Release Notes McAfee Vulnerability Manager 7.5.4

Size: px
Start display at page:

Download "Release Notes McAfee Vulnerability Manager 7.5.4"

Transcription

1 Release Notes McAfee Vulnerability Manager About this release New features Resolved issues Known issues Additional information Find product documentation About this release This document contains important information about the current release. We strongly recommend that you read the entire document. New features Here is a list of new and updated features included with this release of the product. FASL editor The Foundstone Attack Scripting Language (FASL) is a programming language supported by McAfee Vulnerability Manager and used to check systems for vulnerabilities. FASL is used by the product to run vulnerability checks on the product scan engines. The FASL Editor allows you to create and test scripts you want to use to check your systems for vulnerabilities. CyberScope reports McAfee Vulnerability Manager can generate CyberScope reports. Some report features include: adding up to three organizations to appear in the report and filtering data for a specific benchmark. Enhancements This release provides some enhancements to the product: Filtering vulnerabilities in the Vulnerability Tree for Vulnerability Sets and scan configurations In the Vulnerability Tree for a Vulnerability Set or scan configuration, use the Hide Unchecked Vulns checkbox to only view the vulnerabilities that have been selected. The Faultline Identification number (FID) is included in scan and asset reports. Saved reports run on the same day don t overwrite each other. Telnet only option for Shell credentials. View Active assets in the dashboard An Active Asset View is added to the dashboard. Located at the bottom of the dashboard page, the Asset View option lets you select to view either Active assets or All assets. The dashboard refreshes to display your selection. CodeMirror is included in the product. CodeMirror is released under a MIT-style license. Resolved issues Here is a list of issues that are resolved in this release.

2 McAfee Vulnerability Manager Fixed the result processor to compute the FASL output hash regardless of the "System cryptography" local security policy setting. 2 Fixed the web module access violation while parsing the web application URL. 3 Fixed organization deletion so that credential sets are not deleted unless they are defined in the organization. McAfee Vulnerability Manager Fixed the asset IP address save operation to eliminate duplicates. (836814) 2 Fixed MVM Data Import using epo data source filter. (838280) 3 Improved the performance of the save scan operation. (838666) 4 Fixed the asset advanced search to allow at least 10 IP addresses in the search criteria. (842876) 5 Fixed the delete user operation to preserve the ticket status when possible. (872620) 6 Fixed close ticket operation when invoked from SNMP. (874960) 7 Fixed violation of PRIMARY KEY constraint 'TagAssetsPK' error on scan startup. (877607) 8 Fixed the Foundstone Notification Service crash when using SNMP. (874916) 9 Extended the timeout for workgroup delete operations. (874963) 10 Fixed the script return code to indicate non vulnerable when the target OS does not match the script's filter. (832361) 11 Fixed the crash in FSAssessment.exe when logging long diagnostic messages. (841964) 12 Fixed ticket verification when the target is unreachable. (871924) 13 Fixed first found and last found dates in the CSV reports. (842913) 14 Fixed Report Server transform process error due to premature timeout. (846404) 15 Fixed CSV only ed reports to exclude extraneous folder. (873059) 16 Fixed report server crash while generating custom HTML report. (873480) 17 Fixed scan description text. (756768) 18 Fixed primary/secondary phone number text validation. (834949) 19 Fixed the report generation schedule editor to preserve the recurring report generation schedule. (871167) 20 Fixed SQL server error when creating a Dynamic tag based on multiple IP addresses. (872677) 21 Fixed Web Module authentication when using NTLM. (836638) McAfee Vulnerability Manager Fixed asset reconciliation to ignore previous (stale) IP address entries. (822383) 2 Fixed MyFoundscore display in Enterprise Manager for workgroup administrators. (825911) 3 Fixed possible XSS injection. (798723) 4 Fixed Vulnerability Set filter for the "Patch Availability" condition. (822405) 5 Fixed the error handler for the TCP banner grabbing in the Discovery module. (793398)

3 6 Improved the performance of the WebModule XML result file generator and added logging of MVM build number in the "fsa" log file. (809582) 7 Fixed the error "violation of primary key constraint" reported by stored procedure "ReconUpdateAssetProperties_Service_Vuln". (819230) 8 Fixed OS identification to show 'R2' as it applies to Windows Server (819299) 9 Updated the "Preferences" dialog box in the Foundstone Configuration Manager application to accept 548 as the maximum of days (approximately 1.5 years or 18 months). (821014) 10 Fixed scan controller loop when the scan is finishing and the user who started the scan has been moved or deleted. (811157) 11 Fixed detection of available network stacks before each scan and log diagnostic message if the required stack is not available. (831799) 12 Fixed scanning of Windows8 and Windows2012 targets. (834256) 13 Fixed TNS service protocol detection. (834590) 14 Fixed OS filter in the Wireless module. (834954) 15 Fixed retrieval of version number from remote files. (836000) McAfee Vulnerability Manager Fixed infinite loop in Discovery module during TCP/UDP fingerprinting. 2 Fixed form authentication using a credential that includes the character "ñ". 3 Fixed FSAssessment crash in the FASLModule. 4 Fixed date format specification for the FSUpdate table SQL query. 5 Fixed XCCDF Benchmark reports for STIG templates. 6 Fixed date conversion error while updating the job state on a British English SQL Server. 7 Fixed the MVM Data Import task invoked by the MVM epo extension. 8 Fixed the Vuln Set rule editor to hide the preview button until the editor has completed processing. 9 Fixed the workgroup delete operation to display an error when the delete fails. 10 Fixed the role editor to allow the viewing of the complete organization tree. 11 Fixed the FASL engine script launcher to avoid running too many scripts simultaneously against a single target. 12 Fixed Dashboard Risk Trend Graph not Loading. 13 Fixed premature timeout determination made by the API and script monitoring object and improved its performance when running on networks with significant network latency. Known issues For a list of known issues specific to this release, refer to McAfee KnowledgeBase article KB78957.

4 Additional information FASL Editor The Foundstone Attack Scripting Language (FASL) is a programming language supported by McAfee Vulnerability Manager and used to check systems for vulnerabilities. FASL is used by the product to run vulnerability checks on the product scan engines. The FASL Editor allows you to create and test scripts you want to use to check your systems for vulnerabilities. Create a vulnerability check You can create a new custom vulnerability check and include the custom FASL scripts. You can use your custom vulnerability checks in a scan configuration. Figure 1: Custom FASL script workflow The check meta data user interface provides a simple way to include check information. Care must be taken when typing in the FASL scripts. You can also view KB78794 for links to more FASL development help. FASL scripts have unique custom Faultline IDs (FIDs) between 6,000,000 and 6,999,999. If you created FASL scripts using the FASL Development Kit, the custom FIDs were 60,000 to 69,999. Custom FASL scripts created with the Development Kit will work in McAfee Vulnerability Manager. There are two states for custom vulnerability checks: active and inactive. Active custom vulnerability checks appear under the Custom and either the Non-Intrusive or Intrusive sections of the Vulnerability Tree. Inactive custom checks only appear under the Custom section of the Vulnerability Tree. Publishing a FASL script only updates the script in the custom vulnerability check, it doesn't affect the state (active or inactive) of the custom check. You can have two copies of the same custom vulnerability check, one that is active and one that is in development (not published). Root Organization Administrators and Workgroup Administrators can create, modify, test, activate and deactivate custom vulnerability checks and custom FASL scripts. Only a Root Organization Administrator can publish a custom FASL script. Non-administrative users cannot manage custom vulnerability checks or custom FASL scripts. Users can add active custom vulnerability checks to scan configurations (the user must have permission to create or modify a scan configuration). Note: Workgroup Administrators cannot publish a custom FASL script. New FASL scripts must be published by a Root Organization Administrator before a Workgroup Administrator can activate, deactivate, or publish a custom script. 1 Select Manage FASL Scripts. 2 Create a new FASL script or duplicate an existing script. a b For new FASL scripts, click New FASL Script. For duplicated FASL scripts: Select an existing FASL script. You can find a script using the Vulnerability Filter Search field or using the Vulnerability Tree. The script information appears under FASL Script/Vulnerability Meta Data. Note: When using the Vulnerability Filter, you must expand the Vulnerability Tree to find your search results. The tree collapses every time you do a search.

5 Click Copy Script. A confirmation screen appears. Click OK. A unique custom Faultline ID is generated for your custom script. 3 Type a Name and Description (optional). The name of the vulnerability check doesn't need to be unique because the product uses the Faultline ID number. However, you should use unique names so you easily identify the check. For duplicated scripts, you can add some text to make it easier to search for your custom script. 4 For Intrusive, select No for a non-intrusive check or Yes for an intrusive check. Non-intrusive checks do not make modification to the target system. Intrusive check might make modifications to the target system. It is recommended that you create non-intrusive checks. 5 Select the Module. This is the branch in the vulnerability tree. 6 Type the CVE number (optional). 7 Select the Risk level. Zero is the lowest risk level, 10 is the highest. 8 For Credentials, select No if no credentials are required, or Yes if credentials are required. 9 After you activate and publish your FASL script, the Active checkbox is available for your custom vulnerability check. Deselecting Active inactivates this custom vulnerability check from the Vulnerability Tree and any scan configurations using this custom check. 10 Type an Observation. The Observation contains information about what the user will see on their system if this vulnerability has been used on their system. 11 Type a Recommendation. The Recommendation contains information about what the user should do to resolve or mitigate this vulnerability. 12 Click Save. This saves the meta data and assigns a custom Faultline ID (FID) to the check. 13 Click View/Edit Script. 14 Type in the script. For more details on using scripts, see FASL script best practices, Working with FASL scripts, and Example FASL script. 15 Click Save. Work with FASL scripts The FASL script user interface allows you to include the scripts you need for your custom vulnerability checks. Before you can add FASL scripts: Read FASL script best practices to ensure you do not create any issues with your McAfee Vulnerability Manager deployment or systems on your network. Set up your test environment, this includes creating a scan configuration to test your new FASL scripts with. You must create a new custom vulnerability check. When including and testing scripts, it is recommended to use the following workflow: 1 Create your custom vulnerability check. 2 Click View/Edit Script. 3 Type the FASL scripts you want in the Script Editor. 4 Type a unique Script File Name. "custom-" is automatically added to the script file name. 5 Click Save.

6 6 To test your script, select a Scan and an Engine. If you have a lot of scans, you can filter the Scan list by typing the scan name in the scan name field. 7 Click Run Test. Only the script you are testing is used in the scan. If you need to cancel the scan, use the Scan Status page. 8 Click View Test Status. A pop-up window displays the Scan Status for your test scan, running the test script. The Debug Log displays issues that occur during the scan. 9 Click Activate and Publish after you have tested your script and you are ready to use your custom vulnerability check. If you are updating a custom check, you can save your changes without publishing the update. You can then click View Published Version to see the difference between your published script and your updated script. Note: Only a Root Organization Administrator can Activate and Publish a custom FASL script. 10 If you are using a test system and you want to transfer it to your production server, click Export. You can then go to your production server and import your custom vulnerability checks. Delete custom vulnerability check You can delete custom vulnerability checks. You cannot delete vulnerability checks created by McAfee. Deleting a custom vulnerability check also removes it from any scan configurations using the custom check. Tip: You can change a custom vulnerability check to inactive instead of deleting it. Changing the state to inactive removes the custom check from the Non-Intrusive or Intrusive sections of your Vulnerability Tree and any scan configurations using the custom check, but it doesn't delete your custom vulnerability check. 1 Select Manage FASL Scripts. 2 Select the custom vulnerability check you want to delete. 3 Under Vulnerability Meta Data, click Delete. 4 Click OK. Change the state of a vulnerability check Vulnerability checks can be active or inactive. Active checks are selectable from the vulnerability tree and can be used in scan configurations. Inactive checks are only available to Root Organization Administrator and Workgroup Administrator. Changing a custom vulnerability check from active to inactive removes it from any scan configuration using the custom check, but it doesn't delete it. 1 Select Manage FASL Scripts. 2 Select the custom vulnerability check you want to inactivate. 3 Under Vulnerability Meta Data, deselect Active. 4 Click Save.

7 Import a custom vulnerability check You can import vulnerability scripts into your organization. Your scripts must be saved in the XML file format. The XML format must meet the Threat Content Schema definition. You can find the ThreatContentPackage schema file on the enterprise manager server, at..\foundstone\portal\fasl. When you import a custom FASL script, the product assigns a new FASL ID (FID) to the custom script. Imported scripts are inactive; you must activate the custom script before you can use it. All imported custom FASL scripts are in the Custom branch of the vulnerability tree. You can import multiple FASL scripts at one time, but all of the scripts must be in one XML file. 1 Select Manage FASL Scripts. 2 Click Import Vulnerabilities. 3 Click Browse, then select a file to import. 4 Click Import. A message displays the results. Click on the message to close it. Note: Importing a script does not automatically publish or activate your script. 5 Edit the script, if necessary. 6 When you are ready to publish, select the script, click View/Edit Script, then click Activate and Publish. Export a custom vulnerability check You can export your vulnerability checks and then import those checks into another McAfee Vulnerability Manager deployment. You can only export one vulnerability check at a time. 7 Select Manage FASL Scripts. 8 Search for and select a vulnerability check. 9 Click Export. 10 Select a location to save the file. 11 Click OK. FASL script best practices When working with custom FASL scripts, McAfee recommends using the following guidelines. Testing your FASL scripts McAfee recommends you test your FASL scripts on a non-production server and use test targets, not actual systems on your network. The reason, scripts can cause a system to stop functioning properly, so it is better to use a test environment. Note: While the FASL editor is only available to Root Organization Administrators and Workgroup Administrators, unpublished scripts are still available to everyone in all organizations, not just yours. If you do not have a test environment, or creating one is not possible for you, then create a separate workgroup, Workgroup Administrator, separate scans (for testing scripts), and use a separate scan engine. Whether you use a test environment or test workgroup, restrict the IP range in your test scan to only the test targets. Make sure you target systems specific for the scan or script.

8 FASL output When you test your custom script, the Test Status page displays the status as the test runs. The test results include FASL Output, a table that displays each asset or IP address scanned during the test. The FASL output table only displays if the script successfully runs to completion or fails to complete. If the script fails, there might be some information in the table to help you identify where the script failed. Note: The script test does not show if the systems are vulnerable or not. You must publish the script and use it in a scan configuration to test if your custom script returns vulnerability results. Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 12 Go to the McAfee Technical Support ServicePortal at 13 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. Copyright 2013 McAfee, Inc. Do not copy without permission. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others.

McAfee Vulnerability Manager 7.5.1

McAfee Vulnerability Manager 7.5.1 McAfee Vulnerability Manager 7.5.1 The McAfee Vulnerability Manager 7.5.1 quarterly release adds features to the product without having to wait for the next major release. This release notes file contains

More information

McAfee Vulnerability Manager 7.0.2

McAfee Vulnerability Manager 7.0.2 McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE .trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Product Guide. McAfee Vulnerability Manager 7.5

Product Guide. McAfee Vulnerability Manager 7.5 Product Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software

McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Qlik REST Connector Installation and User Guide

Qlik REST Connector Installation and User Guide Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

IBM Information Server

IBM Information Server IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01

More information

StreamServe Persuasion SP5 Control Center

StreamServe Persuasion SP5 Control Center StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents

More information

Orientation Course - Lab Manual

Orientation Course - Lab Manual Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical

More information

NovaBACKUP xsp Version 12.2 Upgrade Guide

NovaBACKUP xsp Version 12.2 Upgrade Guide NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016 ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Network Security Platform 7.5

Network Security Platform 7.5 M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011 Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Authoring for System Center 2012 Operations Manager

Authoring for System Center 2012 Operations Manager Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack

More information

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do? McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time

More information

Central and Remote Users Guide

Central and Remote Users Guide Central and Remote Users Guide Proprietary Rights Notice 1985-2006 IDEXX Laboratories, Inc. All rights reserved. Information in this document is subject to change without notice. Practice names, doctors,

More information

SAM Server Utility User s Guide

SAM Server Utility User s Guide SAM Server Utility User s Guide Updated May 2012 Copyright 2010, 2012 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0157 (PDF) SCHOLASTIC, READ 180, SYSTEM 44, SCHOLASTIC EXPERT

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

UOFL SHAREPOINT ADMINISTRATORS GUIDE

UOFL SHAREPOINT ADMINISTRATORS GUIDE UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

WEBCONNECT INSTALLATION GUIDE. Version 1.96

WEBCONNECT INSTALLATION GUIDE. Version 1.96 WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business

More information

FileNet System Manager Dashboard Help

FileNet System Manager Dashboard Help FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their

More information

How To Use The Unify Intelligence Center On A Pc Or Macbook Or Macrocessor On A Computer Or Macosade On A Macbook (For Macro Recipebook) On A Mobile Device On A Web Browser On A Desktop Or

How To Use The Unify Intelligence Center On A Pc Or Macbook Or Macrocessor On A Computer Or Macosade On A Macbook (For Macro Recipebook) On A Mobile Device On A Web Browser On A Desktop Or The Unified Intelligence Center interface is organized by dashboards. are web pages that display reports, scheduled reports, sticky notes, and web-based elements, such as URLs and web widgets, that are

More information

Troubleshooting pcanywhere plug-in Deployment

Troubleshooting pcanywhere plug-in Deployment Contents Verify implementation of pcanywhere Solution... 2 Deployment of the pcanywhere plug-in from the SMC... 3 Plug-in installation on managed computer... 5 Problems during pcanywhere Plug-in installation...

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying

More information

Job Streaming User Guide

Job Streaming User Guide Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to

More information

Visual Dialogue User Guide. Version 6.1

Visual Dialogue User Guide. Version 6.1 Visual Dialogue User Guide Version 6.1 2015 Pitney Bowes Software Inc. All rights reserved. This document may contain confidential and proprietary information belonging to Pitney Bowes Inc. and/or its

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Qualys PC/SCAP Auditor

Qualys PC/SCAP Auditor Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS

More information

F9 Integration Manager

F9 Integration Manager F9 Integration Manager User Guide for use with QuickBooks This guide outlines the integration steps and processes supported for the purposes of financial reporting with F9 Professional and F9 Integration

More information

McAfee Enterprise Security Manager 9.3.2

McAfee Enterprise Security Manager 9.3.2 Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains

More information

VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3

VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 This document supports the version of each product listed and supports all subsequent

More information

IQSweb Reference G. ROSS Migration/Registration

IQSweb Reference G. ROSS Migration/Registration ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

McAfee GTI Proxy 1.0.0 Administration Guide

McAfee GTI Proxy 1.0.0 Administration Guide McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports

More information

Sage 200 CRM 2015 Implementation Guide

Sage 200 CRM 2015 Implementation Guide Sage 200 CRM 2015 Implementation Guide Copyright statement Sage (UK) Limited and Sage Hibernia Limited, 2015. All rights reserved. If this documentation includes advice or information relating to any matter

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Inventory Computers Using TechAtlas for Libraries

Inventory Computers Using TechAtlas for Libraries Inventory Computers Using TechAtlas for Libraries WebJunction.org 9/11/2008 Table of Contents Introduction... 3 Additional Resources... 3 Your Computer Login... 3 TechAtlas Login... 3 Browser Options...

More information

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide ScriptLogic Enterprise Security Reporter VERSION 3 Installation Guide ENTERPRISE SECURITY REPORTER 3 INSTALLATION GUIDE II Copyright 2011 by ScriptLogic Corporation All rights reserved. This publication

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Using Process Monitor

Using Process Monitor Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd. Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

McAfee Data Loss Prevention Endpoint 10.0.0

McAfee Data Loss Prevention Endpoint 10.0.0 Release Notes Revision A McAfee Data Loss Prevention Endpoint 10.0.0 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Resolved issues Installation instructions

More information

KeyAdvantage System DMS Integration. Software User Manual

KeyAdvantage System DMS Integration. Software User Manual KeyAdvantage System DMS Integration Software User Manual ii Copyright Disclaimer Trademarks and patents Intended use EMC Directive Regulatory 2013 United Technologies Corporation. All rights reserved.

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Vyapin Office 365 Management Suite

Vyapin Office 365 Management Suite Vyapin Office 365 Management Suite Last Updated: May 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

How To Use Syntheticys User Management On A Pc Or Mac Or Macbook Powerbook (For Mac) On A Computer Or Mac (For Pc Or Pc) On Your Computer Or Ipa (For Ipa) On An Pc Or Ipad

How To Use Syntheticys User Management On A Pc Or Mac Or Macbook Powerbook (For Mac) On A Computer Or Mac (For Pc Or Pc) On Your Computer Or Ipa (For Ipa) On An Pc Or Ipad SYNTHESYS MANAGEMENT User Management Synthesys.Net User Management 1 SYNTHESYS.NET USER MANAGEMENT INTRODUCTION...3 STARTING SYNTHESYS USER MANAGEMENT...4 Viewing User Details... 5 Locating individual

More information

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

DCA. Document Control & Archiving USER S GUIDE

DCA. Document Control & Archiving USER S GUIDE DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

Acano solution. Acano Manager R1.1 FAQs. Acano. December 2014 76-1039-02-G

Acano solution. Acano Manager R1.1 FAQs. Acano. December 2014 76-1039-02-G Acano solution Acano Manager R1.1 FAQs Acano December 2014 76-1039-02-G Contents Contents 1 Installation... 3 How do I set up the two components of Acano Manager on different servers?... 3 Am I going to

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Using the Cisco OnPlus Scanner to Discover Your Network

Using the Cisco OnPlus Scanner to Discover Your Network Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information