McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x
|
|
|
- Maude Hines
- 10 years ago
- Views:
Transcription
1 McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x
2 COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2
3 Contents Overview Sizing Overview Samples used in the tests Hardware details Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer connected to two Scan Servers Performance Comparison between Single Proc and Dual Proc Scan Servers CPU utilization Average Scan Response time Average Throughput Performance Statistics Performance Improvement by adding additional Scan Servers Performance Considerations Test Summary
4 Overview McAfee VirusScan Enterprise for Storage.0 (VSES) remotely scans NetApp filers and Internet Content Adaptation Protocol (ICAP) storage appliances, by expanding the capabilities of McAfee VirusScan Enterprise 8.7i. McAfee VirusScan Enterprise for Storage.0 is an add-on to McAfee VirusScan Enterprise 8.7i. You can configure VirusScan Enterprise for Storage from the VirusScan Console or use epolicy Orchestrator to centrally manage and enforce policies, then use queries and dashboards to track activity and detections. The VirusScan Enterprise for Storage installation adds the following: Console Network Appliance Filer AV Scanner and ICAP AV Scanner Service McAfee VirusScan Enterprise for Storage, which manages scan requests received from the filer and uses the McAfee Engine Service to perform the actual scan. When a file is accessed by the CIFS (Common Internet File System) user, the Data ONTAP sends the file's UNC path to VirusScan Enterprise for Storage for scanning. VirusScan Enterprise for Storage then scans the file and takes the necessary action, then sends the result back to the filer. When a user tries to open, create or modify the files, the NetApp filer will send a scan request to VirusScan Enterprise for Storage when the following criteria is met: The file extension is included in the to-be-scanned file types list. The file has not already been marked as previously scanned, and no changes have occurred to the file. 4
5 Sizing Overview The objective of this sizing exercise is to measure the performance characteristics of the scanner and the NetApp Filer on various configurations. This helps an end-user to decide the number of scanners required for a given user load. McAfee has conducted these tests on the following filer configurations: Single NetApp filer with single Scan Server Single NetApp filer connected to two Scan Servers All the tests are done with 00% write operation, which means each file sends a scan request to the scan server. The default Scanner settings and default NetApp filer "vscan" settings were used for these sizing tests. A freeware tool having the capability of multi-threading feature was used for this exercise. The windows "perfmon" is used to capture scan server performance statistics. On the NetApp filer, "systat" command is used to capture the filer's performance statistics. Contents Samples used in the tests Hardware details Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer connected to two Scan Servers Samples used in the tests Different file types with extensions of doc, pdf, xls, txt, zip, rar, ppt, eml, com, docx, dcom and tmp were included in the sample set. The sample set consisted of 37 files. Sample size Clean vs. Infected ratio Average = 3 MB Minimum = KB Maximum = 30 MB 60% to 40% 5
6 Sizing Overview Hardware details Hardware details This section describes the hardware requirements, to measure the performance characteristics of the scanner and the NetApp Filer on various configurations for this sizing exercise. Table : Sizing excercise Hardware requirements Hardware Component Filer Scan Server Single Proc Scan Server Dual Proc Domain Controller Filer Model: FAS 2020 DataOntap Version: Processor: One, 298MHz Memory: 896MB NVMem: 28MB Network Adapter: Gbps speed Model: Dell Optiplex GX620 RAM: GB Processor: One Pentium4, 2.80GHz Network Adapter: Gbps speed Operating System: Microsoft Windows 2003 Enterprise Server (x64bit) Model: Dell PowerEdge 2900 RAM: 4GB Processor: 2x Intel Xeon CPU 520 with Dual Core,.86GHz Network Adapter: Gbps speed Operating System: Microsoft Windows 2003 Enterprise Server (x64bit) Model: Dell Optiplex GX620 RAM: GB Processor: One Pentium4, 2.80GHz Network Adapter: Gbps speed Operating System: Microsoft Windows 2003 Enterprise Server (x64bit) 6
7 Sizing Overview Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer connected to two Scan Servers 7
8 Performance Comparison between Single Proc and Dual Proc Scan Servers Tests were conducted separately on a single proc server and dual proc server. Below are the comparison graphs of CPU utilization, response time and throughput for the same load and the same settings. Contents CPU utilization Average Scan Response time Average Throughput CPU utilization The following figure shows the CPU utilization of Single Proc Scan Server and Dual Proc Scan Server: Tests were conducted on a single proc server and dual proc server seperately with the same load. Load Profile: 30 Users (30 clients accessing CIFS share) Test Duration: hour (Average of 3 runs) VSES Settings: Default settings 8
9 Performance Comparison between Single Proc and Dual Proc Scan Servers Average Scan Response time VSCAN Settings: Default settings Average Scan Response time The following figure shows the average scan response time (in milliseconds) of Single Proc Scan Server and Dual Proc Scan Server: Tests were conducted on a single proc server and dual proc server seperately with the same load. Load Profile: 30 Users (30 clients accessing CIFS share) Test Duration: hour (Average of 3 runs) VSES Settings: Default settings. VSCAN Settings: Default settings 9
10 Performance Comparison between Single Proc and Dual Proc Scan Servers Average Throughput Average Throughput When determining the sizing requirement, this average throughtput measurement is important. The following figure shows the average throughput in KB/s of Single Proc Scan Server and Dual Proc Scan Server. Tests were conducted on a single proc server and dual proc server seperately with the same load. Load Profile: 30 Users (30 clients accessing CIFS share) Test Duration: hour (Average of 3 runs) VSES Settings: Default settings VSCAN Settings: Default settings 0
11 Performance Statistics The test was done on a Single filer with a Dual Proc Scan Server. The tests were done by gradually increasing the number of users writing to filer simultaneously with default settings. In this test filer's (FAS2020), the CPU utilization reached 00% but the Scan Server CPU averaged to 50% for 300 users. Scan Server Performance Statistics Average CPU utilization: 50% Max scan threads: 53 Engine Server Throughput (KB/s): Average response Time (milliseconds): 3369 Filer Performance Statistics Peak CPU utilization: 00% Average CPU utilization: 90% CIFS Throughput: KB per second (network in+out) KB/user/s: 25 The following figure concludes that the average CPU and Memory (Working Set) utilization increases by increasing number of users accessing the filer: The following figure concludes that the average throughput increases, as the number of users writing to filers increase till the scanner/filer is able to handle. In this scenario, the throughput
12 Performance Statistics actually decreases beyond 200 users accessing the filer, as this filer is not able to scale beyond this. 2
13 Performance Improvement by adding additional Scan Servers By adding an additional server, there is a significant improvement in average scan response time and average data throughput. The scan requests will be sent to the scanners in a round-robin fashion, to distribute the load by NetApp filer. The following table shows the significant improvement in the average scan response time: Table 2: Average Response Time (in ms) # of Users One Scan Server Two Scan Servers The following table shows the significant improvement in the average throughput: Table 3: Average Throughput (in KB/s) # of Users One Scan Server Two Scan Servers
14 Performance Improvement by adding additional Scan Servers # of Users 50 One Scan Server 332 Two Scan Servers
15 Performance Considerations Network connectivity Gigabit Ethernet (000MB) networking is the minimum recommendation between the NetApp storage device and the Scan Server. The NetApp filer and Scan Server can be connected directly or connected using a private network to achieve a clean network. If connecting through an Ethernet switch, use a dedicated switch or configure a virtual LAN (VLAN) to separate traffic traveling through the switch. Scan server hardware The limiting performance factors with AV scanners are the CPU frequency and memory bus performance. The amount of "vscan" requests the AV scanners will be able to process, will be greatly dependent on their CPU speed and the memory bus bandwidth. McAfee recommends the following system requirements for each AV server: Dual Processor 2.6GHz (or greater) Network Interface Card 000MB/s Ethernet Average File Size and Type of files AV Server performance will be affected by average size of the files and file types it scans ( such as.zip,.cab, etc). Deploying VSES on Virtual Environments The limiting performance factors with AV scanners are the CPU frequency and memory bus performance. The VMware/ESX infrastructure should be capable of handling the CPU and Memory requirements of AV scanner, as given below: Dual Processor 2.6GHz (or greater) Network Interface Card 000MB/s Ethernet Filer Storage Capacity The filer storage capacity does not affect the scanner's performance. The performance actually depends on the number of concurrent users accessing the filer and the average throughput of the filer. 5
16 Test Summary This section summarizes the performance characteristics of the scanner and the NetApp Filer on various configurations, which helps the end-user to decide the number of scanners required for a given user load. The following table summarizes the sizing tests for various configurations: # of CPU # of Scanners # of Users Avg CPU % Avg Engine Server Throughput (KB/s) Avg NetApp n/w In+Out (KB/s) KB/User/s Avg Working Set Engine Server(MB) Response Time (ms) Processor Queue Length # of files/s *.47 2 *The filer CPU Utilization reached 00% The Standard CIFS User Classification from NetApp is classified as: Heavy User A heavy user transfers around 20 KB/s of network data (in and out) from client to CIFS server. Medium User A medium user transfers around 7 to 3 KB/s of network data (in and out) from client to CIFS server. Low User A low user transfers around 3 to 6 KB/s of network data (in and out) from client to CIFS server. Light User A light user transfers around 0 to 2 KB/s of network data (in and out) from client to CIFS server. 6
17 Test Summary Based on the tests conducted on various scenarios, the following recommendations are suggested for the sample load as mentioned earlier. Table 4: Recommendations for the sample load Heavy users accessing the filer simultaneously Recommended # of Scan Server(s) Up to 30 Up to 75 Up to 300 One Single Proc Scan Server Two Single Proc Scan Servers One Dual Proc Scan Server NOTE: For a failover, it is highly recommended to add an additional scan server as secondary scan server. 7
18 Test Summary The following illustration shows the sample scanning pod: Figure : All the scanners as primary inside a data center Figure 2: AV scanning pod between two data centers 8
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
McAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
McAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
McAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
McAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
Release Notes for McAfee VirusScan Enterprise for Storage 1.0
Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document
epolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Implementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Recommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
McAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Release Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
McAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
McAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Total Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Verizon Internet Security Suite Powered by McAfee User Guide
Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
McAfee Solidcore 5.1.0 Product Guide
McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
McAfee Security for Microsoft SharePoint 2.5.0 User Guide
McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to
Installation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
Performance Test Report: Novell iprint Appliance 1.1
White Paper File and Networking Services Performance Test Report: Novell iprint Appliance. Table of Contents page Executive Summary.... Introduction.... Overview... 3. Configurable Test Variables...3 4.
McAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Comparing the Network Performance of Windows File Sharing Environments
Technical Report Comparing the Network Performance of Windows File Sharing Environments Dan Chilton, Srinivas Addanki, NetApp September 2010 TR-3869 EXECUTIVE SUMMARY This technical report presents the
Virtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS
Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS - About this Document - About this Release - Purpose
McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide
McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee
Technical Report Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp June 2015 TR-4286 Abstract An antivirus solution is key for enterprises
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1
Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
System Status Monitoring Guide. McAfee Network Security Platform 6.1
System Status Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide
McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0
Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
McAfee VirusScan Enterprise for Storage 1.1.0
Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
Dragon NaturallySpeaking and citrix. A White Paper from Nuance Communications March 2009
Dragon NaturallySpeaking and citrix A White Paper from Nuance Communications March 2009 Introduction As the number of deployed enterprise applications increases, organizations are seeking solutions that
McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6
McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee UTM Firewall Control Center Product Guide. version 2.0
McAfee UTM Firewall Control Center Product Guide version 2.0 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
Product Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.
McAfee VirusScan Enterprise 8.7i Repost Patch 5 Release Notes Thank you for using McAfee software. This document contains important information about the current release. We strongly recommend that you
TREND MICROTM ServerProtectTM for EMC Celerra TM
TREND MICROTM ServerProtectTM for EMC Celerra TM Filers Getting Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Symantec AntiVirus for Network Attached Storage 5.1
Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)
AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents
Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Total Protection for Enterprise-Advanced
System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)
McAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
New!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
McAfee VirusScan Enterprise 8.8 software Installation Guide
McAfee VirusScan Enterprise 8.8 software Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
Product Guide. McAfee SaaS Endpoint Protection 5.2.0
Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
McAfee VirusScan Enterprise 8.8 software Product Guide
McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Data Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Best Practices Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
NTP Software QFS for NAS, NetApp Edition Installation Guide
NTP Software QFS for NAS, NetApp Edition Installation Guide This Installation Guide applies to all NTP Software QFS for NAS, NetApp filer editions. Abstract This guide provides a short introduction to
AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012)
AVG File Server 2013 User Manual Document revision 2013.03 (11/13/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
McAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Performance Optimizer 1.0.0 Software
Product Guide Performance Optimizer 1.0.0 Software For use with epolicy Orchestrator 4.6.6-5.1.1 Introduction The Performance Optimizer analyzes the performance of your McAfee epolicy Orchestrator (McAfee
Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
McAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
System Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client
LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2010 Small Farm Performance Study Dell SharePoint Solutions Ravikanth Chaganti and Quocdat Nguyen November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
10.2 Requirements for ShoreTel Enterprise Systems
10.2 Requirements for ShoreTel Enterprise Systems The ShoreTel Enterprise Edition system is scalable. For economy, ShoreTel Enterprise customers provide their own server hardware, allowing them to build
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
AuditMatic Enterprise Edition Installation Specifications
Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this
By the Citrix Publications Department. Citrix Systems, Inc.
Licensing: Planning Your Deployment By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED
Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)
Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 07/2015 2015 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
Microsoft Windows Server 2003 with Internet Information Services (IIS) 6.0 vs. Linux Competitive Web Server Performance Comparison
April 23 11 Aviation Parkway, Suite 4 Morrisville, NC 2756 919-38-28 Fax 919-38-2899 32 B Lakeside Drive Foster City, CA 9444 65-513-8 Fax 65-513-899 www.veritest.com [email protected] Microsoft Windows
Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances
Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
McAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.
Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -
Oracle Database Scalability in VMware ESX VMware ESX 3.5
Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises
