Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide
About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Risk Advisor 2.7.0 Getting Started Guide
Contents Preface... 4 About this guide...4 Audience...4 Conventions...4 Getting Started... 5 1. Ensure that System Requirements are met...5 2. Check your database settings...6 3. Install the product...9 4. Configure Application Inventory agent...9 5. Perform analysis... 13 5. View reports using dashboards... 13 McAfee Risk Advisor Getting Started Guide 3
Preface This guide provides the information you need to configure Beta release of the McAfee Risk Advisor 2.7 product. About this guide Audience Conventions This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. This guide uses the following typographical conventions and icons. Book title or Emphasis Bold User input, Path, or Code Hypertext Title of a book, chapter, or topic; introduction of a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program; a code sample. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning/Danger: Critical advice to prevent bodily harm when using a hardware product. 4 McAfee Risk Advisor 2.7 Getting Started Guide
Getting Started You need to perform a series of steps to setup and test your McAfee Risk Advisor software. Download the McAfee Risk Advisor Beta build from the Beta download page and perform these tasks: 1. Ensure that System Requirements are met. 2. Check your database settings. 3. Install the product. 4. Configure the McAfee Application Inventory agent. 5. Perform the analysis. 6. View reports using dashboards. 1. Ensure that System Requirements are met McAfee Risk Advisor 2.7 supports all operating systems, browsers, databases, and virtualization platforms supported by epolicy Orchestrator. However, consider the following: 1) Supported McAfee epo versions: McAfee epolicy Orchestrator 4.5 (RTW to Patch5) McAfee epolicy Orchestrator 4.6 (RTW and Patch 1) 2) Disk space on McAfee epo: McAfee Risk Advisor requires at least 50 MB of free space on the server. 3) Database server requirements: Disk Space: If there are around 5000 assets on McAfee epo System Tree, we recommend to have 40 GB of free space on the database server for storing McAfee Risk Advisor data. This is a beta build with focus on evaluating new features of McAfee Risk Advisor 2.7. We strongly recommend not to have more than 5000 assets in the McAfee epo System Tree on the beta environment. The database user installing the product must have sysadmin privileges. The database account privileges can be reverted, if required, after the successful installation. 5 McAfee Risk Advisor 2.7 Getting Started Guide
2. Check your database settings 1) Check whether the database user name in McAfee epo database settings is correct. To do this: a. In the McAfee epo console, open the Configure Database Settings page (https://<eposerver>:8443/core/config), then note down the User name listed. For example, sa. b. In the Microsoft SQL Server Management Studio console, right click on the epo database (epo4_win-xxxxxxx) and select Properties. In the General tab, the value for Owner must be the same as the User name in the step 1a (sa). 6 McAfee Risk Advisor 2.7.0 Getting Started Guide
c. If the values are not the same, request to correct this and restart McAfee epo services once done. 2) Check the SQL collation settings. To do this: a. In the Microsoft SQL Server Management Studio console, right click on the database server name/ip (<IP>(SQL Server)) in the Object Explorer and select Properties, then note down the value for Server Collation. (Ensure that it's SQL_Latin1_General_CP1_CI_AS.) McAfee Risk Advisor Getting Started Guide 7
b. Then expand the Databases tree in Object Explorer, then right click on the epo database (epo4_win-xxxxxxx) and select Properties. In the General tab, the value for Collation must be the same as Server Collation in the step 2a. (Ensure that it's SQL_Latin1_General_CP1_CI_AS.) c. Collations in 2a and 2b should be the same and must be equal to SQL_Latin1_General_CP1_CI_AS. 8 McAfee Risk Advisor 2.7.0 Getting Started Guide
3) Ensure that SQL Server Full Text Search service is installed and running. This service is required to configure and use the application awareness feature. a. On SQL Server 2005, you can find this service listed as SQL Server Fulltext Search (MSSQLSERVER). b. On SQL Server 2008/2008R2, you can find this service listed as SQL Server Fulltext Filter Daemon Launcher (MSSQLSERVER). c. Ensure that this service is in the running state and is configured to start automatically every time the system of SQL server is rebooted. d. If the Login accounts are different please make them the same, then restart SQL Server service and SQL Server Full-text Filter Daemon Launcher service. 3. Install the product 1) Run the McAfee Risk Advisor installation program, setup.exe. 2) After the product is installed successfully, allow the MRA: Prepackaged Threat Import and Reconciliation task to complete. The task status can be tracked in the McAfee epo Server Task Log. 4. Configure Application Inventory agent 1) Verify the agent extension Ensure that the MRA Application Inventory is listed under Risk Advisor extension and is in the running state. McAfee Risk Advisor Getting Started Guide 9
2) Verify the agent package Check that the McAfee Application Inventory agent package is checked into the McAfee epo Master Repository. 3) Deploy the agent Create a client task to deploy the McAfee Application Inventory agent plug-in onto the target systems. 10 McAfee Risk Advisor 2.7.0 Getting Started Guide
4) Check under installed products on the System Properties page Once the client installation is complete, ensure that the McAfee Application Inventory Agent listed as an installed product in the System Properties page for an asset. This happens only after the McAfee Agent has sent in the updated properties from the system at the next Agent-to-Server communication. McAfee Risk Advisor Getting Started Guide 11
5) Check the agent status in McAfee Agent Monitor screen In the McAfee Agent Monitor, look for the tracking entries about the policies for the Application Inventory(MRAAPPIN ) being enforced on the end-points at every ASCI. 12 McAfee Risk Advisor 2.7.0 Getting Started Guide
5. Perform analysis 1) Once the Application Inventory data from the end-points are collected and stored on the epo server database, run the McAfee Risk Advisor analysis task (MRA: Threat Download and Analysis) to use the data from Application Inventory and refresh the risk metrics to become Application Aware. 2) If you edit the MRA: Threat Download and Analysis task, you could see Application Inventory as a data import option under the MRA: Data Import/Reconciliation action in the Server Task Builder screen. 3) Please note that downloading threat data from MTIS server during the first time execution of the MRA: Threat Download and analysis task may take anywhere between 2-3 hours, depending upon network bandwidth. We are working on this issue. 4) Also, User can create a separate server task for any of these Actions below a. MRA: Threat Feed Download b. MRA: Data Import/Reconciliation c. MRA: Threat Asset coverage Analysis 5. View reports using dashboards After the MRA: Threat download and Analysis task is complete, view the reports provided by the following McAfee Risk Advisor dashboards. (You can even customize some of the dashboards, as required.) MRA: Threat Dashboard McAfee Risk Advisor Getting Started Guide 13
MRA: Security Bulletin Dashboard 14 McAfee Risk Advisor 2.7.0 Getting Started Guide