About this release. McAfee Application Control and Change Control Addendum. Content change tracking. Configure content change tracking rule
|
|
- Claire McCarthy
- 8 years ago
- Views:
Transcription
1 Addendum McAfee Application Control and Change Control About this release For use with epolicy Orchestrator Software This document is an addendum to the McAfee Change Control and Application Control Product Guide and McAfee Change Control and Application Control Installation Guide, you can refer to the guides for complete information about the product. The current release of the product includes features that are redesigned to add more functionality to provide better reporting of content changes, new installation and uninstallation workflow for software packages, and better control on observation generation and processing. You can now manage the product by McAfee epo 5.0 also. These features are redesigned. Content change tracking Package control Observation throttling Upgrade support Content change tracking The content change tracking feature is now improved to allow you to specify directories for tracking content changes. You can specify a directory to track content and attribute changes for all files in this directory and its subdirectories. If you enable content change tracking for a directory, any attribute or content change to the files present in the directory creates new versions of the files in the McAfee epo server. For detailed information on attributes that are tracked for a file, see the File attributes for content change tracking section. Configure content change tracking rule You must create an Integrity Monitor (IM) rule group for monitoring content changes. 1 On the McAfee epo console, click Menu Configuration Solidcore Rules. 2 From the Rule Groups tab, select Integrity Monitor to view or define a rule group for monitoring changes performed on critical resources. 1
2 3 Click Add Rule Group. a Specify the rule group name. b c Select the rule group type as Integrity Monitor. Select the platform as Windows. 4 Click OK. The rule group is created and listed on the Rule Groups page. 5 Click Edit for the rule group. 6 On the File tab, click Add to monitor and track changes for a new file or directory. 7 Select an existing rule and click Edit. The Add File dialog box appears. a Review or add the file information. b c Select Enable Content Change Tracking. Select file encoding. Auto Detect ASCII UTF 8 UTF 16 Auto Detect works for most files. If you are aware of the file encoding, select ASCII, UTF 8, or UTF 16 (as appropriate). If needed, you can add new file encoding values. Contact McAfee Support for assistance in adding a file encoding value. d e f Select Is Directory if you specified a directory. Select Recurse Directory to include all subdirectories in the parent directory for tracking content changes. Specify patterns in the Include Patterns or Exclude Patterns field to match the file name. You can only specify file names as patterns. If you do not specify a pattern, all files are included for change tracking. Optionally, add an asterisk (*) at the beginning or end of every pattern. For example, if you specify an include pattern as *.txt, only the TXT files in the directory are monitored. If you specify an exclude pattern as *.ini, the INI files in the directory are not monitored. 8 Click OK. Specify multiple patterns by separating each pattern on a new line. Exclude Patterns has higher precedence than Include Patterns. For example, if you erroneously define include and exclude pattern for the same file, the exclude pattern applies. Assign the rule group to a policy Create a new Integrity Monitor policy or use an existing policy to assign the rule group. When you push the policy to an endpoint, the initial file content and attributes of the qualifying files are stored in the McAfee epo server and set as base version. For all subsequent changes made to the files being monitored, corresponding file versions are stored in the McAfee epo server. The base version identifies the starting point or the initial state of the file for comparison with other versions. 2
3 1 On the McAfee epo console, click Menu Policy Policy Catalog. 2 Select the Solidcore 6.1.1: Integrity Monitor product. 3 Click Actions New Policy. 4 Select the category as Integrity Monitoring Rules (Windows). 5 Select the policy you want to duplicate from Create a policy based on this existing policy list. To define a policy from scratch, select the Blank Template policy. 6 Specify the policy name and click OK to open the Policy Settings page. 7 Add the rule group to the policy. a Select the rule group in the Rule Groups tab. The rules included in the rule group are displayed in the various tabs. b c d Review the rules. On the Rule Groups tab, select Add. Select the rule group that you have created for content changes, then click OK. 8 Save the policy. Manage file versions Identify and review the versions for all files and directories where change tracking is enabled. 1 On the McAfee epo console, click Menu Reporting Content Change Tracking. All files where content change tracking is enabled are listed. 2 In the Quick find text box, specify the endpoint, directory name, or file name, then click Apply. The list is updated based on the specified search string. When you search for a directory, you can review versions of all files that are tracked for this directory. 3
4 3 Review the file status. The File Status column denotes the current status of file under content change tracking. Status values that are updated and new status values included in this release are: File status Success Path not found Directory tracking not supported (prior to end point v6.1.1 ) Wildcard characters in path (not supported) File size exceeds maximum size limit Error while accessing the file Network path (not supported) Definition Content changes for the file are being tracked successfully. The file or directory was not found at the specified path. Verify that the file exists and check the specified path. The file specified for content change tracking is a directory. Prior to this release, you cannot track content changes for directories. The specified file path includes wildcard characters. You cannot use wildcard characters while specifying the file path for content change tracking. The file size exceeded the specified size limit for content change tracking. If needed, you can change the size limit for content change tracking for endpoints. For more information, see Specify the maximum file size in the McAfee Change Control and Application Control Product Guide. The file type can not be accessed. The file specified for content change tracking is stored on a network volume. You cannot track changes for files on network volumes. Encrypted file (not supported) File Deleted File Renamed Multiple file encodings defined Directory rule matched with file name (error) Success (Tracking file-attributes only) Directory Renamed File rule matched with directory (error) Maximum file limit reached The file specified for content change tracking was encrypted on the endpoint. The file specified for content change tracking was deleted from the endpoint. The file specified for content change tracking was renamed on the endpoint. Multiple and conflicting file encoding values are specified for the file. This can occur if two monitoring rules, each with a different file encoding value, are applied to track content changes for the file. The rule specified for content change tracking of a directory matches a file. Only file attributes are being tracked for this file. The directory specified for content change tracking was renamed on the endpoint. The rule specified for content change tracking of a file matches a directory. The number of files under the tracked directory exceeds the maximum limit. If this limit is exceeded, only the base versions are skipped; all subsequent changes to the files are still reported. 4
5 Create a McAfee epo query To create a compliance report for the content changes, you must create a query to fetch file data for the server task. 1 On the McAfee epo console, click Menu Reporting, then select Queries & Reports. 2 Click Actions New to open the Result Type page. 3 From the Feature Group pane, select Solidcore. 4 From the Result Types page, select Solidcore File Content Change Repository, then click Next to open the Chart page. 5 From the Display Results As pane, select List Table, then click Next to open the Columns page. 6 Click Next to open the Filter page. a Specify the required filters. b Specify a group or system to view content changes for files present in it. This is mandatory and you must select a group or system. c (Optional) Specify other filters such as, time window, file path, and system tag. 7 Click Save. 8 Specify the query name, description, and query group, then click Save. Alternatively, you can duplicate the pre-shipped query Solidcore: Content Change Tracking Report Generation - With Group My Organization present in Menu Queries and Reports McAfee Groups Change Control page and modify the filters as required. Create a server task Create a server task to generate the compliance report for content changes. 1 On the McAfee epo console, click Menu Automation Server s. 2 Click New to open the Server Builder. 3 Type the task name and click Next. 4 From the Actions drop down list, select Solidcore: Content Change Tracking Report Generation. 5 Specify the IM rule group name that you created in Create an Integrity Monitor rule group. 6 Specify the query name that you created in Create a McAfee epo query. 5
6 7 Specify the number of revisions to be reported per file. For example, if a file has changed for 50 times in last seven days (as per the chosen time window in the query) but you want to include only the last 10 revisions in the report then specify the value as 10. Maximum allowed value for the number of revisions is 100 and the minimum value is 1. The default value is Specify one or more address, separated by comma to send the compliance report link or report generated by the server task to those addresses. An server must be configured in McAfee epo. 9 Specify the subject. 10 Specify the report name. The report name is appended with a date and time stamp to maintain uniqueness. Optionally, you can modify the date format. 11 Send the compliance report to all intended recipients. By default, report generated by server task is sent on as an attachment to all recipients. The report is sent as a PDF file. The PDF report size of up to 20 MB can be sent through . If the size exceeds this limit then recipients are notified on with a failure message. Alternatively, you can choose to copy the report on a network share. The generated report could be a very large file and it is not preferable to attach such a large file to the . For this reason, the reports are saved to a remote location and a link to the report is sent to all recipients on . Follow these steps, if you want to send the report link on . a b c d Select Use this option to copy report on a network share and send network share information on to specify the network share. Specify a network path to save the generated report. Specify the network credentials to access the specified network path. Click Test Connection to make sure that the specified credentials work. 12 Click Next. 13 Specify the schedule for the task, then click Next to open the Summary page. 14 Review the task summary and click Save. 15 From the Server s page, Run this server task. Based on your choice an with the attached report or a report link is sent to all specified IDs. If the server task fails for any reason, an indicating the failure is sent. If the number of pages in the report exceeds 15000, the report is split into parts and the report name appends underscore (_) with one, two, and so on. View general configuration policy changes Changes are made to the Solidcore 6.1.1:General policy to include global settings for the content change tracking feature. These settings are included for the content change tracking feature. 6
7 Maximum file size File extensions for attributes-only tracking Maximum file limit per rule 1 On the McAfee epo console, click Menu Policy Policy Catalog. 2 Select the Solidcore 6.1.1: General product. 3 Click the McAfee Default policy in the Configuration (Client) category. 4 Select the Miscellaneous Settings tab. The settings are displayed on the page. New settings for the content change tracking feature New settings are included to allow you to customize the feature as needed. Content Change Tracking: Maximum file size By default, the maximum file size supported for content change tracking is 1000 KB. However, the file size can be increased or decreased as required. Content Change Tracking: File-extensions for attributes-only tracking For binary files, only attributes are tracked by the content change tracking feature and not the content. By default, the list of binary files includes these extensions: zip bmp 7z pdf rar tar gz bz tgz bz2 jpg exe gif dll tiff sys png jar 7
8 This list is configurable. Only the changes in file attributes is reported for binary files because maintaining the content difference for files with non-displayable contents unnecessarily utilizes database space and McAfee epo computational resources. You can use this setting to identify all such file extensions for which file attribute change tracking suffices the purpose. This helps in optimizing the system throughput. Content Change Tracking: Maximum file limit per rule When you apply the content change tracking rule on a directory, base versions of all files qualifying the specified include or exclude patterns within the directory are collected and sent to McAfee epo. These base versions will be used for tracking the content changes with future versions of the files. However, if the number of qualifying files for a single rule is too high, this can result in deteriorating the operational performance at endpoint and also at McAfee epo. The maximum file limit per rule is included to prevent such outbursts. If the number of qualifying files for a rule exceeds the threshold then the base versions of the files are not fetched. This limit applies only on the number of qualifying files (matching with include/exclude patterns and recursive/ non-recursive option) in the directory and not on the total number of files under directory. This limit is configurable. By default, the limit is set to 100 files per rule. If the number of files per rule exceeds the defined limit, the base versions will not be sent to McAfee epo. However, All subsequent changes to the files are still reported and the base versions for new files are sent to McAfee epo. Package control Manage the installation and uninstallation of software packages using the package control feature. Application Control uses the package control feature to prevent unauthorized installation and uninstallation of software packages. This feature controls (allows/denies) the following actions for software packages. Installation Uninstallation Upgrade/Repair In this release, the feature is redesigned from the earlier implementation. Drawbacks of the earlier implementation Earlier implementation of this feature had certain drawbacks. Drawback Description Troubleshooting The earlier implementation was not useful for troubleshooting purpose because detailed analysis of the package control-related issues was not supported. System restart Maintenance Uninstallation After changing the feature state, system restart was required. Code was maintained separately for 32-bit and 64-bit architecture. Uninstallation of certain installers was not controlled by the package control feature. New implementation The redesigned feature provides more flexibility to control installation and uninstallation of software packages. Package control feature is supported for these installers. 8
9 MSI installers Includes multiple variants such as,.msp,.mst, and.msm. EXE-based installers Includes MSI files embedded with the installer. Non-MSI-based installers Installation or uninstallation is supported in Update mode only. Does not include MSI file embedded with the installer. Improvement Operating modes System restart Description Multiple operating modes are available to control the installation/uninstallation of software packages. For more information, see Operating modes. System restart is not required after changing the feature state. Uninstallation control Uninstallation of software packages can be completely controlled. Maintenance Troubleshooting 32-bit and 64-bit architectures are now handled generically. Detailed analysis of the package control-related issues is now supported. These workflow changes are made in the new implementation. Workflow Installation Description No changes. Uninstallation Earlier updater rules were required to perform uninstallation. In the new implementation, package control includes a new subfeature to control uninstallation. Uninstallation is allowed or denied based on the state of this subfeature (no rules required). By default, uninstallation is allowed. Bypass Earlier implementation supported process-based bypass for package control. The new implementation introduces a new subfeature to bypass from package control. Package control feature is identified as pkg-ctrl in the features list. By default, this feature is enabled. This is the parent feature and includes these subfeatures. Allow uninstallation Controls the uninstallation of software packages. When this feature is enabled, all software uninstallation is allowed. By default, this feature is enabled and identified as pkg-ctrl-allow-uninstall in the features list. Bypass package control Controls bypassing from the package control feature. When this feature is enabled, pkg-ctrl feature is bypassed and all software installation and uninstallation is allowed. By default, this feature is disabled and identified as pkg-ctrl-bypass in the features list. You can configure package control and all its subfeatures on selected endpoints using a policy. Configure package control on selected endpoints Create a policy to use the package control feature on selected endpoints. Before you begin You must update the Solidcore Extension and Solidcore Client to the version before configuring package control. 1 On the McAfee epo console, click Menu Policy Policy Catalog. 2 Select the Solidcore 6.1.1: Application Control product. 3 Select the Application Control Options (Windows) category. 9
10 4 Edit the My Default policy by clicking the policy. By default, the My Default policy is applied to all endpoints in your enterprise. If you want to configure the feature for selected endpoints, duplicate the My Default policy, edit the settings, and apply the policy to only the relevant endpoints. 5 On the Features tab: a Select Enforce feature control from epo. By default, the Package Control and Allow Uninstallation options are selected. b Select an option to configure package control. Option Package Control Allow Uninstallation Bypass Package Control Definition Selecting this option enables package control. Deselecting this option disables package control and all its subfeatures. Selecting this options allows uninstallation of software packages on endpoints. Deselecting this option prevents uninstallation of software packages on endpoints. Selecting this option bypasses package control. Deselecting this option enables package control. Operating modes There are six operating modes for these features based on the Application Control state. Based on your requirements, you can select a required mode to control installation and uninstallation of software packages. The behavior matrix shows the operating modes, features state, Application Control state, and the corresponding installation and uninstallation behavior. Operating mode Pkg-ctrl feature state Pkg-ctrl-bypass feature state Pkg-ctrl-allow-uninstall feature state Application Control state 1 * Enabled Disabled Enabled Enabled mode 2 Enabled Disabled Disabled Enabled mode 3 Enabled Enabled Not applicable Enabled mode 4 Disabled Not applicable Not applicable Enabled mode 5 Disabled Not applicable Not applicable Update mode 6 Enabled Not applicable Not applicable Update mode * This is the default operating mode. Install behavior Allow by rules Allow by rules allow deny allow allow Uninstall behavior allow deny allow deny allow allow These are the scenarios for which operating modes are used. All software installation/uninstallation is blocked. All software installation/uninstallation is allowed. 10
11 All software installation is authorized and uninstallation is allowed. All software installation is authorized and uninstallation is blocked. No specific guidelines are there to use operating modes 3 6. For operating modes 1 and 2, you can use one of these methods to allow installation. Updater by path Certificate as an updater Trusted user Checksum as an updater Trusted path For more information on updaters, see McAfee Change Control and Application Control Product Guide. Advantages of using operating mode 1 (default mode) This mode allows software modify/repair/remove/upgrade in these scenarios. Explicit software upgrades. Software upgrades through windows update mechanisms. Software upgrades (of existing software) while installing new software packages in case of chained installations. Rollback in case of power failure or if you restart your machine during installation. This is called a suspended installation. The installer keeps track of the installation that is in progress. When resumed, you can rollback the suspended install or continue the suspended install. Advantages of using operating mode 2 Blocks software modify/repair/remove/upgrade in these scenarios. Recommended operating modes Desktop and System Center Configuration Manager (SCCM) managed environment Operating mode 1 Fixed function Operating mode 2 Server environment Operating mode 2 and switch to operating mode 1 for upgrades. Observation throttling Observations record all activity for managed endpoints. When running in Observe mode, Application Control allows all actions on endpoints and no action is blocked. For each action that will be blocked by Application Control in Enabled mode, a corresponding observation is logged in Observe mode. For example, the installation of a software or modification of a package will generate corresponding observations. Observations are generated every minute. When you don't timely review and manage existing observations, it results in excessive generation of observations at endpoints. When observations received at the McAfee epo server from the endpoints are too high, it can impact the responsiveness of the McAfee epo interface. 11
12 How observation throttling works Observation throttling provides a solution to unresponsiveness of the McAfee epo interface problem. By default, the limit on the number of observations to be processed in last 24 hours is set to 100,000. However this limit is configurable. When the number of observations received at the McAfee epo server in the last 24 hours reaches the defined threshold, it results in these actions. Further processing of observations is stopped at McAfee epo to prevent unresponsiveness of the McAfee epo interface. Observation Throttling Rules policy under Application Control is automatically applied on My Organization group. This stops the generation of observations on all endpoints after agent to server communication interval (ASCI) lapses. An event Observation Threshold Exceeded is generated. You can check the Threat Event Log page for this event. This event can be used to create an automatic response. For more information on creating automatic responses, refer to the McAfee Change Control and McAfee Application Control Product Guide. A warning message indicating that the observation generation has stopped appears on the Observations and Predominant Observations pages. This warning message contains a link Enable Observation Generation that you can click to re-enable observation generation and processing. A read-only rule group and an associated policy for the rule group are added to apply the filter rules and stop the observation generation at endpoints. Rule group name: Stop Observation Rules Policy name: Observation Throttling Rules Configure the observations limit Optionally, you can change the default limit for the number of observations to be processed in last 24 hours. 1 On the McAfee epo console, click Menu Configuration Server Settings. 2 From the Setting Categories pane, select Solidcore. 3 Modify the value of Observe Mode: Number of observations received in last 24-hours above which Observation generation would be cut-off setting as needed. View the AEF rules for observations A default rule group is added to Solidcore Rules that includes Advance exclusion filters (AEF) rules to filter and stop all observations. This is a read-only rule group. However, you can view the AEF rules that are applied for observations. 1 On the McAfee epo console, click Menu Configuration Solidcore Rules. 2 From the Rule Groups tab, select Application Control. 12
13 3 Type Stop Observation Rules, then click Search. The Stop Observation Rules rule group appears. 4 Click View. 5 Select the Filters tab. All AEF rules applied for observations appear on the screen. View the observation throttling policy The Stop observation Rules rule group is assigned to the default read-only Observation Throttling Rules policy. Initially, this policy is not assigned to any system or group. When the number of observations reaches the defined threshold, this policy is automatically applied to My Organization (all systems and groups in your organization) and stops further generation of the observations at endpoints. 1 On the McAfee epo console, click Menu Policy Policy Catalog. 2 Select the Solidcore 6.1.1: Application Control product. 3 Click the Observation Throttling Rules policy. 4 Select Stop Observation Rules from the Rule Groups pane. 5 Select the Filters tab. All AEF rules applied for observations appear on the screen. Re-enable observation generation After the threshold limit is reached, you can review and manage observations to stop further observation generation. For more information on reviewing and managing observations, see McAfee Change Control and Application Control Product Guide. 1 On the McAfee epo console, click Menu Application Control Observations. Predominant Observations and Observations pages display a warning message stating that the observation generation has stopped. 2 From the warning message, click Enable Observation Generation. Observation generation at endpoints and processing at the McAfee epo server is re-enabled. Upgrade support From this release, you can upgrade the Solidcore client in Enabled mode. This is supported only in McAfee epo managed configuration. 13
14 s Upgrade the Solidcore client on page 14 In Enabled mode, you can upgrade the Solidcore client on the Windows endpoints. Verify the Solidcore client upgrade on page 15 Verify that the Solidcore client was upgraded successfully on an endpoint. Upgrade the Solidcore client In Enabled mode, you can upgrade the Solidcore client on the Windows endpoints. Before you begin By default, the McAfee default policy that includes the McAfee publishers rule group is applied to the endpoints. If you have changed the default policies, verify that the McAfee publishers rule group is assigned to policies that are applied on the endpoints. Make sure that you add the Solidcore client package to the McAfee epo repository. For information, see McAfee Change Control and McAfee Application Control Installation Guide. 1 On the McAfee epo console, select Menu Systems System Tree. 2 Perform one of these actions: To apply the client task to a group, select a group in the System Tree and switch to the Assigned Client s tab. To apply the client task to an endpoint, select the endpoint on the Systems page and click Actions Agent Modify s on a Single System. 3 Click Actions New Client Assignment to open the Client Assignment Builder page. 4 Select the McAfee Agent product, Product Deployment task type, then click Create New to open the Client Catalog page. 5 Specify the task name and add any descriptive information. 6 Select the target platform. For example, when installing the Solidcore client package on the Windows operating system, select Windows as the target platform. 7 Specify the component and action. a Select the appropriate package from the Products and components list. b Select the Install action. 8 Click Save. 9 Click Next to open the Schedule page. 10 Specify scheduling details, then click Next. 14
15 11 Review and verify the task details and click Save. Optionally, you can wake up the agent to send your client task to the endpoint immediately. 12 Restart the endpoints after upgrade. Verify the Solidcore client upgrade Verify that the Solidcore client was upgraded successfully on an endpoint. 1 On the McAfee epo console, select Menu Systems System Tree. 2 Select a group or endpoint from the list. The Systems tab provides details for the selected node. 3 Review logs from the McAfee epo console. a Select a system on the Systems page. b Select Actions Agent Show Agent Log to view the agent log for the endpoint. By default, agent logs are not enabled on the McAfee epo console. For information on how to enable agent logs, see epolicy Orchestrator Product Guide. c Check the log to verify if the software was successfully upgraded at the endpoint. 4 Review the properties for the system. a Wake up the agent to fetch properties immediately. Typically, information is exchanged between the agent and server after the ASCI lapses. The default ASCI value is 60 minutes. Send an agent wake up call to ensure immediate communication and data exchange between the server and the agent, without waiting for the ASCI to expire. b c Click a system on the Systems page to view details for the selected system. On the McAfee epo console, select the Products tab and review the Solidcore version. Click the row to review additional information, including the product version and installation path. Copyright 2013 McAfee, Inc. Do not copy without permission. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others
16 A File attributes for content change tracking When you enable content change tracking, these attributes are tracked for files. Attribute Description File Size (Bytes) Size of file in bytes. File Created Last Accessed Last Modified Read Only Hidden System Directory Archive Temporary Compressed Owner Group Time at which file was created. Time at which file was last accessed. Time at which file was last modified. Boolean value specifying whether the file is read-only. True indicates read-only file. Boolean value specifying whether the file is a hidden file. True indicates hidden file. Boolean value specifying whether the file is a system file. True indicates system file. Boolean value specifying whether the file is a directory. True indicates file is a directory. Boolean value specifying whether the file is an archive. True indicates file is an archive. Boolean value specifying whether the file is a temporary file. True indicates temporary file. Boolean value specifying whether the file is a compressed file. True indicates compressed file. Name of user who created the file. Group to which the owner belongs. 16
17 Attribute Checksum User Description SHA1 checksum of the file. Each user who has access to the file is listed. The Discretionary Access Control List (DACL) and System Access Control List (SACL) for each user is also included. Here are the details of DACL and SACL: Discretionary access control list (DACL) An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object. System access control list (SACL) An access control list that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators. 17
18 Copyright 2013 McAfee, Inc. Do not copy without permission. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others
About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.
Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response
More informationMcAfee Application Control / Change Control Administration Intel Security Education Services Administration Course
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables
More informationPOC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment
POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting
More informationPerformance Optimizer 1.0.0 Software
Product Guide Performance Optimizer 1.0.0 Software For use with epolicy Orchestrator 4.6.6-5.1.1 Introduction The Performance Optimizer analyzes the performance of your McAfee epolicy Orchestrator (McAfee
More informationMcAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0
McAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Solidcore 5.1.0 Product Guide
McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationMcAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationPrivilege Guard 3.0 Administration Guide
1 Privilege Guard 3.0 Administration Guide 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation or warranty
More informationMcAfee Threat Intelligence Exchange 1.0.1 Software
Release Notes McAfee Threat Intelligence Exchange 1.0.1 Software Contents About this release Installation instructions New features Resolved issues Known issues Product documentation About this release
More informationMcAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
More informationMcAfee Host Intrusion Prevention 8.0.0 Patch 6 Software
Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationProduct Guide. McAfee Application Control 6.1.0
Product Guide McAfee Application Control 6.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot,
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationAdministration Guide. WatchDox Server. Version 4.8.0
Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationManagement Reporter Integration Guide for Microsoft Dynamics AX
Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics AX July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationLegal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationPTC Integrity Eclipse and IBM Rational Development Platform Guide
PTC Integrity Eclipse and IBM Rational Development Platform Guide The PTC Integrity integration with Eclipse Platform and the IBM Rational Software Development Platform series allows you to access Integrity
More informationMoving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
More informationMcAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise
McAfee DAT Reputation Implementation Guide Version 1.0 for Enterprise McAfee DAT Reputation... 2 What is McAfee DAT Reputation?... 2 Rollout phases: Elective Download, AutoUpdate & AutoEnable... 3 DAT
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationThe client transfer between epo servers guide. McAfee Drive Encryption 7.1.3
The client transfer between epo servers guide McAfee Drive Encryption 7.1.3 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationAuditing manual. Archive Manager. Publication Date: November, 2015
Archive Manager Publication Date: November, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationIBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
More informationThere are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationDocument Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
More informationMcAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationNetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationSetting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationNetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationMcAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course
McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course The McAfee Host Data Loss Prevention (DLP) Administration course provides attendees with in-depth
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMicrosoft Visual Studio Integration Guide
Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration
More informationCreating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationSAS Visual Analytics 7.2 for SAS Cloud: Quick-Start Guide
SAS Visual Analytics 7.2 for SAS Cloud: Quick-Start Guide Introduction This quick-start guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics
More informationAssetWise Performance Management. APM Remote Upgrade Guide
AssetWise Performance Management APM Remote Upgrade Guide Trademark Notice Bentley, the B Bentley logo, AssetWise, Ivara, the Ivara EXP logo, Ivara Work Smart, Aladon and RCM2 are either registered or
More informationLogMeIn Backup. User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
More informationHow To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
More informationNetWrix File Server Change Reporter. Quick Start Guide
NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...
More informationUser Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMicrosoft Dynamics CRM Adapter for Microsoft Dynamics GP
Microsoft Dynamics Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP May 2010 Find updates to this documentation at the following location. http://go.microsoft.com/fwlink/?linkid=162558&clcid=0x409
More informationPerceptive Content Security
Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a
More informationCoveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
More informationUser Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMigrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationNetWrix Exchange Change Reporter
NetWrix Exchange Change Reporter Version 7 Administrator s Guide Contents NetWrix Exchange Change Reporter Administrator s Guide 1. INTRODUCTION... 4 1.1 KEY FEATURES... 5 1.2 LICENSING... 6 1.3 HOW IT
More informationCentral Security Server
Central Security Server Installation and Administration Guide Release 12.3 Please direct questions about {Compuware Product} or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/support
More informationWEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
More informationUser Guide. SysMan Utilities. By Sysgem AG
SysMan Utilities User Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013 Sysgem AG, Lavaterstr. 45, CH-8002 Zürich,
More informationDocumentum Content Distribution Services TM Administration Guide
Documentum Content Distribution Services TM Administration Guide Version 5.3 SP5 August 2007 Copyright 1994-2007 EMC Corporation. All rights reserved. Table of Contents Preface... 7 Chapter 1 Introducing
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationAdministering Jive for Outlook
Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationManagement Center. Installation and Upgrade Guide. Version 8 FR4
Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced
More informationIBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
More informationSymantec Endpoint Encryption Full Disk
Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks
More informationNetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Enterprise Edition Quick Start Guide Contents NetWrix SQL Server Change Reporter Enterprise Edition Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES...
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Patch Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationKaseya 2. User Guide. Version 6.5 and 2.0
Kaseya 2 Data Backup User Guide Version 6.5 and 2.0 January 23, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Data Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More informationAntivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee
Technical Report Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp June 2015 TR-4286 Abstract An antivirus solution is key for enterprises
More informationEmail Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationsafend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
More informationHow To Set Up A Security System For A Network Security System (Netware)
MCAFEE APPLICATION CONTROL / CHANGE CONTROL BEST PRACTICES GUIDE Version 0.4 20 December 2011 About This Guide The purpose of this guide is to provide best practices for initial usage of the three main
More information