McAfee Client Proxy Software
|
|
- Elmer Ford
- 8 years ago
- Views:
Transcription
1 Product Guide McAfee Client Proxy Software For use with epolicy Orchestrator 4.6 Software
2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Client Proxy Software Product Guide
3 Contents Preface 5 About this guide Audience Conventions Abbreviations Find product documentation About McAfee Client Proxy 7 About McAfee Web Hybrid Enforcing security policies with McAfee Client Proxy The McAfee Client Proxy policy Proxy servers Bypass lists Block lists Customer ID and password Setting up McAfee Client Proxy with epolicy Orchestrator 13 Verify system requirements Install the McAfee Client Proxy extension Check in the McAfee Client Proxy client package to epolicy Orchestrator Select a policy Deploy McAfee Client Proxy with epolicy Orchestrator Configuring McAfee Client Proxy 17 Create a McAfee Client Proxy policy Create a policy Create a proxy server list Create a bypass list Create a block list Configure the client Import and export policy files Cancel policy enforcement A Manual deployment of McAfee endpoint software products 25 Deploying with Microsoft Systems Management Server Create an installation package Create the advertisement Create the SMS uninstall package Create an SMS uninstall package to run from a command line Index 29 McAfee Client Proxy Software Product Guide 3
4 Contents 4 McAfee Client Proxy Software Product Guide
5 Preface This guide provides the information you need for all phases of product use, from installation to configuration to troubleshooting. About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Security officers People who determine sensitive and confidential data, and define the corporate policy that protects the company's intellectual property. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis. Bold User input or Path Code Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program. A code sample. User interface Hypertext blue Words in the user interface including options, menus, buttons, and dialog boxes. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Client Proxy Software Product Guide 5
6 Preface Find product documentation Abbreviations This guide uses the following abbreviations: AD FTP HTTP / HTTPS LDAP NTLM SaaS SMS TCP VPN XML (Microsoft) Active Directory File Transport Protocol Hypertext Transfer Protocol / HTTP over Secure Sockets Lightweight Directory Access Protocol NT LAN Manager Software as a Service (specifically, McAfee SaaS Web Protection Service) (Microsoft) Systems Management Server Transmission Control Protocol virtual private network Extensible Markup Language Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Client Proxy Software Product Guide
7 1 About 1 McAfee Client Proxy McAfee Client Proxy software is a technology that enables the McAfee Web Hybrid Security solution. It is designed to extend network security solutions to users working outside the corporate network by redirecting web traffic and network communications from laptops and other computers that are used when disconnected from the corporate network. McAfee Client Proxy software extends traditional network security solutions such as McAfee Web Gateway to users working outside the corporate network. It can also be used to extend the McAfee SaaS Web Protection Service when that service is configured for network protection. In doing this, it answers the need to secure systems such as laptops that travel back and forth between the secured environment and an open environment. McAfee Client Proxy software is location aware, that is, software that recognizes its environment whether inside the corporate network, connected to the network by VPN, or external to the network. When inside a McAfee Web Gateway secured network, or connected to it by VPN, it remains passive and allows enforcement of security policies in the normal manner. When outside the network, it reroutes communication to McAfee SaaS Web Protection Service to provide the same protection. For enterprises protected with McAfee SaaS Web Protection Service, McAfee Client Proxy software can be set to always redirect to bypass the location detecting feature and only use McAfee SaaS Web Protection Service for enforcing security policies. McAfee Client Proxy software is tamper proof. A user cannot remove the software, or terminate or otherwise bypass the client process, without an administrator generated security key. Contents About McAfee Web Hybrid Enforcing security policies with McAfee Client Proxy The McAfee Client Proxy policy About McAfee Web Hybrid The McAfee Web Hybrid solution allows organizations to switch between network based and cloud based security solutions depending on the location of the protected computer. Organizations have been using web gateways and other network based protection mechanisms in their networks for years. These solutions don't solve the problem of protecting corporate equipment outside of the corporate network. When users take corporate equipment such as laptops on business travel, or to work from home, they leave the secure zone and are left with just the locally installed defenses on the laptop. The goal of the McAfee Web Hybrid solution is to leverage and synchronize the threat protection and internet access control capabilities of McAfee Web Gateway appliances and cloud based McAfee SaaS Web Protection Service and to allow organizations to switch between them dynamically and automatically depending on location. McAfee Client Proxy Software Product Guide 7
8 1 About McAfee Client Proxy Enforcing security policies with McAfee Client Proxy For more information on the McAfee SaaS Web Protection Service and McAfee Web Gateway appliances, and how to set them up to work with McAfee Client Proxy, see the McAfee Web Hybrid Deployment Guide. Enforcing security policies with McAfee Client Proxy A typical use case is using McAfee Client Proxy to enforce security policies when a computer travels out of the corporate network. McAfee Web Gateway appliances are widely used to apply network based security policies. McAfee Client Proxy client software can extend those policies to computers used outside the network. Figure 1-1 McAfee Client Proxy in a McAfee Web Hybrid Security solution Computer 1 is not connected to the corporate network. McAfee Client Proxy software is active and reroutes communications to McAfee SaaS Web Protection Service for enforcement of corporate web protection policies on the roaming laptop. Computer 2 is connected to the corporate network. McAfee Client Proxy software is passive and web traffic goes through the McAfee Web Gateway appliance for enforcement of corporate web protection policies. 8 McAfee Client Proxy Software Product Guide
9 About McAfee Client Proxy The McAfee Client Proxy policy 1 Using McAfee Client Proxy in a pure SaaS environment In many organizations, the McAfee SaaS Web Protection Service is used with network based security policies. For example, firewall redirection by transparent proxy or explicit proxy plus NTLM identification assume the user is inside the corporate network. Also, when computers are set up to connect to the cloud server from outside the network, it is relatively easy for a user to reset the designated proxy server in the browser settings, thus bypassing the security system. For these and other reasons, an organization might choose McAfee Client Proxy software as the mechanism for connecting to the McAfee SaaS Web Protection Service. To facilitate this, themcafee Client Proxy client configuration contains an option to Always redirect, making the software active both within and outside of the corporate network. The McAfee Client Proxy policy McAfee Client Proxy software does not define or enforce a security policy. It defines when and how to connect to a security server to apply the security policy. A McAfee Client Proxy policy consists of proxy server lists, bypass lists, and block lists. It also includes connection information and a user ID and password to identify which policies to apply. Data such as blocked/allowed categories and trusted/untrused hosts are synchronized with the McAfee Web Gateway appliance and McAfee SaaS Web Protection Service. Proxy servers McAfee Client Proxy redirects network traffic to McAfee Web Gateway or McAfee SaaS Web Protection Service servers for application of corporate security policies. McAfee Client Proxy software is location aware. When the client software determines that the computer is disconnected from the corporate network, it starts redirecting network traffic to proxy servers. When the McAfee Client Proxy client software determines that it is connected to the corporate network directly or through VPN, it works in bypass mode. This means that the client software intercepts the TCP connections but lets them pass to the original destination without modifying the traffic. The main goal of McAfee Client Proxy software is to redirect HTTP and HTTPS traffic to a McAfee Web Gateway or McAfee SaaS Web Protection Service server. As it redirects HTTP and HTTPS traffic, the client software adds metadata to the request. Identification token, Windows domain username (encrypted), and the list of Windows AD groups to which the logged on user belongs (encrypted) are examples of added metadata. This information is used by the McAfee Web Gateway to verify that McAfee Client Proxy is redirecting the data, and also to determine the policy rules that apply to the request based on the end user name and the AD groups to which the user belongs. The McAfee Client Proxy software can also redirect other protocols to proxy servers. The client software identifies protocols such as FTP and SNMP by their port number and redirects the data as is without adding any metadata to the traffic. Bypass lists To improve performance, McAfee Client Proxy maintains lists of web destinations and processes that do not need to be redirected. Redirection to a server enforcing a security policy carries a certain amount of overhead. Bypass lists ("ignore" lists) make the client proxy more transparent by only activating the redirection when necessary. You configure the bypass list from the Bypass List page in McAfee Client Proxy Settings. McAfee Client Proxy Software Product Guide 9
10 1 About McAfee Client Proxy The McAfee Client Proxy policy A bypass list is a list of domain names, network addresses, and network ports that the user can connect to directly, bypassing the security policy. When web destinations considered "safe" are placed on a bypass list, connecting to them does not activate redirection to the security policy server. The bypass list can also include process names used to connect to the internet that are considered safe. Use process bypass listing for VPN software, Microsoft update, and other processes that should be allowed to connect directly to the internet. A Common Catalog instance is created for each McAfee Client Proxy policy. When you edit the bypass list, you edit this instance, which is linked to the specific McAfee Client Proxy policy. You can bypass list HTTP requests by domain name, however, you cannot specify sub paths within the domain name. For example, if you add mcafee.com to the bypass list, you will also bypass redirection for protection/ and sales.mcafee.com. Common Catalog McAfee Common Catalog is an epolicy Orchestrator feature that acts as a repository for standard definitions used by multiple McAfee point products. McAfee Client Proxy uses four types of content from the Common Catalog to define bypass lists: Domain name Network address Network port Process name (.exe) A unique instance of the catalog for each McAfee Client Proxy policy is created automatically, and is edited on the Bypass List page. This catalog instance is linked to the McAfee Client Proxy policy. Block lists McAfee Client Proxy stores a list of applications that are blocked without reference to the security policy enforced by the cloud security server. A block list is a list of processes for which network communication is permanently blocked. You configure the blocklist from the Block List page in McAfee Client Proxy Settings. Using a block list reduces the need for redirection to the cloud server. On the other hand, it is an absolute list that might be more restrictive than the security policy if not designed carefully. Adding a process to the block list means that all ports used by the process are blocked except those redirected by the McAfee Client Proxy client. For example, in a standard configuration McAfee Client Proxy redirects ports 80 and 443 by default but other ports are not configured. In this situation, listing common browsers on the block list leads to HTTP/HTTPS traffic being redirected but any other traffic, such as FTP (port 21), being blocked. The Block List page gives the administrator three options: 10 McAfee Client Proxy Software Product Guide
11 About McAfee Client Proxy The McAfee Client Proxy policy 1 Allow traffic to go directly to the destination That is, no applications are blocked automatically and blocking policy is applied by the cloud security server. Block traffic for all processes Only processes specifically listed on the bypass list are allowed. We do not recommend using this option, as it can block all network connectivity, rendering the client computer unreachable by the security server and preventing the user from working on it. Block traffic only for the following processes A process list is created on the Block List page, and only those processes are blocked. Customer ID and password Identity is an integral part of security and policy decisions. McAfee Client Proxy software includes a customer ID in its policy definition. In order to determine which security policy to apply and when to apply it, McAfee Client Proxy software needs to identify the computer user. The customer ID is an XML file containing an ID number and a hashed password, provided by the McAfee Web Gateway or SaaS server administrator. Before defining a policy, the McAfee Client Proxy administrator must request the ID from the Saas or McAfee Web Gateway administrator. The exact details of how this ID is produced and distributed are beyond the scope of this document. The McAfee Client Proxy software browses to this XML file to insert the ID into the policy. McAfee Client Proxy Software Product Guide 11
12 1 About McAfee Client Proxy The McAfee Client Proxy policy 12 McAfee Client Proxy Software Product Guide
13 2 2 Setting up McAfee Client Proxy with epolicy Orchestrator McAfee Client Proxy software can be configured from McAfee epolicy Orchestrator or the McAfee SaaS Web Protection Service Control Console. Although other alternatives exist, the client software is typically distributed to client computers with epolicy Orchestrator. Contents Verify system requirements Install the McAfee Client Proxy extension Check in the McAfee Client Proxy client package to epolicy Orchestrator Select a policy Deploy McAfee Client Proxy with epolicy Orchestrator Verify system requirements The following hardware is recommended for running McAfee Client Proxy software version in McAfee epo. Table 2-1 Hardware requirements Hardware type Servers Run the McAfee epo server and McAfee Client Proxy server software. Client computers Run the McAfee Client Proxy client software. Specifications CPU Intel Pentium IV 2.8 GHz or higher RAM 1 GB minimum Hard Disk 80 GB minimum CPU Pentium III 1 GHz or higher RAM 1 GB minimum Hard Disk 200 MB minimum free disk space The following operating system software is currently supported. McAfee Client Proxy Software Product Guide 13
14 2 Setting up McAfee Client Proxy with epolicy Orchestrator Install the McAfee Client Proxy extension Table 2-2 Operating systems supported Computer type Servers Run the McAfee epo server and McAfee Client Proxy server software. Client computers Run the McAfee Client Proxy client software. Software Windows 2003 Server Standard (SE) SP1 or later 32 or 64 bit Windows 2003 Enterprise (EE) SP1 or later 32 or 64 bit Windows 2008 Server Enterprise 32 or 64 bit Windows XP Professional SP3 or later 32 bit Windows Vista SP2 or later 32 bit only Windows 7 SP1 or later 32 or 64 bit The user installing McAfee Client Proxy software on the epolicy Orchestrator servers must be a member of the local administrators group. Install the McAfee Client Proxy extension The McAfee Client Proxy extension creates and manages policies that define how and when endpoint computers redirect web connections for security policy enforcement. Before you begin Verify that the epolicy Orchestrator server name is listed under Trusted Sites in the Internet Explorer security settings. For option definitions, click? in the interface. 1 From the epolicy Orchestrator interface, select Menu Software Extensions, then click Install Extension. 2 Click Browse and select the McAfee Client Proxy.zip file (...\MCP_EPO_PACKAGE_1_0_0_xxx_x.zip). Click Open, then click OK. The installer contains the following: MCPSRVER1000 the McAfee Client Proxy epolicy Orchestrator extension corecatalog_1.0.0.xx a McAfee Common Catalog extension component catalogframework_1.0.0.xx a McAfee Common Catalog extension component HelpDeskTool_1.0.0.xxx the McAfee Help Desk extension; used to issue bypass release codes help_mcc_100_xxx McAfee Help module for Common Catalog help_mcp_100_xxx McAfee Help module for McAfee Client Proxy help_mhd_100_xxx McAfee Help module for Help Desk The installation dialog box displays the file parameters to verify that you are installing the correct extension. 3 Click OK. The extension is installed. 14 McAfee Client Proxy Software Product Guide
15 Setting up McAfee Client Proxy with epolicy Orchestrator Check in the McAfee Client Proxy client package to epolicy Orchestrator 2 Check in the McAfee Client Proxy client package to epolicy Orchestrator To use epolicy Orchestrator for McAfee Client Proxy client software deployment, check the client package into the McAfee epo master repository. For option definitions, click? in the interface. 1 From the McAfee epolicy Orchestrator interface, select Menu Software Master Repository. 2 In the master repository, select Actions Check In Package. 3 Select package type Product or Update (.ZIP), browse to...\mcp_1_0_0_xxx.zip, then click Next. The Check in Package page appears. 4 Review the details on the screen, then click Save. The package is added to the master repository. Select a policy You can deploy different McAfee Client Proxy policies to different computer groups. Select a policy for the group before setting up the deployment. Before you begin Create subgroups under My Organization in the System Tree. See the McAfee epolicy Orchestrator Product Guide for more information. For option definitions, click? in the interface. 1 From the McAfee epolicy Orchestrator interface, select Menu Systems System Tree. 2 In the System Tree, select the group or subgroup for policy assignment. 3 Select Assigned Policies. 4 From the Product list, select McAfee Client Proxy. The policy inherited from My Organization appears. 5 Click Edit Assignment. Select Break inheritance and assign the policy and settings below, then change the assigned policy (or create a New Policy) and click Save. Deploy McAfee Client Proxy with epolicy Orchestrator McAfee Client Proxy endpoint software and policies can be conveniently deployed to client computers using the epolicy Orchestrator deployment feature. Before you begin Check in the McAfee Client Proxy client software to the epolicy Orchestrator Master Repository. McAfee Client Proxy Software Product Guide 15
16 2 Setting up McAfee Client Proxy with epolicy Orchestrator Deploy McAfee Client Proxy with epolicy Orchestrator Optional: Create a subgroup in the epolicy Orchestrator System Tree for McAfee Client Proxy client computers. For option definitions, click? in the interface. 1 From the epolicy Orchestrator interface, select Menu System System Tree. 2 In the System Tree, select the subgroup level at which to deploy McAfee Client Proxy. Leaving the subgroup at My Organization deploys to all computers managed by McAfee epolicy Orchestrator. If you select a subgroup under My Organization, available computers appear in the right hand pane. You can also deploy McAfee Client Proxy to individual computers. 3 Click the Assigned Client s tab. Under Actions, select New Client Assignment. The Client Builder wizard opens. 4 In the Product field, select McAfee Agent. In the Type field select Product Deployment. Click Create New. 5 In the Name field, type a suitable name, for example, Deploy MCP to clients. Typing a description is optional. 6 In the Products and Components field, select McAfee Client Proxy xx. The Action field automatically resets to Install. 7 Click Save, then click Next. 8 Change the Schedule type to Run immediately. Click Next. 9 Review the task summary. When you are satisfied that it is correct, click Save. The task is scheduled for the next time the McAfee Agent checks for updates. To force the installation to take place immediately, issue an agent wake up call. After installation, the McAfee Client Proxy client starts running immediately without restarting the client computer. At this point, the client software runs without a policy file. It does not redirect data until it receives a policy file. 16 McAfee Client Proxy Software Product Guide
17 3 Configuring 3 McAfee Client Proxy McAfee Client Proxy extension is used to create policies that are deployed to the client computers. The McAfee Client Proxy policy lists servers the client computer can connect to for security policy enforcement when outside the corporate network. It defines which network ports are redirected to which servers, how the McAfee Client Proxy client software determines when it is in the corporate network or connected by VPN, and whether or not access protection is enabled. In addition, it defines a bypass list of network addresses and ports, domain names, and processes that are not redirected. Contents Create a McAfee Client Proxy policy Import and export policy files Cancel policy enforcement Create a McAfee Client Proxy policy You must configure the client and at least one proxy server in order to save and deploy a policy. The policy can also specify bypass and block lists. McAfee Client Proxy policies are configured and stored in the epolicy Orchestrator Policy Manager or in McAfee SaaS Web Protection Service web protection policies. s Create a policy on page 18 Policies are created and saved in the epolicy Orchestrator Policy Catalog or as McAfee SaaS Web Protection Service web protection policies. Create a proxy server list on page 18 McAfee Client Proxy software seeks proxy server connections from the server list when outside the corporate network. Create a bypass list on page 19 A bypass list is a set of web destinations that the user can connect to directly, bypassing the security policy. Create a block list on page 20 A block list contains a list of processes for which network communication is permanently blocked. Configure the client on page 21 Client configuration includes the corporate network detection and VPN detection specifications, customer ID parameters, logger settings, and access protection enabling. McAfee Client Proxy Software Product Guide 17
18 3 Configuring McAfee Client Proxy Create a McAfee Client Proxy policy Create a policy Policies are created and saved in the epolicy Orchestrator Policy Catalog or as McAfee SaaS Web Protection Service web protection policies. Before you begin Obtain a Unique User ID file. The ID file is provided by a McAfee Web Gateway or McAfee SaaS Web Protection Service administrator, and is required for saving a policy file. The ID file, which contains a hashed password, should be placed in a conveniently accessible location. Create a policy in epolicy Orchestrator For option definitions, click? in the interface. 1 From the epolicy Orchestrator interface, select Menu Policy Policy Catalog. 2 In the Product field, select McAfee Client Proxy. The default policy assignment appears. 3 Click a link to view/edit existing policy settings, or select Actions New Policy to create a new policy. Alternately, click Duplicate to make a copy of the McAfee Default policy to use as a starting point. See also Customer ID and password on page 11 Create a policy in McAfee SaaS Web Protection Service 1 From the McAfee SaaS Web Protection Service interface, select Web Protection Policies McAfee Client Proxy Policies. 2 Select a policy and click Edit to view/edit existing policy settings, or click New to create a new policy. Create a proxy server list McAfee Client Proxy software seeks proxy server connections from the server list when outside the corporate network. Before you begin See Create a policy to create a new policy, and for policy pre requisites. McAfee Client Proxy client software connects to proxy servers based on the order of the proxy server list. If connection to the first server on the list fails, the client software tries the second server, and so on through the list. If a connection is lost during transmission, the client software tries to reconnect beginning with the first server on the list. Order the proxy server list according to which servers you think will give the best service to the users of that particular policy. 18 McAfee Client Proxy Software Product Guide
19 Configuring McAfee Client Proxy Create a McAfee Client Proxy policy 3 1 Do one of the following: In the epolicy Orchestrator Client Proxy Settings pane, select Proxy Servers. In the McAfee SaaS Web Protection Service MCP Details Tab, click Proxy Servers. All definitions previously added to the proxy server list are displayed. 2 Configure each proxy server you want to add to the list. a b c In the Proxy Server Address field, type the IP or Hostname of a proxy server. In the Proxy Port field, enter a port. Select the HTTP/HTTPS checkbox, or change to non HTTP/HTTPS ports. For HTTP/HTTPS traffic, configure a McAfee Web Gateway appliance or the McAfee SaaS Web Protection Service service. For non HTTP/HTTPS protocols, make sure the server supports that protocol. When configuring McAfee Client Proxy software to redirect traffic to the McAfee SaaS Web Protection Service service, you must ensure that all end users have a SaaS account and that their SaaS user name (that is, address) is mapped to their Windows domain user name to allow authentication. Failure to do this results in all requests returning access_denied_error. 3 (Optional) Select the Bypass proxy server for local addresses option. 4 In epolicy Orchestrator, click Add. In McAfee SaaS Web Protection Service, click Save. See also Proxy servers on page 9 Create a bypass list A bypass list is a set of web destinations that the user can connect to directly, bypassing the security policy. Before you begin See Create a policy to create a new policy, and for policy pre requisites. When creating a bypass list in epolicy Orchestrator, use the Common Catalog to specify the list. McAfee Client Proxy uses only four of the definition types from the catalog: domain name, network address, network port, and process name. If you choose to duplicate a catalog, fill in the required information and click Continue to Bypass List. If you click Duplicate, you create a duplicate policy, not a duplicate catalog. Create a bypass list in epolicy Orchestrator 1 In the epolicy Orchestrator Client Proxy Settings pane, select Bypass List. All definitions previously added to the proxy server list are displayed. McAfee Client Proxy Software Product Guide 19
20 3 Configuring McAfee Client Proxy Create a McAfee Client Proxy policy 2 Select Actions Select from Catalog <definition type>, where <definition type> is one of the four Common Catalog types used by McAfee Client Proxy: domain name, network address, network port, or process name. All existing Common Catalog definitions of the type are displayed. 3 Select the required definition from the list and click OK. If the required definition does not exist, click New Item, fill in the form, then click Save. See also Bypass lists on page 9 Create a bypass list in McAfee SaaS Web Protection Service 1 In the McAfee SaaS Web Protection Service MCP Details Tab, click Bypass List. 2 Highlight a definition and click Edit, or click New to add a new definition. 3 Under Type, select the required definition from the list. 4 Under Value enter the value. 5 Click New to add more definitions. When you are finished, click Save. Create a block list A block list contains a list of processes for which network communication is permanently blocked. Before you begin See Create a policy to create a new policy, and for policy pre requisites. Using a block list reduces the need for redirection to the cloud server. On the other hand, it is an absolute list that might be more restrictive than the security policy if not designed carefully. For option definitions, click? in the interface. 1 Do one of the following: In the epolicy Orchestrator Client Proxy Settings pane, select Block List. In the McAfee SaaS Web Protection Service MCP Details Tab, click Block List. All definitions previously added to the block list are displayed. 20 McAfee Client Proxy Software Product Guide
21 Configuring McAfee Client Proxy Create a McAfee Client Proxy policy 3 2 Select the blocking action: (epolicy Orchestrator only) Allow traffic to go directly to destination That is, no processes are blocked automatically and blocking policy is applied by the cloud security server. Block traffic for all processes (except bypass listed processes) We do not recommend using this option, as it can block all network connectivity, rendering the client computer unreachable by the security server and preventing the user from working on it. Block traffic only for the following processes 3 If you selected the third option, edit the application list: (epolicy Orchestrator only) To add a process, type the name of the process in the Process Name field and click Add. Adding a process to the block list means that all ports used by the process are blocked except those redirected by the McAfee Client Proxy client or explicitly configured in the bypass list. To edit an existing process, click Edit, make the necessary changes in the Process Name field, then click OK. To delete a process, click Delete. The process is deleted without verification. 4 To edit the list in McAfee SaaS Web Protection Service, highlight an entry to edit it, or click New to add a new entry. 5 Click Save to save the changes. In epolicy Orchestrator you can alternately click Duplicate to create a duplicate policy with the changes. See also Block lists on page 10 Configure the client Client configuration includes the corporate network detection and VPN detection specifications, customer ID parameters, logger settings, and access protection enabling. Before you begin See Create a policy to create a new policy, and for policy pre requisites. Configure the client in epolicy Orchestrator 1 In the Client Proxy Settings pane, select Client Configuration. 2 In the Customer Identifier section, click Browse and select the XML file that includes the customer ID and password. Click Open. The Unique Customer ID and Shared Password fields are filled automatically. 3 In the Traffic Redirection Settings section, select the Redirect network traffic option for Web Hybrid operation or the Always redirect operation for pure SaaS customers. The Always redirect option overrides the corporate network and VPN detection settings. McAfee Client Proxy Software Product Guide 21
22 3 Configuring McAfee Client Proxy Create a McAfee Client Proxy policy 4 In the Corporate Network Detection section, select the method of network detection. For detection by testing connectivity to epolicy Orchestrator, keep the default selection. For corporate network detection without using epolicy Orchestrator, select the by testing connectivity option and create a server list. For each server: a b c In the Server Address field type the IP or Hostname of a server in the corporate network. Type the port in the Server Port field. Click Add. We recommend adding servers that do not use ports 80 or 443 to avoid conflicts with some captive portals that might intercept TCP connections to those ports and return OK even for non reachable IPs. 5 In the Corporate VPN Detection section, create a VPN server list. For each VPN server: a In the Server Address field, type the IP address or host name of a server in the corporate network. b c In the Server Port field, enter the port. Click Add. 6 In the Log File Settings section, select the required logging option. 7 In the Access Protection section, do the following: a Select Enable Access Protection. This prevents tampering with the process (MCPService), policy files, or registry keys. b Select Request Release key to allow the user to uninstall McAfee Client Proxy with an administrator issued release key. We recommend uninstalling the McAfee Client Proxy client with epolicy Orchestrator, but this is not always practical. The challenge response mechanism, similar to that used for cancelling policy enforcement, is provided for when it becomes necessary to uninstall the client in the field. Configure the client in McAfee SaaS Web Protection Service 1 In the McAfee SaaS Web Protection Service MCP Details Tab, click Details. 2 Select Enable Access Protection. This prevents tampering with the process (MCPService), policy files, or registry keys. 3 Under Client Logging, select the required logging option. 4 If you require redirection for corporate servers or VPN, click Redirection Settings, then select Enable. 5 Click New to add a corporate server or VPN. Type the IP address or host name under Server Address and enter a value for the port. Click Save. 22 McAfee Client Proxy Software Product Guide
23 Configuring McAfee Client Proxy Import and export policy files 3 Import and export policy files Policy files can be exported as readable XML files or as XML files for import to McAfee Client Proxy. These are not the same, and there are different procedures for achieving these goals. To save policy files in different formats, do one of the following. To save an OPG format file to deploy to clients: 1 From the Client Proxy Settings pane of the policy, select Actions Export Policy to File McAfee Client Proxy Client File. 2 In the File Download window, click Save. To create an XML file for import: To save a readable XML file: From the the Actions column on the Policy Catalog page, click Export. 1 From the Client Proxy Settings pane of the policy, select Actions Export Policy to File McAfee Client Proxy Server File. 2 Right click the link. 3 In the File Download window, click Save. Cancel policy enforcement The disable feature allows users to request temporary cancellation of policy enforcement for legitimate reasons. User request for a bypass key is initiated on the client computer. The administrator creates and issues the key, which is valid for a specified time period, using the McAfee Help Desk tool. 1 In the system tray, click the McAfee icon, then select Manage Features Request McAfee Client ProxyBypass. Figure 3-1 Requesting a bypass key The Enter Release Code window appears. McAfee Client Proxy Software Product Guide 23
24 3 Configuring McAfee Client Proxy Cancel policy enforcement 2 Send all information on the release code window, along with your system user name and address, to the McAfee Client Proxy administrator by phone, , instant messaging, or other method. Leave the window open. The Identification Code value changes each time you open the window, and must match the Release Code issued by the administrator. You can copy the identification code to another document, but you cannot edit it. Figure 3-2 Enter Release Code window 3 When the administrator sends a bypass key code, enter it in the Release Code field and click OK. McAfee Client Proxy is bypassed for the time period set by the administrator. 24 McAfee Client Proxy Software Product Guide
25 A Manual deployment of McAfee endpoint software products The preferred method of deployment of McAfee endpoint software products is with epolicy Orchestrator. However, various methods of manual deployment are possible in cases where deployment with epolicy Orchestrator is either unfeasible or not wanted. Deploying with Microsoft Systems Management Server As one example, this section describes deployment with Microsoft Systems Management Server (SMS) SMS provides a comprehensive solution for deploying and managing applications and operating systems on Windows computers and servers. When you use SMS for deployment rather than epolicy Orchestrator, you must manually install the policy (.opg) file as well. s Create an installation package on page 25 Create a package for installing a McAfee endpoint software product with Microsoft Systems Management Server. This procedure does not require epolicy Orchestrator. Create the advertisement on page 26 SMS packages need to be "advertised." This creates the SMS package advertisement. Create the SMS uninstall package on page 27 Create a package for uninstalling McAfee Data Loss Prevention Endpoint software with Microsoft Systems Management Server. This procedure does not require epolicy Orchestrator. Create an SMS uninstall package to run from a command line on page 27 Create a package for uninstalling McAfee endpoint software products that runs from a command line. Create an installation package Create a package for installing a McAfee endpoint software product with Microsoft Systems Management Server. This procedure does not require epolicy Orchestrator. Install Microsoft Visual C SP1 Redistributable Package (x86). The package can be downloaded from: familyid=200b2fd9 AE1A 4A14 984D 389C36F In the Systems Management Server console, right click Packages and select New Package. 2 In the General tab, type the Package Name (required), and the Version, Publisher and Language (optional). 3 In the Data Source tab, select This Package Contains Source Files, then click Set. McAfee Client Proxy Software Product Guide 25
26 A Manual deployment of McAfee endpoint software products Deploying with Microsoft Systems Management Server 4 In the Set Source Directory window under Source Directory Location, select the type of connection to the set up files in the source directory. Type the source directory path in the text box and click OK. 5 In the Distribution Settings tab, select High from the Sending Priority drop down list, and click OK. The package appears under the Packages node of the site tree. 6 Expand the new package under the Packages node. 7 Right click Distribution Points and select New Distribution Point. Select the server or servers you want to be the distribution points for this package, then click Finish. 8 Right click Programs and select New Program. Type the application name. 9 In the Command Line text box, type the McAfee DLP command line executable, for example: msiexec /I McpInstaller.msi /qn /forcerestart. The.msi file name is extracted manually from the McpInstaller.x86.exe file. We recommend restarting the managed computer after endpoint package installation. To enable this option use the /forcerestart parameter. To enable the installation log use /log <LogFile> 10 In the Environment tab, select Whether or not a user is logged on from the Program can run drop down list. Click OK. Verify that Run with Administrative Rights is selected. McAfee Data Loss Prevention Endpoint software setup requires administrator rights to complete installation successfully. Create the advertisement SMS packages need to be "advertised." This creates the SMS package advertisement. 1 In the Systems Management Server console, right click Advertisements and select New Advertisement. Type the advertisement name. 2 From the Package drop down list, select the McAfee endpoint product package name. 3 From the Program drop down list, select the McAfee endpoint product application name. 4 Click Browse and select the collection that the McAfee endpoint product installation package should apply to, then click OK. 5 In the Schedule tab, confirm the time that the advertisement is offered, specify if the advertisement should expire, and when. Click OK. 26 McAfee Client Proxy Software Product Guide
27 Manual deployment of McAfee endpoint software products Deploying with Microsoft Systems Management Server A Create the SMS uninstall package Create a package for uninstalling McAfee Data Loss Prevention Endpoint software with Microsoft Systems Management Server. This procedure does not require epolicy Orchestrator. 1 In the Systems Management Server console, right click Packages and select New Package. 2 In the General tab, type the Package Name (required), and the Version, Publisher and Language (optional). 3 In the Data Source tab, select This Package Contains Source Files, then click Set. 4 In the Set Source Directory window under Source Directory Location, select the type of connection to the set up files in the source directory. Type the source directory path in the text box and click OK. 5 In the Distribution Settings tab, select High from the Sending Priority drop down list, and click OK. The package appears under the Packages node of the site tree. 6 Expand the new package under the Packages node. 7 Right click Distribution Points and select New Distribution Point. Select the server or servers you want to be the distribution points for this package, then click Finish. 8 Right click Programs and select New Program. Type the program name. 9 In the Command Line text box, type the enpoint product command line executable, for example: msiexec /x DLPAgentInstaller.msi /qn /forcerestart The.msi file name is extracted manually from the endpoint product installer.exe file. 10 In the Environment tab, select Whether or not a user is logged on from the Program can run drop down list. Click OK. Create an SMS uninstall package to run from a command line Create a package for uninstalling McAfee endpoint software products that runs from a command line. 1 In the Systems Management Server console, right click Packages and select New Package. 2 In the General tab, type the Package Name (required), and the Version, Publisher and Language (optional). 3 In the Data Source tab, deselect This Package Contains Source Files, then click Set. 4 Locate the UninstallString for McAfee DLP Agent. a In the registry editor, go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion\Uninstall. b c Click through the entries to find DisplayName: McAfee Client Proxy. Copy the UninstallString, for example: MsiExec.exe /X{287AAE25 B0F4 4E9E A7FD 8EA81FF635E1} 5 To uninstall, use the command line: <uninstall string>/qn/forcestart McAfee Client Proxy Software Product Guide 27
28 A Manual deployment of McAfee endpoint software products Deploying with Microsoft Systems Management Server 28 McAfee Client Proxy Software Product Guide
29 Index A abbreviations used in this guide 6 about this guide 5 B block lists 10, 20 blocking processes 10, 20 bypass key 23 bypass list 9 bypass lists, configuring 19 C command line uninstall 27 Common Catalog 10 configuration 17 conventions and icons used in this guide 5 corporate network detection 21 customer ID 11, 21 D deploying MCP client 15 deploying, with epo 15 documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 E epo check in 15 epolicy Orchestrator 6, 7, 10, 13 15, 17, 21, 23 H hardware requirements 13 I installing MCP software 14 L logging 21 M McAfee SaaS Web Protection 6, 7, 9, 11, 18, 21 McAfee ServicePortal, accessing 6 McAfee Web Gateway 6, 7, 9, 11, 18, 21 MCP endpoint deploying with SMS 25 uninstall with SMS 27 MCP manager 17 Microsoft update 9 O overview 7 P policies creating 17 importing and exporting 23 selecting 15 processes, blocking 10, 20 proxy server list 18 proxy servers 9 S server software requirements 13 ServicePortal, finding product documentation 6 SMS advertisements 26 SMS installation package, creating 25 SMS uninstall package, command line 27 SMS uninstall package, creating 27 supported operating systems 13 system requirements 13 T Technical Support, finding product information 6 V VPN 6, 7, 9, 17 VPN detection 21 W web hybrid 7 web hybrid security diagram 7 McAfee Client Proxy Software Product Guide 29
30 00
McAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationInstallation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationIntegration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Encryption 7.0
Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee
More informationProduct Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Policy Auditor 6.2.0 software Installation Guide
McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationInstallation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationAbout Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
More informationBest Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationProduct Guide. McAfee epolicy Orchestrator 5.3.0 Software
Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationepolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMigration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x
Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationInstallation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationMcAfee Data Loss Prevention 9.3.0
Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances
Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationVirtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationAdministrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances
Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationProduct Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0
Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationBest Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationMcAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationProduct Guide. McAfee epolicy Orchestrator 5.0.0 Software
Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationBest Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationMcAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationMcAfee Drive Encryption 7.1.0
Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Drive Encryption 7.1
Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationInstallation Guide. McAfee Vulnerability Manager 7.5
Installation Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
More informationInstallation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Enterprise Mobility Management 12.0 Software
Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationAdministration Guide. McAfee SaaS Email Archiving
Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Endpoint Encryption for PC 6.2
EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
More informationMcAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationPOC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting
More informationProduct Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
More informationMcAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationMcAfee VirusScan Enterprise for Storage 1.1.0
Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationMcAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee Directory Services Connector extension
Setup Guide Revision B McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 and later COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationMcAfee Host Intrusion Prevention 8.0.0 Patch 6 Software
Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More information