McAfee Drive Encryption 7.1
|
|
- Patience Tyler
- 7 years ago
- Views:
Transcription
1 Scripting Guide McAfee Drive Encryption 7.1 For use with epolicy Orchestrator and Software
2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Drive Encryption 7.1 Scripting Guide
3 Contents Preface 5 About this guide Audience Conventions What's in this guide Find product documentation Introduction 7 Purpose of this guide Web API commands for Drive Encryption 9 Using Web API commands for Drive Encryption Add a user or a user group to a system or branch Remove a user or a user group from a system or branch Change a user password Export disk encryption key(s) for a system Generate a Challenge Response Code Reset self recovery for a user User Directory Management (Non LDAP) 15 Web API commands for the User Directory Help command Index 19 McAfee Drive Encryption 7.1 Scripting Guide 3
4 Contents 4 McAfee Drive Encryption 7.1 Scripting Guide
5 Preface This guide provides the information you need to configure, use, and maintain your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Users People who use the computer where the software is running and can access some or all of its features. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Drive Encryption 7.1 Scripting Guide 5
6 Preface Find product documentation What's in this guide This guide is organized to help you find the information you need. Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Drive Encryption 7.1 Scripting Guide
7 1 1 Introduction McAfee Drive Encryption 7.1 introduces Web API commands that add scripting and automation capabilities to these management activities: Add or remove a user(s) from a system(s) Export disk encryption key(s) for a system Perform user directory management (Non LDAP) Generate a Challenge Response Code Change a user password Reset self recovery for a user Purpose of this guide This guide provides the Web API commands that you need to configure, use, and maintain Drive Encryption. This guide is a companion document to the McAfee epolicy Orchestrator Scripting Guide (4.6.x and 5.1.x). The scripting functionalities of Drive Encryption 7.1 are supported only from the McAfee epo 4.6 version onwards. The McAfee epo Scripting Guide describes the McAfee epo Web API and how to use it. It also provides example scripts using the Python client. For more information about Web API basics, see the McAfee epo Scripting Guide. McAfee Drive Encryption 7.1 Scripting Guide 7
8 1 Introduction Purpose of this guide 8 McAfee Drive Encryption 7.1 Scripting Guide
9 2 Web API commands for Drive Encryption Scripts using the Web API can be run from any computer that can connect to the McAfee epo server. For security reasons, they should not be run on the same computer as the McAfee epo server itself. The Web API is used primarily for two purposes: Scripting sequences of tasks Performing simple tasks without using the user interface Contents Using Web API commands for Drive Encryption Add a user or a user group to a system or branch Remove a user or a user group from a system or branch Change a user password Export disk encryption key(s) for a system Generate a Challenge Response Code Reset self recovery for a user Using Web API commands for Drive Encryption A few Web API commands are more commonly used than others. Being familiar with their syntax will help you create scripts quickly. The following tables list the commonly used commands with their syntax and description. The examples in this guide are taken from different categories of tasks that show how scripting can help keep your Drive Encryption maintained and up-to-date. Before running any commands, you must authenticate with an McAfee epo server. If you use Python to change passwords or export machine keys, make sure that CREATE_LOG_FILE is not enabled in debug mode. When it is enabled, passwords and machine keys are logged to the file in plain text, making it a security risk. If you need to enable it, execute the command on a secure system, then make sure to shred the log file to prevent unauthorized users from accessing your passwords and machine keys. McAfee Drive Encryption 7.1 Scripting Guide 9
10 2 Web API commands for Drive Encryption Add a user or a user group to a system or branch Add a user or a user group to a system or branch The Drive Encryption software can be activated on a client system only after adding a user and enforcing the required encryption policies correctly. Use the eeadmin.assignuser command to add a user or a user group to a system or branch in McAfee epo. Table 2-1 eeadmin.assignuser command Command Syntax Description eeadmin.assignuser eeadmin.assignuser systemnode=<> nodeid=<> dn=<> [recursive=<>] [ldapservername=<>] Specify systemnode='true' to indicate that nodeid=computer Id refers to an McAfee epo System, or systemnode='false' to indicate that nodeid=branch Id refers to an McAfee epo Branch. Pass the Distinguished Name (DN) of the LDAP User or User Group to add accordingly. For LDAP Group addition, optionally specify: recursive='true' to recursively add all subgroups, or recursive='false' to avoid recursive addition (defaults to False) You must specify the LDAP server name, if more than one server is in use in your organization; otherwise it is optional. Remove a user or a user group from a system or branch Use the eeadmin.deassignuser to remove a user or a user group from a system or branch in McAfee epo. Table 2-2 eeadmin.deassignuser command Command Syntax Description eeadmin.deassignuser eeadmin.deassignuser systemnode=<> nodeid=<> dn=<> dntype=<> Specify systemnode='true' to indicate that nodeid=computer Id refers to an McAfee epo System, or systemnode='false' to indicate that nodeid=branch Id refers to an McAfee epo Branch. Pass the DN of the user or user group to remove accordingly. Specify whether the DN refers to a User, User Group, or Organizational Unit (OU) (1=User, 2=User Group,3=OU). This is required to make sure that you do not have to run an overloaded LDAP query to process this command. 10 McAfee Drive Encryption 7.1 Scripting Guide
11 Web API commands for Drive Encryption Change a user password 2 Change a user password Resetting or changing a remote user's password token requires an authorization from administrator. The eeadmin.changeuserpassword command allows the administrator to change the user password remotely. Table 2-3 eeadmin.changeuserpassword command Command Syntax Description eeadmin.changeuserpassword eeadmin.changeuser Password userdn=<> newpassword=<> [oldpassword=<>] If you specify the correct old password, the user's password is changed successfully. If you specify an incorrect old password, the command fails and leaves the existing password unchanged. If you don't specify the old password, users are reinitialized, leading to the loss of token, logon, Single-Sign-On (SSO), Self-Recovery, and password history data. This requires the users to reinitialize their data at next logon. Export disk encryption key(s) for a system The purpose of encrypting the client's data is to control access to the data by controlling access to the encryption keys. These keys are referred to as Machine Keys. Each system has its own unique Machine Key. The Machine Key is stored in McAfee epo database to be used for client recovery when required. McAfee Drive Encryption 7.1 Scripting Guide 11
12 2 Web API commands for Drive Encryption Generate a Challenge Response Code Use the eeadmin.exportmachinekey command to remotely export disk encryption key(s) for a system. Table 2-4 eeadmin.exportmachinekey command Command Syntax Description eeadmin.exportmachinekey eeadmin.exportmachinekey [machineidorname=<>] [keycheck=<>] [oldkeys=<>] A system may be activated and deactivated multiple times. Each activation produces a new disk encryption key. Specify the following: the McAfee epo System ID or McAfee epo System Name to export disk encryption key(s) for a specific system, or a disk Key-Check value to look up the encryption key related to the disk This lookup might take some time and the Key-Check value can be obtained for a disk from DETech. The encryption key of a disk might not be the same as the encryption key of a system. This is applicable when the disk is removed from the (encrypted) system prior to a deactivation/reactivation. Specify oldkeys= True to export all disk encryption keys related to the system. Generate a Challenge Response Code If the user's password or logon tokens have been lost, you need to perform administrator recovery on the client computer to recover the user or system. User calls the administrator to perform the administrator recovery, and provides the Challenge Code. The administrator initiates the McAfee epo Scripting API to generate the Challenge Response Code. A valid Response Code is supplied by the scripting API to the administrator. When typing the Response Code, access is granted to the Client system. Use the eeadmin.administratorrecovery command to generate the Challenge Response Code. There are four different administrator recovery types: machinerecovery='1' resetusertoken='2' 12 McAfee Drive Encryption 7.1 Scripting Guide
13 Web API commands for Drive Encryption Reset self recovery for a user 2 unlockdisableduser='3' reserusertopasswordtoken='4' Table 2-5 machinerecovery recovery type Command Syntax Description eeadmin.administratorrecovery eeadmin.administratorrecovery challengecode=<> Specify recoverytype='1', to perform Machine Recovery. recoverytype=<> Table 2-6 resetusertoken recovery type Command Syntax Description eeadmin.administratorrecovery eeadmin.administratorrecovery challengecode=<> recoverytype=<> userdn=<> Specify recoverytype='2' and pass the Distinguished Name (DN) of the user, to perform the Reset User Token Recovery. Table 2-7 unlockdisableduser recovery type Command Syntax Description eeadmin.administratorrecovery eeadmin.administratorrecovery challengecode=<> recoverytype=<> userdn=<> Specify recoverytype='3' and pass the Distinguished Name (DN) of the user, to perform the Unlock Disabled User Recovery. Table 2-8 resetusertopasswordtoken recovery type Command Syntax Description eeadmin.administratorrecovery eeadmin.administratorrecovery challengecode=<> recoverytype=<> userdn=<> Specify recoverytype='4' and pass the Distinguished Name (DN) of the user, to perform the Reset User To Password Token Recovery. Reset self recovery for a user The client user's self-recovery details can be reset remotely, then the user can enroll the self-recovery details with new self-recovery answers. Use the eeadmin.resetselfrecovery command to reset your self recovery details. Table 2-9 eeadmin.resetselfrecovery command Command Syntax Description eeadmin.resetselfrecovery eeadmin.resetselfrecovery userdn=<> Pass the Distinguished Name (DN) of the user to reset your self recovery token. McAfee Drive Encryption 7.1 Scripting Guide 13
14 2 Web API commands for Drive Encryption Reset self recovery for a user 14 McAfee Drive Encryption 7.1 Scripting Guide
15 3 User Directory Management (Non LDAP) The User Directory feature utilizes the LDAP Sync extension and provides the ability for Drive Encryption to use users/groups from the User Directory (using the UserDirectory.zip extension). Contents Web API commands for the User Directory Help command Web API commands for the User Directory Once you install the UserDirectory.zip extension into the McAfee epo server, you can create users and groups, and manage them using these Web API commands, without requiring to register an LDAP server in McAfee epo. This allows the EEPC 5.x.x standalone users, who are not part of any LDAP server to be migrated to Drive Encryption 7.1. Command Syntax userdirectory.addeditattribute userdirectory.addeditattribute itemid=<> or itemdn=<> stringattributes=<> itemid=<> Refers to the item(s) whose attributes need to be edited. stringattributes=<> Name of the attribute(s) that needs to be edited or added. userdirectory.additem userdirectory.deleteitem userdirectory.getattribute userdirectory.additem parentdn/parentid=<> itemname=<> itemtype<> userdirectory.deleteitem itemdn/itemid=<> userdirectory.getattribute itemdn/itemid=<> attribname=<> parentdn/parentid=<> The Parent DN/ ID can be taken from the database or the user interface. itemname=<> Name of the item itemtype=<> User or Group itemdn/itemid=<> Refers to the item that needs to be deleted. itemdn/itemid=<> Refers to the item whose attribute details are retrieved. attribname=<> Name of the attribute. McAfee Drive Encryption 7.1 Scripting Guide 15
16 3 User Directory Management (Non LDAP) Web API commands for the User Directory Command userdirectory.deleteattribute userdirectory.enableitem userdirectory.moveitem userdirectory.renameitem userdirectory.searchitems Syntax userdirectory.deleteattribute itemdn/itemid=<> attribname=<> userdirectory.enableitem itemid/itemdn=<> enabled=<> userdirectory.moveitem itemdn/itemid=<> parentfqdn/parentid=<> userdirectory.renameitem itemdn/itemid=<> newname=<> userdirectory.searchitems rootid/rootdn=<> searchstring=<> recursive=<> itemdn/itemid=<> Refers to the item whose attribute needs to be deleted. attribname=<> Name of the attribute that needs to be deleted. itemid/itemdn=<> Refers to the item that needs to be enabled/disabled. enabled=<> True enables the item. False disables the item. itemdn/itemid=<> Refers to the item that needs to be moved. parentfqdn/parentid=<> Parent FQDN/ ID can be taken from the database or the user interface. itemdn/itemid=<> Refers to the item that needs to be renamed. newname=<> Refers to the new name for the item This command performs a search on the user directory. This command is different from the other commands with these 3 parameters, which are optional. rootdn or rootid The FQDN/ ID can be taken from the database or the user interface. searchstring String criteria of the search. It returns all items that contain the search string. recursive This is either "True" or "False". It defines if this search should be done recursively. It is default to be False if any parameter is not set. There are seven different scripts for the search item function. 16 McAfee Drive Encryption 7.1 Scripting Guide
17 User Directory Management (Non LDAP) Help command 3 Help command You can use the Help command to get the structure for any command. For example, to export disk encryption key for a system, use the command mc.help ("eeadmin.exportmachinekey") to get the structure of the command. McAfee Drive Encryption 7.1 Scripting Guide 17
18 3 User Directory Management (Non LDAP) Help command 18 McAfee Drive Encryption 7.1 Scripting Guide
19 Index A about this guide 5 add a user or a user group to a system or branch 10 API 7 C change a user password 11 conventions and icons used in this guide 5 D documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 E export disk encryption key(s) for a system 11 H help command 17 M P plain text 9 python client 7 R remove a user or a user group from a system or branch 10 S scripts 9 self-recovery 11 ServicePortal, finding product documentation 6 single-sign-on 11 T Technical Support, finding product information 6 token 11 U user interface 9 W what's in this guide 6 McAfee ServicePortal, accessing 6 McAfee Drive Encryption 7.1 Scripting Guide 19
20 00
McAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationThe client transfer between epo servers guide. McAfee Drive Encryption 7.1.3
The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationepolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationIntegration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Client Proxy 1.0.0 Software
Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Endpoint Encryption 7.0
Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Drive Encryption 7.1.0
Product Guide McAfee Drive Encryption 7.1.0 For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationBest Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Data Loss Prevention 9.3.0
Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Drive Encryption 7.1.0 Software
Best Practices Guide McAfee Drive Encryption 7.1.0 Software For use with epolicy Orchestrator 4.6.7 and 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationProduct Guide. McAfee epolicy Orchestrator 5.3.0 Software
Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationMcAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationSetup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
More informationInstallation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Directory Services Connector extension
Setup Guide Revision B McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 and later COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMigration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x
Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationProduct Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Endpoint Encryption for PC 6.2
EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
More informationBest Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationBest Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationProduct Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0
Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationInstallation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Enterprise Mobility Management 12.0 Software
Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationProduct Guide. McAfee Application Control 6.1.0
Product Guide McAfee Application Control 6.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot,
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Endpoint Encryption for PC 7.0
EETech User Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationProduct Guide. McAfee epolicy Orchestrator 5.0.0 Software
Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Endpoint Encryption 7.0 Patch 1 Software
Best Practices Guide McAfee Endpoint Encryption 7.0 Patch 1 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationAdministrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances
Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationInstallation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances
Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee VirusScan Enterprise for Storage 1.1.0
Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationAdministration Guide Revision E. Account Management. For SaaS Email and Web Security
Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Policy Auditor 6.2.0 software
McAfee Policy Auditor 6.2.0 software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationMcAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationAdministration Guide. McAfee SaaS Email Archiving
Administration Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,
More informationProduct Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0
Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationInstallation Guide. McAfee epolicy Orchestrator 5.3.0 Software
Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationVirtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationRecommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
More informationAdministration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationMcAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee Policy Auditor 6.2.0 software Installation Guide
McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationAdministration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationRelease Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
More informationMcAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationProduct Guide. McAfee VirusScan for Mac 9.8.0
Product Guide McAfee VirusScan for Mac 9.8.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS Intel
More informationMcAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationInstallation Guide Revision A. McAfee Web Gateway 7.4.0
Installation Guide Revision A McAfee Web Gateway 7.4.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationInstallation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationProduct Guide. McAfee Vulnerability Manager 7.5
Product Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationProduct Guide. McAfee Agent 4.8.0
Product Guide McAfee Agent 4.8.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationMcAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
More informationMcAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
More informationMcAfee Cloud Identity Manager
SharePoint Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationProduct Guide. McAfee Agent 5.0.1. For use with McAfee epolicy Orchestrator
Product Guide McAfee Agent 5.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationInstallation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More information