Release Notes McAfee Risk Advisor Software For use with epolicy Orchestrator and Software
|
|
- Brenda Riley
- 8 years ago
- Views:
Transcription
1 Release s McAfee Risk Advisor Software For use with epolicy Orchestrator and Software About this document New features System Requirements Supported Upgrades Installing and verifying the extension Resolved issues Known issues Finding product documentation About this document Thank you for choosing McAfee Risk Advisor This document contains important information about this release. We strongly recommend that you read the entire document. Caution McAfee strongly recommends that you use any pre-release software (Beta or Evaluation build) in a test environment only. Pre-release software should not be installed in a production environment. We do not support automatic upgrading of an earlier version to a pre-release version of the software. New features New and updated features in the current release of the software are described below: Feature Ability to query application inventory Description McAfee Risk Advisor users can query application inventory using the following pre-defined queries: In Application Inventory query group: Inventory of All Applications Query for the existence of selected applications across all assets. Inventory of Applications on each Asset Query for ALL or selected applications from an Asset. Top 10 Applications on Desktop Query for the top 10 most prevalent applications found on all desktops. Top 10 Applications on Server Query for the top 10 most prevalent applications found on all servers. In Risk Advisor query group: MRA: Top 10 Prevalent Applications across Threats Query for the top 10 most prevalent applications across threats. Quick Search in Vulnerability Centric View Reduced time taken to complete McAfee Risk Advisor users can search for specific vulnerabilities using the filters such as Vulnerability, Description, CVE References, Threat Name, and Threat Vendor fields. McAfee Risk Advisor users can perform the risk analysis task faster during
2 the analytics Backward compatibility with the McAfee Application Inventory plugin for McAfee Risk Advisor subsequent runs. For details about performance improvement in this release, refer to the MRA Database Sizing and Resource Usage Guide. McAfee Risk Advisor server supports the systems with McAfee Risk Advisor Application Inventory plug-in. System Requirements This release supports a full installation of the product as well as an upgrade from McAfee Risk Advisor 2.6.x. Supported McAfee epolicy Orchestrator version(s): epolicy Orchestrator 4.5 epolicy Orchestrator 4.6 Supported Database: Microsoft SQL 2005 and above Caution McAfee Risk Advisor may not function properly if Microsoft SQL 2005 is running in SQL 2000 Compatibility Mode. Any customization to the Microsoft SQL Server installation should follow the best practice guidelines provided by the database vendor. McAfee Risk Advisor does not support the use of SQL Express. SQL Server's Full Text Search service must be running prior to the upgrade and epolicy Orchestrator database user should have permission to use the service. The Full Text Search service is used in Application Data Reconciliation. Rollup reporting requirements The versions of the master and slaves need to be same. This is consistent to the epolicy Orchestrator Rollup reporting functionality. Hence, the following epolicy Orchestrator master slave combinations are supported: Master 4.6.x, Slaves 4.5.x Master 4.6.x, Slaves 4.6.x Master 4.5.x, Slaves 4.5.x The following McAfee Risk Advisor versions are supported: Master 2.6.x, Slaves 2.6.x Disk Space Requirements McAfee Risk Advisor requires a minimum of 4 GB free disk space on the database where McAfee Risk Advisor files are to be stored. The required disk space also depends upon the number of assets being managed by epolicy Orchestrator server. For database sizing guidelines, refer to the MRA Database Sizing and Resource Usage Guide.
3 Supported Upgrades You can upgrade to McAfee Risk Advisor from the following versions: McAfee Risk Advisor McAfee Risk Advisor Installing and verifying the extension Task 1 Close the epolicy Orchestrator console. 2 Run the installation program for McAfee Risk Advisor, Setup.exe. 3 In the Setup Requirements screen, verify that the message All required applications were found appears, then click Next. If this message does not appear, cancel the installation and install the applications specified, then run the McAfee Risk Advisor installation program again. 4 In the Welcome screen, click Next to continue. 5 From the drop-down lists, select a license type and the location where the product will be used. 6 Select I accept the terms in the license agreement, then click OK. 7 If this is an upgrade, skip to the next step. Otherwise, the Choose Destination Folder screen appears. Accept the default location or browse to another location, then click Next. Make sure that no MRA task is running while doing an upgrade. 8 In the Set Administrator Information screen, provide the epolicy Orchestrator global administrator user name and password, then click Next. 9 From the list that appears in the Set Optional Information screen, select the appropriate options and click Next. Options are: Products Select the point-products from which you want McAfee Risk Advisor to import data, or click Select All for all available point-product extensions. Risk Advisor Rollup Reporting extension for epo Select this for Rollup Reporting. Application Awareness Select this to allow considering Application Inventory agent data during risk analysis. Select all the point-products you want, even if you didn't select them during your previous installation. Data import extensions for the products that are not selected are uninstalled. 10 In the Start Copying Files screen, review your installation settings, then click Next to begin installation. 11 When the upgrade is complete, click Finish. 12 Verify that McAfee Risk Advisor is upgraded with all the features selected during installation. To verify that McAfee Risk Advisor was successfully upgraded, click Menu Software Extensions, select Risk Advisor from the Extensions list, then verify that the version number is Verify that the data import extensions selected during installation are available under Risk Advisor. For example, MRA Foundstone, MRA HIPS, MRA Network Security Manager, MRA Policy Auditor, MRA VSE, MRA Solidcore, MRA Rollup Reporting, and MRA Application Inventory. If application awareness was selected during installation, verify that The Application Inventory extension is installed. The MRA Application Inventory extension is installed under Risk Advisor.
4 The McAfee Application Inventory package is installed under Menu Software Master Repository. Resolved issues Here is a list of issues from previous releases of the software that have been fixed in this release. 1 Issue MRA Rollup: Roll Up Risk Advisor Data task fails intermittently on epolicy Orchestrator Issue NSM countermeasure declaration doesn't happen automatically from NSM alerts data. Known issues Here is a list of known issues in this release of the software. 1 Issue McAfee Risk Advisor installation fails when epolicy Orchestrator and SQL server are configured with different database collations. Workaround Configure epolicy Orchestrator and SQL Server to the same database collation, and then install McAfee Risk Advisor. 2 Issue The results for Quick Find search using special characters are not retained when a user revists the results page. Workaround Click Clear and perform the search again. 3 Issue The install log files/folders are still mentioned as MRA 260. Finding product documentation Finding product documentation McAfee provides the information you need during each phase of product implementation, from installing to using and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access user documentation To access the KnowledgeBase 1 Click Product Documentation. 2 Select a Product, then select a Version. Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 3 Select a product document. COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
5 LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationMcAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
More informationMcAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationepolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationRecommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationRelease Notes for McAfee VirusScan Enterprise for Storage 1.0
Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document
More informationMcAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
More informationApplication Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
More informationTotal Protection Service
User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationRelease Notes for Host Intrusion Prevention 8.0
Release Notes for Host Intrusion Prevention 8.0 About this document New features Known issues Finding product documentation About this document Thank you for choosing this McAfee product. This document
More informationProduct Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationTotal Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationImplementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationInstallation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationInstallation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationMcAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x
McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee Solidcore 5.1.0 Product Guide
McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
More informationInstallation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationApplication Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to
More informationVerizon Internet Security Suite Powered by McAfee User Guide
Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationProduct Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationFor a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.
McAfee VirusScan Enterprise 8.7i Repost Patch 5 Release Notes Thank you for using McAfee software. This document contains important information about the current release. We strongly recommend that you
More informationMcAfee Host Intrusion Prevention 8.0.0 Patch 6 Software
Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Security for Microsoft SharePoint 2.5.0 User Guide
McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
More informationMcAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6
McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationRelease Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS
Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS - About this Document - About this Release - Purpose
More informationMicrosoft SQL 2008 / R2 Configuration Guide
TM Triple Crown Microsoft SQL 2008 / R2 Configuration Guide Revised June 11, 2013 2013 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationProduct Guide. McAfee SaaS Endpoint Protection 5.2.0
Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee VirusScan Enterprise 8.8 software Product Guide
McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationBest Practices Guide. McAfee Endpoint Protection for Mac 1.1.0
Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee VirusScan Enterprise 8.8 software Installation Guide
McAfee VirusScan Enterprise 8.8 software Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Data Loss Prevention Endpoint 9.3.416
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.3.416 For use with McAfee epolicy Orchestrator Contents About this release Resolved issues Installation instructions Known issues Find product
More informationRelease Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.
Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -
More informationNetwork Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1
Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0
McAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationInstallation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationMcAfee UTM Firewall Control Center Product Guide. version 2.0
McAfee UTM Firewall Control Center Product Guide version 2.0 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationPerformance Optimizer 1.0.0 Software
Product Guide Performance Optimizer 1.0.0 Software For use with epolicy Orchestrator 4.6.6-5.1.1 Introduction The Performance Optimizer analyzes the performance of your McAfee epolicy Orchestrator (McAfee
More informationHow To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationBest Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Best Practices Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationInstallation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Host Intrusion Prevention 8.0 Product Guide for use with epolicy Orchestrator 4.5
McAfee Host Intrusion Prevention 8.0 Product Guide for use with epolicy Orchestrator 4.5 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationAbout Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
More informationFeith Rules Engine Version 8.1 Install Guide
Feith Rules Engine Version 8.1 Install Guide Feith Rules Engine Version 8.1 Install Guide Copyright 2011 Feith Systems and Software, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationSQL Server 2008 R2 Express Edition Installation Guide
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
More informationMcAfee Data Loss Prevention Endpoint 9.4.0
Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.4.0 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues
More informationSetup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
More informationMcAfee Policy Auditor 6.2.0 software Installation Guide
McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationLepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited
Installation Guide Lepide Event Log Manager , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the copyright laws. This
More informationCompatibility with Encryption Products
Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint
More informationInstalling Sage ACT! 2013 for New Users
Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationFAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1
FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1 2011 Sage Software, Inc. All rights reserved. Published by Sage 2325 Dulles Corner
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More information