. 9 Click to prevent further changes. Configure the DAT update schedule Periodic DAT updates secure your Mac from latest threats. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 On the Update tab, click Schedule. 3 Click, type the administrator password, then click OK. 4 Click the drop-down list to select the update frequency, then click Apply. Never Never run the update We recommend not to use this option. Always keep your DAT and Engine up-to-date to protect your Mac from latest threats. Hourly To run the update on the selected hours. Daily To run the update daily at a specific time. Weekly To run the update weekly at a specified time on weekdays. Monthly To run the update once in a month at a specified time. 5 Click to prevent further changes. McAfee Endpoint Security for Mac Threat Prevention Product Guide 35

36 4 Configuring protection settings on a standalone Mac Debug logging Debug logging Debug logs provide important information that you can use for troubleshooting purposes. Enabling debug logs for a module logs details for all components of the module. For example, if you enable logging for Threat Prevention, logs are stored for on-access scanning and on-demand scanning activity. You can find the Threat Prevention logs at /var/log/system.log and /var/log/ McAfeeSecurity.log. You can identify and filter the Threat Prevention logs by its name MFE_AV. You can find the Firewall logs at /var/log/system.log. You can identify and filter the firewall logs by its name MFE_FW. You can find the Web Control logs at /var/log/mcafeesecurity.log. You can identify and filter the Web Control specific log by its name MFE_WC. Enable or disable debug logging Configure the debug logging option for the installed modules. 1 Click the McAfee menulet on the status bar, then select Preferences. 2 Click the Logging tab. 3 Click, type the administrator password, then click OK. 4 Select the modules as required. 5 Click to prevent further changes. 36 McAfee Endpoint Security for Mac Threat Prevention Product Guide

37 5 Troubleshooting Identify and troubleshoot issues when using McAfee Endpoint Security for Mac. Run the repairmsc utility Use the repairmsc utility to troubleshoot McAfee Endpoint Security for Mac issues. It generates diagnostic reports, which can be uploaded to the McAfee server for analysis. 1 Open a Terminal window, type the following command, then press return. /usr/local/mcafee/repairmsc 2 Type the administrator password when prompted, then press return. 3 Type Y to continue, then press return. A consolidated diagnostic report is generated in home directory for issue analysis. A list of issues appears with each category relating to a number from 1 to 8. 4 Type a number that best describes the issue, then press return. The repairmsc runs a repair utility based on the number selected and provides a solution. 5 Type y or n to confirm whether the issue was fixed, then follow the on-screen instructions. The report file repairmsc.zip is available in your home directory. (Users/<user>). Contact McAfee support for troubleshooting assistance. McAfee Endpoint Security for Mac Threat Prevention Product Guide 37

38 5 Troubleshooting Run the repairmsc utility 38 McAfee Endpoint Security for Mac Threat Prevention Product Guide

39 Protecting your managed Mac Install the required extensions and deploy a security strategy to protect your managed Mac systems from threats. Chapter 6 Chapter 7 Chapter 8 Installing the software on a Mac managed with McAfee epo Installing the software on a Mac managed with McAfee epo Cloud Managing the software with McAfee epo and McAfee epo Cloud McAfee Endpoint Security for Mac Threat Prevention Product Guide 39

40 Protecting your managed Mac 40 McAfee Endpoint Security for Mac Threat Prevention Product Guide

41 6 Installing the software on a Mac managed with McAfee epo Install the software on the McAfee epo server and deploy it to your managed Mac. Contents System requirements Check in the package to the McAfee epo server Install the extensions to the McAfee epo server Install the client software on a managed Mac using the installation URL Deploy the software from McAfee epo Test the installation Remove the software from a managed Mac System requirements Make sure that these requirements are met and you have administrator permission. Component Hardware Operating system Requirements Mac that can run with the supported operating system configuration. El Capitan x (client and server) If you are using McAfee Agent 5.x on your Mac, you must upgrade it to McAfee Agent with Hotfix HF before upgrading the operating system to El Capitan. Otherwise, the communication between the McAfee epolicy Orchestrator (McAfee epo ) server and the Mac fails, and you would be unable to manage the Mac from the McAfee epo server. For more information about the McAfee Agent known issues with El Capitan, see McAfee KnowledgeBase article KB Yosemite x (client and server) Mavericks 10.9.x (client and server) Browser McAfee Agent McAfee epolicy Orchestrator Safari 7.1.x, 8.0.x, and 9.0.x McAfee Agent with Hotfix HF and later and later McAfee Endpoint Security for Mac Threat Prevention Product Guide 41

42 6 Installing the software on a Mac managed with McAfee epo Check in the package to the McAfee epo server Check in the package to the McAfee epo server You can check in the package using the Software Manager or check in the package manually. s Check in the package using Software Manager on page 42 Check in, update, or remove McAfee Endpoint Security for Mac using the Software Manager. Check in the package manually on page 42 Check in the McAfee Endpoint Security for Mac deployment package to the epolicy Orchestrator Master Repository. Check in the package using Software Manager Check in, update, or remove McAfee Endpoint Security for Mac using the Software Manager. For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Software Software Manager. 3 From the Product Categories list under Software (By Label), select Endpoint Security, select the package file, then click Check in All. 4 On the summary page, accept the McAfee End User License Agreement, then click OK. Check in the package manually Check in the McAfee Endpoint Security for Mac deployment package to the epolicy Orchestrator Master Repository. For option definitions, click? in the interface. 1 Download the.zip file to a temporary location on the McAfee epo server. 2 Log on to the McAfee epo server as an administrator. 3 Select Menu Software Master Repository Check In Package. a For Package type, select Product or Update (.ZIP). b Click Choose File, select the file, click Choose, then click Next. 4 Select Current, then click Save. Install the extensions to the McAfee epo server Install the software on the McAfee epo server to configure and deploy policies for managed Mac. s Install the extensions using Software Manager on page 43 Install the extensions using the Software Manager. Install the extensions manually on page 43 Install Endpoint Security extensions on the McAfee epo server manually. 42 McAfee Endpoint Security for Mac Threat Prevention Product Guide

43 Installing the software on a Mac managed with McAfee epo Install the client software on a managed Mac using the installation URL 6 Install the extensions using Software Manager Install the extensions using the Software Manager. For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu, Software, then click Software Manager. 3 From the Software Manager Product Categories Software (By Label), select Endpoint Security McAfee Endpoint Security , select from the right pane, then check in the extensions. Install the extensions manually Install Endpoint Security extensions on the McAfee epo server manually. You must install the extensions to enable the features of the product. For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Software Extensions, then click Install Extension. 3 Click Choose File and select the file that contains the extension, then click OK. When you install Endpoint Security extensions, policies and tasks from McAfee Endpoint Protection for Mac 2.x or McAfee VirusScan for Mac 9.x are not migrated. However, McAfee Endpoint Security for Mac 10.0 policies and tasks are migrated. Install the client software on a managed Mac using the installation URL McAfee epo administrators can create an installation URL to install Endpoint Security for Mac client software on managed Mac. s Create an installation URL on page 43 Create an installation URL and send it to the user to install McAfee Agent on a managed Mac. Install the software with an installation URL on a managed Mac on page 44 The Mac user can access the URL to install the client software on a managed Mac. Create an installation URL Create an installation URL and send it to the user to install McAfee Agent on a managed Mac. For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Dashboards, then select Getting Started with epolicy Orchestrator from the drop-down list. McAfee Endpoint Security for Mac Threat Prevention Product Guide 43

44 6 Installing the software on a Mac managed with McAfee epo Deploy the software from McAfee epo 3 On the Product Deployment page, click Start Deployment, define these settings, then click Deploy. System Tree Group McAfee Agent Software and Policies Auto Update 4 On the Initial Product Deployment Summary page, click OK. On the Dashboard page, the installation URL appears under Product Deployment section. 5 the URL with instructions to install the client software on the Mac to the user. After successful installation, McAfee Agent checks back with the McAfee epo server for assigned tasks for that system group, then installs the software accordingly. Install the software with an installation URL on a managed Mac The Mac user can access the URL to install the client software on a managed Mac. Before you begin Make sure that your managed Mac meets the hardware and software requirements. You must have an installation URL that you created or received from your administrator. For option definitions, click? in the interface. 1 Open a browser window, paste the installation URL in the address bar, then press Enter. 2 Follow the on screen instructions. If the installation does not start automatically, click Install. Deploy the software from McAfee epo Use McAfee epo to deploy the client software to systems in your network that are managed. For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Systems System Tree, then select a group or systems. 3 On the Assigned Client s tab, click Actions, then click New Client Assignment. 4 Complete these options, then click Create New : a For Product, select McAfee Agent. b For Type, select Product Deployment. 44 McAfee Endpoint Security for Mac Threat Prevention Product Guide

45 Installing the software on a Mac managed with McAfee epo Test the installation 6 5 On the Client Catalog page: a Type a name for the task. b c Select Mac as the target platform. In Products and components, select the product, select Install as the action, then click Save. You can add more products by using. 6 In the Client Assignment Builder page: a Select the task, then click Next. b Schedule the task to run immediately, click Next to view a summary of the task, then click Save. 7 In the System Tree, select the systems or groups where you assigned the task, then click Wake Up Agents. 8 Select Force complete policy and task update, then click OK. Test the installation After deploying the software, verify that the client software is installed and updated correctly on managed Mac systems. For option definitions, click? in the interface. 1 Wait for client systems to report back to the McAfee epo server (typically after an hour). 2 On the McAfee epo console, select Menu Dashboards, then select Endpoint Security: Installation Status for a complete list of managed Mac and their installation status. Remove the software from a managed Mac Remove the client software from the managed Mac systems and remove the extensions from the McAfee epo server. s Remove the software extensions on page 45 Remove the McAfee Endpoint Security for Mac extensions from the McAfee epo server. Remove the software on page 46 Create a client task on the McAfee epo server to remove McAfee Endpoint Security for Mac from the managed Mac. Remove the software extensions Remove the McAfee Endpoint Security for Mac extensions from the McAfee epo server. McAfee Endpoint Security for Mac Threat Prevention Product Guide 45

46 6 Installing the software on a Mac managed with McAfee epo Remove the software from a managed Mac For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Software Extensions. 3 In the left pane, select the extension and click Remove. 4 Select Force removal, bypassing any checks or errors, then click OK. Remove the software Create a client task on the McAfee epo server to remove McAfee Endpoint Security for Mac from the managed Mac. For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 Select Menu Systems System Tree, then select a group or systems. 3 Click the Assigned Client s tab, then click New Client Assignment. 4 Complete these options, then click Create New. a For Products, select McAfee Agent. b For Type, select Product Deployment. 5 On the Client Catalog page: a Type a name for the task. b c Select Mac as the Target platform. In Products and components, select the product, select Remove as the action, then click Save. 6 On the Client Assignment Builder page: a Select the task, then click Next. b Schedule the task to run immediately. Click Next to view a summary of the task, then click Save. 7 In the System Tree, select the systems or groups for which you assigned the task, then click Wake Up Agents. 8 Select Force complete policy and task update, then click OK. 46 McAfee Endpoint Security for Mac Threat Prevention Product Guide

47 7 7 Installing the software on a Mac managed with McAfee epo Cloud Install and manage the software on a Mac that is managed with McAfee epo Cloud. McAfee epo Cloud is an extensible management platform that enables centralized policy management and enforcement of your security products and the systems where they are installed. It also provides comprehensive reporting and product deployment capabilities, all through a single point of control. Using McAfee epo Cloud, you can deploy security products, patches, and service packs to the managed systems in your network. Contents McAfee epo Cloud components System requirements Installation overview Accessing the McAfee epo Cloud account Install the client software on a managed Mac using the installation URL Deploy the client software from McAfee epo Cloud McAfee epo Cloud components These components make up McAfee epo Cloud software. McAfee epo Cloud The center of your managed environment. McAfee epo Cloud delivers security policies and tasks, controls updates, and processes events for all managed Mac. McAfee Agent A vehicle of information and enforcement between the McAfee epo Cloud and each managed Mac. The agent retrieves updates, ensures task implementation, enforces policies, and forwards events for each managed Mac. Master Repository The central location for all McAfee updates and signatures, residing on McAfee epo Cloud. The Master Repository retrieves user-specified updates and signatures from McAfee. McAfee Endpoint Security for Mac Threat Prevention Product Guide 47

48 7 Installing the software on a Mac managed with McAfee epo Cloud System requirements System requirements Make sure that your managed Mac meet these requirements, and you have a valid account with the McAfee epo Cloud. Component Hardware Requirements Mac that can run with the supported operating system configuration. Operating system El Capitan x (client and server) If you are using McAfee Agent 5.x on your Mac, you must upgrade it to McAfee Agent with Hotfix HF before upgrading the operating system to El Capitan. Otherwise, the communication between the McAfee epolicy Orchestrator (McAfee epo ) server and the Mac fails, and you would be unable to manage the Mac from the McAfee epo server. For more information about the McAfee Agent known issues with El Capitan, see McAfee KnowledgeBase article KB Yosemite x (client and server) Mavericks 10.9.x (client and server) Browser Safari 7.1.x, 8.0.x, and 9.0.x Installation overview In McAfee epo Cloud environment, administrators can deploy the software remotely to managed Mac, or ask users to install it locally. McAfee sets up each McAfee epo Cloud account on an offsite management server and notifies the local administrator when products are ready to install on managed Mac systems. Administrators then typically create and send an installation URL to epolicy Orchestrator administrators for installation of client software on Mac systems. McAfee sends the credentials to you through registered . If you have not previously activated and configured an account, see the McAfee epo Cloud product guide for instructions. McAfee Endpoint Security for Mac supports both URL installation and deployment tasks. As an administrator, you can choose the method that best suits your needs. 1 Make sure that all managed Mac systems meet the hardware and software requirements. 2 Open the management console. Open a browser and log on to your McAfee epo Cloud account. 3 Create the installation URL. 4 Send the installation URL to all Mac users to install the McAfee Agent and product software. 5 Deploy the client software with default or custom settings to managed Mac in one of these ways. Schedule product deployment tasks Run product deployment tasks to deploy the software on managed Mac. Create an installation URL Create an installation URL, then it to users with instructions about installing the product on their Mac. Verify that the client software is installed and up to date on all managed Mac. 48 McAfee Endpoint Security for Mac Threat Prevention Product Guide

49 Installing the software on a Mac managed with McAfee epo Cloud Accessing the McAfee epo Cloud account 7 Accessing the McAfee epo Cloud account These are the high level actions to set up the McAfee epo Cloud account. 1 The enterprise administrator requests access to use McAfee epo Cloud. 2 McAfee s the McAfee epo Cloud URL and logon information to the enterprise administrator. 3 Log on to the McAfee epo Cloud server. Install the client software on a managed Mac using the installation URL epolicy Orchestrator administrators create an installation URL and send it to users to install the client software on managed Mac. s Create an installation URL on page 49 Create an installation URL to install the software on managed Mac. Install the software with an installation URL on page 50 The managed Mac user can install the software on a local Mac with an installation URL. Create an installation URL Create an installation URL to install the software on managed Mac. For option definitions, click? in the interface. 1 Log on to McAfee epo Cloud as an administrator. 2 Click Menu Getting Started Customize. 3 On the Customize Software Installation page, define these settings, then click Done. Group Name Type a name of the group. Operating System Select McAfee Agent for Mac. Software and Policies Select McAfee Endpoint Security software modules as required. Auto Update Select this option to download updates for the software. The default policies and tasks of the module are selected by default. 4 Click Done. 5 From the Dashboards drop-down list, select Getting Started with epolicy Orchestrator. On the right side pane under Getting Started, the URL that you created appears. 6 the URL with installation instructions to the Mac users. After successful installation, McAfee Agent checks back with the McAfee epo server for assigned tasks for that system group, then installs the software accordingly. McAfee Endpoint Security for Mac Threat Prevention Product Guide 49

50 7 Installing the software on a Mac managed with McAfee epo Cloud Deploy the client software from McAfee epo Cloud Install the software with an installation URL The managed Mac user can install the software on a local Mac with an installation URL. Before you begin Make sure that your Mac meets the hardware and software requirements. You must have an installation URL that you created or received from your administrator. For option definitions, click? in the interface. 1 Open a browser window, paste the installation URL in the address bar, then press Enter. 2 Follow the on-screen instructions. Deploy the client software from McAfee epo Cloud Deploy the client software to Mac systems in your network that are managed. For option definitions, click? in the interface. 1 Log on to the epolicy Orchestrator server as an administrator. 2 Select Menu Software Product Deployment 3 In the Product Deployment page, define these settings, then click Save. Name Language Description Branch Type Command line Auto Update Select the systems Package Select a start time 50 McAfee Endpoint Security for Mac Threat Prevention Product Guide

51 8 Managing 8 the software with McAfee epo and McAfee epo Cloud Integrate and manage McAfee Endpoint Security for Mac using McAfee epo or McAfee epo Cloud. The primary differences in managing policies in two environments are: McAfee epo Organizations maintain epolicy Orchestrator server in their premises and administrators check in and install the software on the server, create policy settings, and enforce them on multiple managed Mac systems using deployment tasks. McAfee epo Cloud McAfee or the service provider maintains the epo server including checking in and installing the software. After setting up the cloud account from McAfee or other service providers, local administrators create policies and enforce them on managed Mac systems using deployment tasks. For instructions about setting up and using epolicy Orchestrator and McAfee Agent, see the product guide for your version of the product. Contents Using Endpoint Security extensions as common extensions Manage policies Threat Prevention policy Queries and reports Using Endpoint Security extensions as common extensions Use Endpoint Security or later extensions as common extensions to manage your Microsoft Windows and Macintosh systems. You can use Endpoint Security extensions to configure and deploy policies for your Macintosh and Windows systems. On each policy page, a tag Windows only indicates that the option is applicable only for Windows based systems. The policy options that don't contain any tag are applicable for both Windows and Mac systems. To view the Windows only tag in the policy and task options, you must have installed the licensing extension on your McAfee epo. For the list of features supported for Microsoft Windows and Macintosh operating system, see McAfee KnowledgeBase article KB Manage policies McAfee Endpoint Security for Mac policies provide options to configure features, feature administration, and to log details on a managed Mac. You can find these policies on the Policy Catalog page under Product: McAfee Endpoint Security for Mac Threat Prevention Product Guide 51

52 8 Managing the software with McAfee epo and McAfee epo Cloud Threat Prevention policy Endpoint Security Threat Prevention Endpoint Security Firewall Endpoint Security Web Control Endpoint Security Common Configure these policies with your preferences, then assign them to groups of the managed Mac. For generic information about policies, see the product guide for your version of epolicy Orchestrator. Create or modify policies You can create and edit policies for a specific group in the System Tree. For option definitions, click? in the interface. 1 Log on to the epolicy Orchestrator server as an administrator. 2 From the Policy Catalog, select a Product and Category. 3 Perform these steps to create or modify a policy. To create a policy 1 Click New Policy. 2 Type the Policy Name. To modify a policy 1 Click the policy you want to modify. 2 Modify the settings. 3 Click OK. 4 Configure the settings. 4 Click Save. Assign policies When you have created or modified policies, assign them to the systems that are managed by epolicy Orchestrator. For option definitions, click? in the interface. 1 Log on to the epolicy Orchestrator server as an administrator. 2 Navigate to System Tree, select a group or systems, then click the Assigned Policies tab. 3 Select a product from the product list, select a policy, then click Edit Assignment. 4 Select the policy to assign, select appropriate inheritance options, then click Save. Threat Prevention policy Threat Prevention checks for malware and other threats by scanning items on your managed Mac systems. Use Endpoint Security Threat Prevention policy to configure scanning settings for your managed Mac. 52 McAfee Endpoint Security for Mac Threat Prevention Product Guide

53 Managing the software with McAfee epo and McAfee epo Cloud Threat Prevention policy 8 Product Category Available options Endpoint Security Threat Prevention On-Access Scan Enable or disable on-access scanning on managed Mac. Specify time limit to scan each file. Specify when to scan files. Scan specific types of files. Define actions for detected items and unwanted programs. Exclude files and directories. On-Demand Scan Run full scan and quick scan on managed Mac. Scan specific directories and their subdirectories. Scan specific types of files. Define actions for detected items and unwanted programs. Exclude files and directories from scanning. For the list of features supported for Microsoft Windows and Macintosh operating system, see McAfee KnowledgeBase article KB Configure On-Access Scan policy Create an on-access policy to enable or disable on-access scan, define scanning time limit for each file, and to define exclusions. For option definitions, click? in the interface. 1 Log on to epolicy Orchestrator server as an administrator. 2 From the Policy Catalog, select Endpoint Security Threat Prevention as the product, then select On-Access Scan as the category. 3 Click New Policy, type a name for the policy, then click OK. 4 Click the policy that you created, click Show Advanced. 5 In the On-Access Scan section, define these settings. In... On-Access Scan Process Settings Configure... Enable On-Access Scan Enables or disables on-access scanning on managed Mac. Specify maximum number of seconds for each file scan Specify the scan timeout value to scan each item. If you unselect this option, the value is set to 45 seconds. Use Standard settings for all processes Applies standard settings when performing on-access scanning. McAfee Endpoint Security for Mac Threat Prevention Product Guide 53

54 8 Managing the software with McAfee epo and McAfee epo Cloud Threat Prevention policy In... Configure... In the Standard process type: In Specify when to scan: When writing to disk Scans files when they are written to. When reading from disk Scans all files when they are read. Let McAfee decide Scans files when written to or read. On network drives Scans files in mounted-network volumes. In File type to scan: All files Scans files with any extension. Default and specified file types Scans files with extensions defined in the software, and the extensions you specify. For the list of the default file types, see McAfee KnowledgeBase article KB Also scan for macros in all files Scans macros in the files. Specified file types only Scans only files with extensions that you specify, and optionally, files with no extension. In Specify what to scan: Compressed archive files Scans the contents of compressed archive files. Scanning compressed archive files requires additional time. Compressed MIME-encoded files Scans Apple messages. Detect unwanted programs Enables the scanner to detect potentially unwanted programs. In Actions Threat detection first response: Deny access to files Prevents users from accessing any files with potential threats. Delete files Deletes files that contain malware. Clean files Removes threats from the detected file. You can also configure a secondary response using the If first response fails option, in case the primary response is unsuccessful. In Unwanted program first response: Clean files Removes the threat from the detected file. Delete files Deletes the file that contains threats. Deny access to files Prevents users from accessing files with potential threats. Allow access to files Allows users to access the detected file. You can also configure a secondary response using the If first response fails option, in case the primary response is unsuccessful. In the Exclusions section, click: Add To add files to the exclusion list. Edit To edit the exclusion settings. Delete To remove the selected item from the exclusion list. Clear All To remove all items from the exclusion list. 54 McAfee Endpoint Security for Mac Threat Prevention Product Guide

55 Managing the software with McAfee epo and McAfee epo Cloud Threat Prevention policy 8 In... Configure... Enable Overwrite exclusions configured on the client to overwrite the exclusions list created by the managed Mac user. For more information about configuring exclusions, see Exclude files or directories from scanning. 6 Click Save. Configure On-Demand Scan policy (Full Scan) Configure On-Demand Full Scan policy settings for your managed Mac. For option definitions, click? in the interface. 1 Log on to epolicy Orchestrator as an administrator. 2 From the Policy Catalog, select Endpoint Security Threat Prevention as the product, then select On-Demand Scan as the category. 3 Click New Policy, type a name for the policy, then click OK. 4 Click the policy that you created, click the Full Scan tab, then define these settings. In... Full Scan Configure... Detect unwanted programs Enables the scanner to detect potentially unwanted programs. Decode MIME encoded files Scans Apple mail messages. Scan inside archives Scans the contents of compressed archive files. Scanning compressed archive files requires additional time. Find unknown program threats Detects files that contain code resembling malware. Find unknown macro threats Detects unknown macro threats. Scan Locations Scan subfolders Examines all subfolders in the specified volumes when any of these options are selected. Home folder Temp folder User profile folder File or folder All local drives All fixed drives All removable drives All mapped drives You can add locations by clicking. Click to remove the locations from scanning. McAfee Endpoint Security for Mac Threat Prevention Product Guide 55

56 8 Managing the software with McAfee epo and McAfee epo Cloud Threat Prevention policy In... File Types to Scan Configure... All files Scans all files regardless of extension. McAfee strongly recommends that you enable All files to make sure that no malware threat resides in your managed Mac systems. Default and specified file types Scans files with extensions defined in the software and extensions you specify. For the list of the default file types, see McAfee KnowledgeBase article KB Also scan for macros in all files Enables scanning for macros in all files. Specified file types only Scans only files with extensions that you specify. Select Include files with no extension to scan files that contains no extension. Exclusions Actions In the Exclusions section, click: Add To add files to the exclusion list. Edit To edit the exclusion settings. Delete To remove the selected item from the exclusion list. Clear All To remove all items from the exclusion list. For more information about configuring exclusions, see Exclude files or directories from scanning. In Threat detection first response: Continue scanning Continues scanning files when a threat is detected. The scanner doesn't move items to the quarantine. Clean files Removes the threat from the detected file. Delete files Delete the file that contains malware. You can also configure a secondary response using the If first response fails option, in case the primary response is unsuccessful. In Unwanted program first response: Continue scanning Continues scanning files when a threat is detected. The scanner doesn't move items to the quarantine. Clean files Removes the threat from the detected file. Delete files Delete the file that contains malware. You can also configure a secondary response using the If first response fails option, in case the primary response is unsuccessful. 5 Click Save. For scheduling the task, see the product guide for your version of McAfee epolicy Orchestrator. Endpoint Security for Mac does not support the Right-Click Scan option. Configure an On-Demand Scan policy (Quick Scan) Configure an On-Demand Quick Scan policy settings for your managed Mac. 56 McAfee Endpoint Security for Mac Threat Prevention Product Guide

57 Managing the software with McAfee epo and McAfee epo Cloud Threat Prevention policy 8 For option definitions, click? in the interface. 1 Log on to the McAfee epo server as an administrator. 2 From the Policy Catalog, select Endpoint Security Threat Prevention as the product, then select On-Demand Scan as the category. 3 Click New Policy, type a name for the policy, then click OK. 4 Click the policy that you created, click the Quick Scan tab, then define these settings. In... Quick Scan Configure... Detect unwanted programs Enables the scanner to detect potentially unwanted programs. Decode MIME encoded files Scans Apple mail messages. Scan inside archives Scans the contents of compressed archive files. Scanning compressed archive files requires additional time. Find unknown program threats Detects files that contain code resembling malware. Find unknown macro threats Detects unknown macro threats. Scan Locations File Types to Scan Scan subfolders Examines all subfolders in the specified volumes when any of these options are selected. Home folder Temp folder File or folder All removable drives Select the directory from the Specify locations drop-down list. You can add directories by clicking. Click to remove the directory from scanning. All files Scans all files regardless of extension. McAfee strongly recommends that you enable All files to make sure that no malware threat resides in your managed Mac. Default and specified file types Scans files with extensions defined in the software and extensions you specify. For the list of the default and specified file types, see McAfee KnowledgeBase article KB Also scan for macros in all files Enables scanning for macros in all files. Specified file types only Scans only files with extensions that you specify. Select Include files with no extension to scan files that contains no extension. McAfee Endpoint Security for Mac Threat Prevention Product Guide 57

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide. McAfee VirusScan for Mac 9.8.0

Product Guide. McAfee VirusScan for Mac 9.8.0 Product Guide McAfee VirusScan for Mac 9.8.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS Intel

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0 Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

Product Guide. McAfee SaaS Endpoint Protection 5.2.0 Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Security for Microsoft SharePoint 2.5.0 User Guide

McAfee Security for Microsoft SharePoint 2.5.0 User Guide McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3

The client transfer between epo servers guide. McAfee Drive Encryption 7.1.3 The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -

More information

McAfee VirusScan Enterprise 8.8 software Product Guide

McAfee VirusScan Enterprise 8.8 software Product Guide McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0 Product Guide McAfee Security for Microsoft SharePoint 3.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Certified Product Specialist McAfee epolicy Orchestrator McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives

More information

McAfee Data Loss Prevention Endpoint 9.4.100

McAfee Data Loss Prevention Endpoint 9.4.100 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.4.100 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054,

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Technical Report Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp June 2015 TR-4286 Abstract An antivirus solution is key for enterprises

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Best Practices Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information