Migration Guide Revision A. McAfee and Web Security McAfee Web Gateway 7.x

Size: px
Start display at page:

Download "Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x"

Transcription

1 Migration Guide Revision A McAfee and Web Security McAfee Web Gateway 7.x

2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

3 Contents Preface 5 About this guide Audience Conventions What's in this guide Find product documentation Introduction 7 Why you need to migrate your web scanning settings About McAfee Web Gateway Understand the differences between the products Compare rules-based and policy-based configuration methods Available operational modes Prepare for the migration process 11 View the product documentation McAfee and Web Security documentation McAfee Web Gateway documentation Review your McAfee and Web Security policies before migrating Review default McAfee Web Gateway rule sets and rules Comparable features and settings Unavailable features and settings Determine your physical or virtual appliance Determine your hardware platform Review the network placement Suggested migration setup Back up existing configurations 19 Back up the McAfee and Web Security configuration Back up the McAfee Web Gateway configuration Create your McAfee Web Gateway configuration 21 Configure the initial McAfee Web Gateway settings Before you begin Create your initial policy Configure proxy settings Configure authentication and access management Configure basic anti-virus settings Use an existing anti-virus rule set Configure URL filtering settings Create a new rule set for URL filtering settings Index 35 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 3

4 Contents 4 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

5 Preface This guide discusses information that you need to know when you are manually migrating your web scanning settings from your McAfee and Web Security version 5.6 appliance to your McAfee Web Gateway version 7.x. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Security officers People who determine sensitive and confidential data, and define the corporate policy that protects the company's intellectual property. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis. Bold User input or Path Code Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program. A code sample. User interface Hypertext blue Words in the user interface including options, menus, buttons, and dialog boxes. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 5

6 Preface Find product documentation Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. What's in this guide This guide is organized to help you find the information you need. Information about the compatible hardware platforms on which each product can run Discussion about the differences between the products Considerations before you attempt to manually migrate your web scanning settings Information about the settings that can be manually migrated Information about settings that are not compatible across the products Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

7 1 1 Introduction Learn about McAfee Web Gateway as you prepare to manually migrate your web configuration settings from your McAfee and Web Security appliances to your McAfee Web Gateway. Contents Why you need to migrate your web scanning settings About McAfee Web Gateway Understand the differences between the products Why you need to migrate your web scanning settings McAfee and Web Security appliances provide and web scanning at your Internet gateway. McAfee Web Gateway provides comprehensive web security for your network. As McAfee continues to develop products to combat the threats to your organization, the McAfee and Web Security product range has now had its web protection features removed and its scanning features enhanced. The name has changed to McAfee Gateway to reflect this change of emphasis. To migrate both and web scanning away from McAfee and Web Security, you need to configure two appliances: McAfee Gateway to scan your traffic, and McAfee Web Gateway to scan your web traffic. About McAfee Web Gateway Deployed on-premises with appliances or in a virtual environment, McAfee Web Gateway offers powerful, proactive protection against zero-day threats, spyware, and targeted attacks. A McAfee Web Gateway appliance is installed as a gateway that connects your network to the web and filters the web traffic that leaves and enters your network. Following the implemented web security rules, McAfee Web Gateway filters the requests that users send to the web from within your network and the responses that are sent back from the web. Embedded objects sent with requests or responses are also filtered. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 7

8 1 Introduction Understand the differences between the products Malicious and inappropriate content is blocked, while useful matter is allowed to pass through. Figure 1-1 Filtering web traffic McAfee Web Gateway offers many web scanning features that are not available within McAfee and Web Security appliances. These include: HTTPS traffic scanning Anti-malware engine which combines behavioral scanning with signature scanning of web traffic. Robust application control More authentication options Understand the differences between the products Although designed to perform similar roles, the McAfee and Web Security and McAfee Web Gateway appliances have differences in the way that they operate. These differences include: Policies or rules-based configuration Available operational modes Compare rules-based and policy-based configuration methods The two products under discussion use different methodologies to configure their scanning settings. The scanning settings used by McAfee and Web Security and McAfee Web Gateway are not directly equivalent. McAfee and Web Security uses policies to configure your and web scanning parameters. Using policies allows a number of settings to be easily configured and deployed for specific circumstances, and for a new policy to be quickly configured for any additional circumstances as they arise. McAfee Web Gateway uses rule sets and rules to configure your web scanning parameters. Using a rules-based approach provides much greater flexibility when creating and fine-tuning your configuration to exactly match your web scanning requirements. You need to understand your McAfee and Web Security web scanning policies and your specific web scanning requirements in order to work out how best to implement these requirements using McAfee Web Gateway rules. 8 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

9 Introduction Understand the differences between the products 1 Available operational modes The operational mode you select when installing your appliance dictates the way that your appliance is connected to your network. You can configure an McAfee and Web Security appliance to use one of these operational modes: Explicit proxy Transparent router Transparent bridge You can configure McAfee Web Gateway to use one of these operational modes: Proxy Transparent router Proxy and WCCP Transparent bridge Proxy HA McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 9

10 1 Introduction Understand the differences between the products 10 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

11 2 Prepare 2 for the migration process Prepare to manually migrate your web configuration and settings from your McAfee and Web Security appliance, and onto your McAfee Web Gateway appliance. Due to the complexity of each customers individual web scanning policies within McAfee and Web Security, it is impossible to give exact step-by-step instructions about moving your web scanning settings from your McAfee and Web Security appliance to your McAfee Web Gateway. This document provides information about performing example tasks that will be useful in helping you to migrate your own McAfee and Web Security policies into McAfee Web Gateway. Contents View the product documentation Review your McAfee and Web Security policies before migrating Review default McAfee Web Gateway rule sets and rules Comparable features and settings Unavailable features and settings Determine your physical or virtual appliance Suggested migration setup View the product documentation To become familiar with the configuration of both products, locate and read the product documentation for both the McAfee and Web Security and McAfee Web Gateway products. McAfee and Web Security documentation Locate and read the product documentation for McAfee and Web Security appliances. From the McAfee and Web Security user interface, click the context-sensitive Help. Help icon to view the The product guide and other McAfee and Web Security documentation can also be found at: Select from the drop-down lists: Select a Product and Web Security Appliance Software Select a Version and Web Security Appliance Software 5.6 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 11

12 2 Prepare for the migration process Review your McAfee and Web Security policies before migrating McAfee Web Gateway documentation Locate and read the product documentation for McAfee Web Gateway products. From the McAfee Web Gateway user interface, click the Gateway Product Guide. Help icon to view the McAfee Web The product guide and other McAfee Web Gateway documentation can also be found at: You need to provide your user name and password to access this website. Review your McAfee and Web Security policies before migrating Due to the differences between policies and rules, and the efforts required to migrate policies into rule sets, take time to review your existing policies, checking to see if any are no longer used, or if they do not work in quite the way you expect. By better understanding your McAfee and Web Security policies, you can make better decisions re-creating your existing functionality, because there are often multiple ways to create rules in Web Gateway that achieve similar results. Consider, for example, that you are planning on setting up different URL categorizations for specific users or groups of users. If this is for a single user or group, or for a small number of users or groups, and the URL categorizations only contain minor deviations from a common list, it is easiest to create a specific rule permitting those users or groups access to a specific URL categorization list. However, if you have many users or groups, or you are using many URL categorization lists, it might be clearer and more efficient to create a separate rule for each user or group, and maintain separate URL categorization lists for each user or group. Review default McAfee Web Gateway rule sets and rules Save time re-creating equivalent McAfee and Web Security policies by reviewing the pre-defined McAfee Web Gateway rule sets and rules. Depending on the options you select when you first install your McAfee Web Gateway, you will be presented with a number of pre-defined rule sets and rules. You can use the policy creation wizard to create a web security policy for your network, according to your selections. You can also choose not to make any selections and have a default policy implemented. McAfee Web Gateway includes many pre-defined rule sets. These pre-defined rule sets are available from within the user interface, from the Policy Rule Sets tab. To access them, click the Add button, then select Rule Set from Library. It might be simpler and faster to use an existing rule set or rule, or to modify an existing rule set or rule to meet your scanning objectives. You can also download pre-defined rule sets from the Online Rule Set Library, available from: contentsecurity.mcafee.com/ruleset_library To learn about rule sets, rules, settings, and lists within McAfee Web Gateway, see the Rules and rule sets chapter and Appendix: Configuration lists within the McAfee Web Gateway Product Guide. 12 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

13 Prepare for the migration process Comparable features and settings 2 Comparable features and settings Understand the type of settings that you can manually migrate from your McAfee and Web Security appliance to your McAfee Web Gateway. The majority of the configurations, features and settings from your McAfee and Web Security appliance either have directly comparable settings, or settings that can be re-created in other ways within McAfee Web Gateway. As the number of these comparable features is very large, it is not feasible or helpful to list them all within a document of this type. Instead, the features and settings that are not comparable are called out separately. Unavailable features and settings The majority of configurations, features, and settings from your McAfee and Web Security appliance either have directly comparable settings, or settings that can be re-created in other ways within McAfee Web Gateway. The following table shows McAfee and Web Security features and settings that are not directly comparable on McAfee Web Gateway. Table 2-1 Unavailable features and settings McAfee and Web Security path System Appliance Management UPS Settings System Appliance Management General System Appliance Management System Administration Each time you apply your configuration changes. System Appliance Management Remote Access System Appliance Management Remote Access Feature name Uninterruptible Power Supply (UPS) integration Fiber Network Interface Cards Rescue image Configuration comments Secure Shell (SSH) configuration available within the user interface Internet Protocol (IP) -based Access Control Lists available from the user interface Note Currently, McAfee Web Gateway does not support the integration of information from UPS systems. Currently, McAfee Web Gateway only uses copper NICs, not fiber-optic NICs. When installing McAfee Web Gateway, there is no rescue image saved to the hard disk. McAfee recommends that you keep an archived copy of the software, together with regular configuration backups available for disaster recovery. Within McAfee and Web Security, each time you apply any configuration changes, you are prompted to provide a comment on the changes you have made. This feature is not available within McAfee Web Gateway. The McAfee and Web Security user interface includes options for configuring SSH access to the appliance. SSH configuration is not included in the user interface, as it is configured during the initial setup of your McAfee Web Gateway. Although there is not a directly comparable feature available within McAfee Web Gateway, you can re-construct similar functionality using Configuration Network Protection rules. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 13

14 2 Prepare for the migration process Unavailable features and settings Table 2-1 Unavailable features and settings (continued) McAfee and Web Security path System Appliance Management Remote Access Web Web Policies Scanning Policies Anti-Virus Automatic features when installing new scanning blades into a configured McAfee Content Security Blade Server. System Users, Groups and Services Directory Services System Users, Groups and Services Role-Based User Accounts Feature name Out-of-Band NIC De-obfuscated content can be passed to further filters Blade automated installs and cluster membership LDAP configuration Note McAfee and Web Security enables you to configure management of the appliance via an additional, out-of-band network interface. This feature can be implemented within McAfee Web Gateway by binding the user interface to a specific IP address. McAfee Web Gateway uses its composite opener properties to define the exact file type for embedded content. When installing additional blades onto a McAfee Content Security Blade Server running McAfee and Web Security software, the new blade is automatically installed and joined to the scanning cluster. This feature is not available within McAfee Web Gateway. The McAfee and Web Security user interface queries LDAP to allow drop-down list selection of LDAP groups. McAfee Web Gateway uses text box entry only. Web Web Policies Scanning Policies Anti-Virus Basic Options Web Web Policies Scanning Policies Anti-Virus Basic Options Web Web Policies Scanning Policies Anti-Virus Packers Web Web Configuration HTTP Protocol Settings Find all macros and treat as infected, and Remove all macros GTI Sensitivity level Packer Detection HTTP Scanning Requests McAfee and Web Security enables you to select to scan just the Request Headers, the Request Body, or both. McAfee Web Gateway does not provide these exact options. You cannot select the GTI Sensitivity level for file reputation within McAfee Web Gateway. This setting is fixed at or equivalent to the "High" level. McAfee Web Gateway does not provide the same level of granularity for these options as McAfee and Web Security. McAfee Web Gateway scans both the headers and body of HTTP Scanning Requests. Web Web Configuration HTTP Protocol Settings HTTP Scanning Responses McAfee and Web Security enables you to select to scan just the Response Headers, the Response Body, or both. McAfee Web Gateway scans both the headers and body of HTTP Scanning Responses 14 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

15 Prepare for the migration process Determine your physical or virtual appliance 2 Determine your physical or virtual appliance Depending on your chosen migration path from McAfee and Web Security to McAfee Web Gateway and whether you are implementing these within a virtual environment or on hardware appliances, you may consider re-imaging your current hardware with the McAfee Web Gateway software. You can configure McAfee Web Gateway on a new physical or a virtual appliance, or, depending on the age and model of your existing McAfee and Web Security appliance, you may be able to re-image your existing appliance. During the manual migration process, we recommend that you have both products running side-by-side, so that you can compare settings. You can also have both products running within a virtual environment. The following table shows the hardware models that are compatible with the McAfee Web Gateway software. Table 2-2 Hardware compatibility Hardware model Used on McAfee and Web Security model Compatible with McAfee Web Gateway Intel SR or 3100 Compatible Intel SR Compatible Intel SR Compatible Intel SR Compatible HP BL460 McAfee Content Security Blade Server Compatible Dell CR or 3100 Hardware requires a BIOS update Dell R Hardware requires a BIOS update Dell R or 3400 Hardware requires a BIOS update All other hardware platforms used by the McAfee and Web Security product range Virtual image running on: VMware vsphere 4.x, or VMware vsphere Hypervisor (ESXi) 4.x McAfee and Web Security Virtual Appliance Not compatible New hardware is required, or McAfee Web Gateway can be run within a virtual environment. See the McAfee Web Gateway product documentation for further information. Compatible McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 15

16 2 Prepare for the migration process Determine your physical or virtual appliance Determine your hardware platform Determine the hardware platform used on your existing McAfee and Web Security appliance. Task 1 Log on to your McAfee and Web Security appliance. 2 Click About the Appliance. The About the Appliance dialog box is displayed: The hardware platform is reported. Review the network placement Confirm that your McAfee Web Gateway appliance is positioned within your network in the optimal configuration. When you added a McAfee and Web Security appliance into your network, you needed to consider its placement so as to optimize the scanning of both and web traffic. Before adding a new McAfee Web Gateway or re-imaging an existing appliance with the McAfee Web Gateway software, give consideration to the optimal configuration within your network for scanning web traffic. Refer to the McAfee Web Gateway Product Guide for further information. 16 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

17 Prepare for the migration process Suggested migration setup 2 Suggested migration setup Prepare for your migration by setting up your hardware. McAfee recommends that you do the following: Have your McAfee and Web Security appliance (either hardware-based, or a virtual appliance) running. Have your McAfee Web Gateway appliance (either hardware-based, or a virtual appliance) running in its default configuration, and test that everything is working as expected. This includes configuring network connectivity and authentication settings. You can create your McAfee Web Gateway configuration on a virtual appliance, then back up and restore the configuration to physical appliances at a later date. Back up both your McAfee and Web Security and McAfee Web Gateway appliances, so that you can roll back to a known, working environment if needed. Have both product user interfaces visible, either within separate browsers or browser tabs, or by arranging the monitors and keyboards so that the products are side-by-side. This will make it easier to see the comparable pages of both interfaces when migrating your settings. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 17

18 2 Prepare for the migration process Suggested migration setup 18 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

19 3 Back 3 up existing configurations Before starting to manually create a McAfee Web Gateway configuration that replicates your McAfee and Web Security policies, back up the configurations for both products. This allows you to reconfigure either product to a known working state if needed. Contents Back up the McAfee and Web Security configuration Back up the McAfee Web Gateway configuration Back up the McAfee and Web Security configuration Before attempting to migrate any setting from your McAfee and Web Security appliance, ensure that you back up your configurations. This allows you to roll back to a known working state if needed. Task 1 Select System System Administration Cluster Management Backup and Restore Configuration. 2 If needed, select the Include the Data Loss Prevention database and Include TLS certificates and private keys options. If you select Include TLS certificates and private keys, you also have the option of entering and confirming a Private key passphrase. 3 Click Backup Configuration. 4 When prompted, click on the link to download the configuration backup file to your local file system. Back up the McAfee Web Gateway configuration The McAfee Web Gateway configuration, including rules, lists, settings, and administrator accounts, can be stored in a backup file. Complete the following procedure to back up or restore the appliance configuration: Task 1 Select Troubleshooting Backup/Restore. 2 Under Backup Policy, Configuration, and Accounts, click Backup to file. A window opens to let you select a file for storing the configuration. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 19

20 3 Back up existing configurations Back up the McAfee Web Gateway configuration 20 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

21 4 4 Create your McAfee Web Gateway configuration Become familiar with the tasks needed to re-create your web scanning settings on McAfee Web Gateway. Setting can be re-created in a number of different ways; the simplest is often the easiest to understand and maintain. Many of these tasks are examples, and exact values are used for illustrative purposes only. Contents Configure the initial McAfee Web Gateway settings Configure basic anti-virus settings Configure URL filtering settings Configure the initial McAfee Web Gateway settings Configure the basic settings on your McAfee Web Gateway to allow your web traffic to be scanned. Before re-creating your McAfee and Web Security settings, you must create an initial policy on your McAfee Web Gateway and configure proxy and caching settings, authentication, and access management. Ensure that you import and activate a valid license for your McAfee Web Gateway, as you will be unable to perform some tasks without a license. Before you begin Ensure that you correctly install the McAfee Web Gateway appliance (either as a hardware appliance, or a virtual appliance within a virtual environment.) Refer to Chapter 2 Setup and Logon, within the McAfee Web Gateway Product Guide for more information about installing and carrying out the installation and initial configuration on your McAfee Web Gateway. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 21

22 4 Create your McAfee Web Gateway configuration Configure the initial McAfee Web Gateway settings Create your initial policy The first time you log on to the McAfee Web Gateway user interface, a policy creation wizard allows you to select initial policy options or accept the default policy. In the wizard window, do one of the following to implement a policy: Select values for organization, location, and a level of permission or restriction. Then click OK. A web security policy is implemented accordingly. Your location and organization selections are used to implement standard whitelists and recommended blocking lists. Your selection regarding permission or restriction is used to implement filtering rules. Click Default. A default web security policy is implemented. Figure 4-1 Policy creation dialog box Configure proxy settings Before re-creating your McAfee and Web Security policies within McAfee Web Gateway, you should configure your proxy settings. Refer to Chapter 3 Proxies and caching, within the McAfee Web Gateway Product Guide for more information about configuring the operational mode and related settings on your McAfee Web Gateway. Wherever possible, use similar settings to those on your McAfee and Web Security appliance. For example, if your McAfee and Web Security appliance is currently running in Explicit Proxy mode, configure your McAfee Web Gateway to do the same unless you have a reason to change the mode. The default HTTP Proxy ports are different: McAfee and Web Security defaults to port 80, and McAfee Web Gateway defaults to port You will need to either change the McAfee Web Gateway HTTP Proxy port to 80, or change the ports on all client machines ports to use McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

23 Create your McAfee Web Gateway configuration Configure basic anti-virus settings 4 Configure authentication and access management To use many of the powerful web traffic scanning features included within McAfee Web Gateway, you must first set up authentication services and configure access management on your McAfee Web Gateway. Some information about your existing authentication services and access management can be found within the McAfee and Web Security user interface, in: System Users, Groups and Services Directory Services System Users, Groups and Services Web User Authentication System Users, Groups and Services Policy Groups System Users, Groups and Services Role-Based User Accounts Refer to Chapter 5 Authentication and access management, within the McAfee Web Gateway Product Guide for more information about configuring authentication services and related settings on your McAfee Web Gateway. Configure basic anti-virus settings Both McAfee and Web Security and McAfee Web Gateway provide anti-virus scanning options. Review the anti-virus settings in the two appliances: McAfee and Web Security Select Web Scanning Policies, then click the top link under Anti-Virus. The Default Anti-Virus Settings window appears. McAfee Web Gateway Anti-virus settings are configured in the Gateway Anti-Malware rule set by default. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 23

24 4 Create your McAfee Web Gateway configuration Configure basic anti-virus settings Use an existing anti-virus rule set Add a pre-defined rule set to provide anti-virus scanning capabilities. Before you begin Take the time to locate a suitable rule set from the Rule Set Library. Figure 4-2 Default Rule Sets This example is for illustrative purposes; your initial configurations already contains a rule set that includes rules for anti-virus detection. 24 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

25 Create your McAfee Web Gateway configuration Configure basic anti-virus settings 4 Task 1 Select Policy. 2 From Rule Sets, click Add Top Level Rule Set and select Import rule set from Rule Set Library. The Add from a Rule Set Library dialog box is displayed. 3 Locate Gateway Anti-Malware from the Rule Set Library. When you select a rule set, information about the rules contained within it are displayed. Also, information about any conflicts between the selected rules and any rules within your current configuration are also displayed. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 25

26 4 Create your McAfee Web Gateway configuration Configure basic anti-virus settings 4 Resolve any conflicts. Conflicts arise when a rule set uses configuration objects, such as lists or settings, that already exist in an appliance configuration. You can do resolve conflicts by clicking Auto-Solve Conflicts or by clicking the manually selecting the required resolution. icons and then 5 When all conflicts have been resolved (noted by the icon appearing next to each rule), click OK. The selected rule set is added to your configuration. Details of each rule contained within the rule set are displayed on-screen. 6 Move the Gateway Anti-Malware rule set to the end of the list of rule sets. By listing your rule sets from the least-to-most resource intensive, any actions against the web object are carried out by the first, and least resource-intensive rule that applies to that object. Tasks Edit the pre-defined rule set on page 26 You can make changes to a pre-defined rule set to better match your scanning requirements. Edit a pre-defined rule on page 27 You can make changes to a pre-defined rule in a rule set to better match your scanning requirements. Edit the pre-defined rule set You can make changes to a pre-defined rule set to better match your scanning requirements. Before you begin Perform Use an existing Anti-Virus rule set. In this example, we will disable a rule contained within the rule set and change the order of the included rules. 26 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

27 Create your McAfee Web Gateway configuration Configure basic anti-virus settings 4 Task 1 Select Policy Rule Sets. 2 Select Gateway Anti-Malware rule set. The rules within the selected rule set are displayed. 3 Perform the appropriate action. To disable a rule, deselect the checkbox next to the rule. To change the order of rules within a rule set, select the rule, then click the Move up or Move down arrows. Edit a pre-defined rule You can make changes to a pre-defined rule in a rule set to better match your scanning requirements. Before you begin Perform the Use an existing anti-virus rule set. Task 1 Select the rule to be edited. For this example, we will change the rule Block If Virus was Found to edit the Scanning Engines and Behavior. 2 Click Edit. The Edit Rule dialog box is displayed. 3 Click Rule Criteria. 4 Select the Antimalware.Infected property. Click Edit. 5 In the Edit Criteria dialog box, select Property. 6 Under Settings: (For 'Anti-Malware'), click Edit. The Edit Settings dialog box is displayed. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 27

28 4 Create your McAfee Web Gateway configuration Configure URL filtering settings 7 In Settings content, select Layered coverage: Full McAfee coverage plus specific Avira engine features - minor performance impact. 8 In Mobile Code Behavior, move the slider one division to the right, to increase the Classification threshold accuracy. This setting reduces the "false positive" detections, but might let some mobile code threats through. 9 Click OK. 10 Click OK. 11 Click Finish. 12 Click Save Changes. Configure URL filtering settings Both McAfee and Web Security and McAfee Web Gateway provide many URL filtering options. Review the URL filtering settings in the two appliances: McAfee and Web Security Select Web Scanning Policies, then click the links under Web Reputation and Categorization. McAfee Web Gateway URL filtering settings are configured in the URL Filtering rule set by default. For this exercise, we will create a new rule set and rules to add URL filtering into the McAfee Web Gateway configuration. Create a new rule set for URL filtering settings You can create a new rule set within McAfee Web Gateway to contain the configuration for URL filtering. A similar procedure can be followed to create other rule sets. Refer to Chapter 4 - Rules and rule sets, within the McAfee Web Gateway Product Guide for more information about rules and rule sets, and the importance of correctly positioning the rule sets within the rule set tree. Table 4-1 Example values for the new rule set Field Name Enable Applies to Apply this rule set Comment Example value URL Filter settings Checked (by default) Requests (and IM) Always URL filtering for the user group "strict_internet" Task 1 Select Policy Rule Sets. 2 On the rule set tree, navigate to the position where you want to insert the new rule set. 28 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

29 Create your McAfee Web Gateway configuration Configure URL filtering settings 4 3 Above the rule set tree, click Add Rule Set. The Add New Rule Set dialog box opens. 4 Configure the following general settings for the rule set: Name Name of the rule set Enable When selected, the rule set is enabled Applies to Select if the rules within this rule set apply to Requests (and IM), Responses and Embedded Objects Apply this rule set Choose if this rule set is always used, or is only used if defined criteria are met [Optional] Comment Plain-text comment on the rule set 5 Click OK to add the rule set to the rule set tree. 6 Move the rule set towards the end of the list of rule sets. By listing your rule sets from the least-to-most resource intensive, any actions against the web object are carried out by the first, and least resource-intensive rule that applies to that object. 7 Click Save Changes. A new rule set, without any included rules, is created and added to the rule set tree. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 29

30 4 Create your McAfee Web Gateway configuration Configure URL filtering settings Tasks Create a new rule to specify URL filtering on page 30 You can create a new rule within an existing McAfee Web Gateway rule set. Define criteria for the rule on page 31 You can define criteria to further refine a rule. Specify the action on page 32 A rule must have an action that is applied when the rule is triggered. Define events for the rule on page 33 Specify alerts, reports, and other data to help you better configure and monitor your scanning configurations. Create a new rule to specify URL filtering You can create a new rule within an existing McAfee Web Gateway rule set. Before you begin Ensure that you have selected the rule set to which you intend adding this rule. This could be a rule set you have just created, or an existing rule set within your McAfee Web Gateway configuration. This task demonstrates how to create a rule to block access to Internet sites with a bad reputation. A similar procedure can be followed to create other rules. Table 4-2 Example values for the new rule set Field Name Comment Enable rule Apply this rule Example value Block sites with Bad Reputation Block sites with Bad Reputation Selected (by default) Select If the following criteria is matched 30 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

31 Create your McAfee Web Gateway configuration Configure URL filtering settings 4 Task 1 Select the rule set that will contain the new rule. 2 Click Add Rule. The Add Rule dialog box opens. 3 Name the rule, and optionally add a comment to help identify the rule. 4 Click Finish to add the rule to the selected rule set, or Next to define the criteria for this rule. Define criteria for the rule You can define criteria to further refine a rule. This process assumes you have created a rule, but have not yet defined the criteria or lists that the rule will use. This example rule is created as a complex rule; there are two sets of criteria, connected using "OR" logic. Table 4-3 Example values for the rule criteria Field First criteria Property Operator Parameter Value Second criteria Property Operator Parameter Value Example value URL.IsHighRisk Refer to Appendix: Configuration lists in the McAfee Web Gateway Product Guide for a list of available Property values. equals true URL.IsMediumRisk equals true McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 31

32 4 Create your McAfee Web Gateway configuration Configure URL filtering settings Task 1 Select the rule set from within the rule set tree. 2 Select the required rule, then click Edit. 3 In the left pane, select Rule Criteria. 4 In the right pane, select Apply this rule: If the following criteria is matched. 5 Click Add to create the first criteria. The Add Criteria dialog box is displayed. 6 In Property, search for the McAfee Web Gateway property that you want to match against. 7 Select the required Operator. 8 In Parameter, select Value. 9 Click OK to close the Add Criteria dialog box. To create a complex rule, add more rule criteria. Select OR. Click Finish and Save Changes when you have added the required criteria. Specify the action A rule must have an action that is applied when the rule is triggered. Table 4-4 Example values for the rule action Field Action Settings Example value Block Refer to Appendix: Configuration lists in the McAfee Web Gateway Product Guide for information about the available actions. URL Blocked Task 1 Select the rule set from within the rule set tree. 2 Select the required rule, then click Edit. 32 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

33 Create your McAfee Web Gateway configuration Configure URL filtering settings 4 3 In the left pane, select Action. The Action dialog box is displayed. 4 From the Action drop-down list, select an action. 5 From the Settings drop-down list, select your required options. 6 Click Finish. 7 Click Save Changes. Define events for the rule Specify alerts, reports, and other data to help you better configure and monitor your scanning configurations. Table 4-5 Example values for the rule events Field Event Example value Statistics.Counter.Increment (String, Number) Refer to Appendix: Configuration lists in the McAfee Web Gateway Product Guide for information about the available actions. Parameters Parameter 1: CounterName(String) Value is BlockedByURLFilter Parameter 2: Value (Number) Value is 1 Task 1 Select the rule set from within the rule set tree. 2 Select the required rule, then click Edit. McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 33

34 4 Create your McAfee Web Gateway configuration Configure URL filtering settings 3 In the left pane, select Events. The Events dialog box is displayed. 4 Click Add Event. 5 Select the required Event: from the drop-down list. 6 Click Parameters. 7 Specify your required parameters. 8 Click OK. 9 Click OK. 10 Click Finish. 11 Click Save Changes. 34 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

35 Index A about McAfee and Web Security 7 about McAfee Web Gateway 7 about this guide 5 action specify 32 anti-virus configure 23 B back up configuration McAfee and Web Security 19 back up configurations 19 back up McAfee Web Gateway 19 basic McAfee Web Gateway configuration 21 C configure anti-virus 23 configure URL filtering 28 conventions and icons used in this guide 5 create a new rule set 28 creating web scanning settings 21 D default rule sets and rules 12 determine hardware platform 16 documentation audience for this guide 5 product 11 product-specific, finding 6 typographical conventions and icons 5 E events specify 33 existing configurations back up 19 existing policies review 12 F features not compatible 13 H hardware platform determine 16 I incompatible features 13 M McAfee and Web Security about 7 back up configuration 19 McAfee ServicePortal, accessing 6 McAfee Web Gateway about 7 back up 19 McAfee Web Gateway configuration basic 21 N network location 16 P product differences 8 product documentation 11 R review existing policies 12 rule editing 27 rule set create 28 editing 26 use existing 24 rule sets and rules default 12 S ServicePortal, finding product documentation 6 settings migrated 13 settings not migrated 13 specify action 32 McAfee and Web Security McAfee Web Gateway 7.x Migration Guide 35

36 Index specify events 33 T W what's in this guide 6 Technical Support, finding product information 6 U URL filtering configure McAfee and Web Security McAfee Web Gateway 7.x Migration Guide

37

38

39

40 A00

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Drive Encryption 7.1

McAfee Drive Encryption 7.1 Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee GTI Proxy 1.0.0 Administration Guide

McAfee GTI Proxy 1.0.0 Administration Guide McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Enterprise Security Manager 9.3.2

McAfee Enterprise Security Manager 9.3.2 Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains

More information

Product Guide. McAfee VirusScan for Mac 9.8.0

Product Guide. McAfee VirusScan for Mac 9.8.0 Product Guide McAfee VirusScan for Mac 9.8.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS Intel

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installation Guide Revision A. McAfee Web Gateway 7.4.0

Installation Guide Revision A. McAfee Web Gateway 7.4.0 Installation Guide Revision A McAfee Web Gateway 7.4.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Risk Advisor 2.7

McAfee Risk Advisor 2.7 Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Setup Guide Revision B McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 and later COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Encryption 7.0

McAfee Endpoint Encryption 7.0 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

McAfee Policy Auditor 6.2.0 software Installation Guide

McAfee Policy Auditor 6.2.0 software Installation Guide McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Email Gateway 7.6.400 VMtrial Appliances

McAfee Email Gateway 7.6.400 VMtrial Appliances Installation Guide Revision D McAfee Email Gateway 7.6.400 VMtrial Appliances COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

McAfee Threat Intelligence Exchange 1.0.1 Software

McAfee Threat Intelligence Exchange 1.0.1 Software Release Notes McAfee Threat Intelligence Exchange 1.0.1 Software Contents About this release Installation instructions New features Resolved issues Known issues Product documentation About this release

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

McAfee Advanced Threat Defense 3.6.0

McAfee Advanced Threat Defense 3.6.0 Release Notes McAfee Advanced Threat Defense 3.6.0 Revision C Contents About this release New Features Enhancements Resolved issues Installation and upgrade notes Known issues Product documentation About

More information

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

Administration Guide. McAfee SaaS Email Archiving

Administration Guide. McAfee SaaS Email Archiving Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying

More information

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Installation Guide. McAfee Vulnerability Manager 7.5

Installation Guide. McAfee Vulnerability Manager 7.5 Installation Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Network Security Platform 7.5

Network Security Platform 7.5 M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information