Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software



Similar documents
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee Risk Advisor 2.7

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Gateway 7.x Encryption and IronPort Integration Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator Software

Release Notes for McAfee epolicy Orchestrator 4.5

McAfee VirusScan Enterprise for Linux Software

epolicy Orchestrator Log Files

Desktop Release Notes. Desktop Release Notes 5.2.1

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement

Recommended Recommended for all environments. Apply this update at the earliest convenience.

Product Guide Revision A. McAfee Secure Web Mail Client Software

Release Notes for McAfee VirusScan Enterprise for Storage 1.0

McAfee Agent Handler

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Product Guide Revision A. McAfee Secure Web Mail Client Software

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Total Protection Service

Implementing McAfee Device Control Security

Installation Guide. McAfee Security for Microsoft Exchange Software

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

McAfee Total Protection Service Installation Guide

Installation Guide. McAfee epolicy Orchestrator Software

McAfee GTI Proxy Administration Guide

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x

McAfee SiteAdvisor Enterprise 3.5.0

McAfee Solidcore Product Guide

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise

Verizon Internet Security Suite Powered by McAfee User Guide

Product Guide. McAfee epolicy Orchestrator Software

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.

McAfee Host Intrusion Prevention Patch 6 Software

McAfee Cloud Identity Manager

McAfee Security for Microsoft SharePoint User Guide

McAfee Cloud Identity Manager

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee epolicy Orchestrator

McAfee Cloud Identity Manager

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6

Release Notes for McAfee(R) GroupShield(TM) version Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS

Microsoft SQL 2008 / R2 Configuration Guide

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

McAfee Content Security Reporter 2.0.0

McAfee VirusScan Enterprise 8.8 software Product Guide

Data Center Connector for vsphere 3.0.0

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Data Center Connector for OpenStack

Setup Guide. Archiving for Microsoft Exchange Server 2007

McAfee Endpoint Security Software

McAfee Asset Manager Console

McAfee VirusScan Enterprise 8.8 software Installation Guide

Installation Guide. McAfee VirusScan Enterprise for Linux Software

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee Data Loss Prevention Endpoint

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1

McAfee Content Security Reporter Software

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

McAfee Endpoint Encryption for PC 7.0

McAfee Public Cloud Server Security Suite

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee Change Control and Application Control Product Guide For use with epolicy Orchestrator and 4.6.0

Installation Guide Revision B. McAfee epolicy Orchestrator Software

Installation Guide. McAfee epolicy Orchestrator Software

Product Guide. McAfee Endpoint Security 10

McAfee UTM Firewall Control Center Product Guide. version 2.0

Setup Guide. Archiving for Microsoft Exchange Server 2010

Performance Optimizer Software

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

McAfee SaaS Archiving

Setup Guide Revision B. McAfee SaaS Archiving for Microsoft Exchange Server 2010

Product Guide Revision A. McAfee Web Reporter 5.2.1

Best Practices Guide. McAfee Security for Microsoft Exchange Software

Installation Guide. McAfee epolicy Orchestrator Software

McAfee Cloud Single Sign On

McAfee Host Intrusion Prevention 8.0 Product Guide for use with epolicy Orchestrator 4.5

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

Feith Rules Engine Version 8.1 Install Guide

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

SQL Server 2008 R2 Express Edition Installation Guide

McAfee Database Activity Monitoring 5.0.0

McAfee Enterprise Security Manager 9.3.2

McAfee Data Loss Prevention Endpoint 9.4.0

Setup Guide Revision A. WDS Connector

McAfee Policy Auditor software Installation Guide

Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited

Compatibility with Encryption Products

Installing Sage ACT! 2013 for New Users

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version

Installation Guide. McAfee SaaS Endpoint Protection 6.0

McAfee Directory Services Connector extension

Transcription:

Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying the extension Resolved issues Known issues Finding product documentation About this document Thank you for choosing McAfee Risk Advisor 2.6.2. This document contains important information about this release. We strongly recommend that you read the entire document. Caution McAfee strongly recommends that you use any pre-release software (Beta or Evaluation build) in a test environment only. Pre-release software should not be installed in a production environment. We do not support automatic upgrading of an earlier version to a pre-release version of the software. New features New and updated features in the current release of the software are described below: Feature Ability to query application inventory Description McAfee Risk Advisor users can query application inventory using the following pre-defined queries: In Application Inventory query group: Inventory of All Applications Query for the existence of selected applications across all assets. Inventory of Applications on each Asset Query for ALL or selected applications from an Asset. Top 10 Applications on Desktop Query for the top 10 most prevalent applications found on all desktops. Top 10 Applications on Server Query for the top 10 most prevalent applications found on all servers. In Risk Advisor query group: MRA: Top 10 Prevalent Applications across Threats Query for the top 10 most prevalent applications across threats. Quick Search in Vulnerability Centric View Reduced time taken to complete McAfee Risk Advisor users can search for specific vulnerabilities using the filters such as Vulnerability, Description, CVE References, Threat Name, and Threat Vendor fields. McAfee Risk Advisor users can perform the risk analysis task faster during

the analytics Backward compatibility with the McAfee Application Inventory plugin for McAfee Risk Advisor 2.6.1 subsequent runs. For details about performance improvement in this release, refer to the MRA 2.6.2 Database Sizing and Resource Usage Guide. McAfee Risk Advisor 2.6.2 server supports the systems with McAfee Risk Advisor 2.6.1 Application Inventory plug-in. System Requirements This release supports a full installation of the product as well as an upgrade from McAfee Risk Advisor 2.6.x. Supported McAfee epolicy Orchestrator version(s): epolicy Orchestrator 4.5 epolicy Orchestrator 4.6 Supported Database: Microsoft SQL 2005 and above Caution McAfee Risk Advisor may not function properly if Microsoft SQL 2005 is running in SQL 2000 Compatibility Mode. Any customization to the Microsoft SQL Server installation should follow the best practice guidelines provided by the database vendor. McAfee Risk Advisor does not support the use of SQL Express. SQL Server's Full Text Search service must be running prior to the upgrade and epolicy Orchestrator database user should have permission to use the service. The Full Text Search service is used in Application Data Reconciliation. Rollup reporting requirements The versions of the master and slaves need to be same. This is consistent to the epolicy Orchestrator Rollup reporting functionality. Hence, the following epolicy Orchestrator master slave combinations are supported: Master 4.6.x, Slaves 4.5.x Master 4.6.x, Slaves 4.6.x Master 4.5.x, Slaves 4.5.x The following McAfee Risk Advisor versions are supported: Master 2.6.x, Slaves 2.6.x Disk Space Requirements McAfee Risk Advisor requires a minimum of 4 GB free disk space on the database where McAfee Risk Advisor files are to be stored. The required disk space also depends upon the number of assets being managed by epolicy Orchestrator server. For database sizing guidelines, refer to the MRA 2.6.2 Database Sizing and Resource Usage Guide.

Supported Upgrades You can upgrade to McAfee Risk Advisor 2.6.2 from the following versions: McAfee Risk Advisor 2.6.0 McAfee Risk Advisor 2.6.1 Installing and verifying the extension Task 1 Close the epolicy Orchestrator console. 2 Run the installation program for McAfee Risk Advisor, Setup.exe. 3 In the Setup Requirements screen, verify that the message All required applications were found appears, then click Next. If this message does not appear, cancel the installation and install the applications specified, then run the McAfee Risk Advisor installation program again. 4 In the Welcome screen, click Next to continue. 5 From the drop-down lists, select a license type and the location where the product will be used. 6 Select I accept the terms in the license agreement, then click OK. 7 If this is an upgrade, skip to the next step. Otherwise, the Choose Destination Folder screen appears. Accept the default location or browse to another location, then click Next. Make sure that no MRA task is running while doing an upgrade. 8 In the Set Administrator Information screen, provide the epolicy Orchestrator global administrator user name and password, then click Next. 9 From the list that appears in the Set Optional Information screen, select the appropriate options and click Next. Options are: Products Select the point-products from which you want McAfee Risk Advisor to import data, or click Select All for all available point-product extensions. Risk Advisor Rollup Reporting extension for epo Select this for Rollup Reporting. Application Awareness Select this to allow considering Application Inventory agent data during risk analysis. Select all the point-products you want, even if you didn't select them during your previous installation. Data import extensions for the products that are not selected are uninstalled. 10 In the Start Copying Files screen, review your installation settings, then click Next to begin installation. 11 When the upgrade is complete, click Finish. 12 Verify that McAfee Risk Advisor is upgraded with all the features selected during installation. To verify that McAfee Risk Advisor was successfully upgraded, click Menu Software Extensions, select Risk Advisor from the Extensions list, then verify that the version number is 2.6.2. Verify that the data import extensions selected during installation are available under Risk Advisor. For example, MRA Foundstone, MRA HIPS, MRA Network Security Manager, MRA Policy Auditor, MRA VSE, MRA Solidcore, MRA Rollup Reporting, and MRA Application Inventory. If application awareness was selected during installation, verify that The Application Inventory extension is installed. The MRA Application Inventory extension is installed under Risk Advisor.

The McAfee Application Inventory package is installed under Menu Software Master Repository. Resolved issues Here is a list of issues from previous releases of the software that have been fixed in this release. 1 Issue MRA Rollup: Roll Up Risk Advisor Data task fails intermittently on epolicy Orchestrator 4.6. 2 Issue NSM countermeasure declaration doesn't happen automatically from NSM alerts data. Known issues Here is a list of known issues in this release of the software. 1 Issue McAfee Risk Advisor installation fails when epolicy Orchestrator and SQL server are configured with different database collations. Workaround Configure epolicy Orchestrator and SQL Server to the same database collation, and then install McAfee Risk Advisor. 2 Issue The results for Quick Find search using special characters are not retained when a user revists the results page. Workaround Click Clear and perform the search again. 3 Issue The install log files/folders are still mentioned as MRA 260. Finding product documentation Finding product documentation McAfee provides the information you need during each phase of product implementation, from installing to using and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com. 2 Under Self Service, access the type of information you need: To access user documentation To access the KnowledgeBase 1 Click Product Documentation. 2 Select a Product, then select a Version. Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 3 Select a product document. COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.

LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.