McAfee EPOCDE-AA-BA Product Guide - Page 166

How policy assignment rules work, Policy assignment rule priority, Policy ownership

Page 166 highlights

15 Using policies to manage products and systems How policy assignment rules work Policy ownership All policies for products and features to which you have permissions are available from the Policy Catalog page. To prevent any user from editing other users' policies, each policy is assigned an owner - the user who created it. Ownership provides that no one can modify or delete a policy except its creator or a global administrator. Any user with appropriate permissions can assign any policy in the Policy Catalog page, but only the owner or a global administrator can edit it. If you assign a policy that you do not own to managed systems, be aware that if the owner of the named policy modifies it, all systems where this policy is assigned receive these modifications. Therefore, if you wish to use a policy owned by a different user, McAfee recommends that you first duplicate the policy, then assign the duplicate to the desired locations. This provides you ownership of the assigned policy. You can specify multiple non-global administrator users as owners of a single policy. How policy assignment rules work Policy assignments rules reduce the overhead of managing numerous policies for individual users or systems that meet specific criteria, while maintaining more generic policies across your System Tree. This level of granularity in policy assignment limits the instances of broken inheritance in the System Tree needed to accommodate the policy settings that particular users or systems require. Policy assignments can be based on either user specific or system specific criteria: • User-based policies - Policies that include at least one user specific criteria. For example, you can create a policy assignment rule that is enforced for all users in your engineering group. You can then create another policy assignment rule for members of your IT department so they can log on to any computer in the engineering network with the access rights they need to troubleshoot problems on a specific system in that network. User based policies can also include system based criteria. • System-based policies - Policies that include only system based criteria. For example, you can create a policy assignment rule that is enforced for all servers on your network based on the tags you've applied, or all systems in a specific location in your System Tree. System based policies cannot include user based criteria. Policy assignment rule priority Policy assignment rules can be prioritized to simplify maintenance of policy assignment management. When you set priority to a rule, it is enforced before other assignments with a lower priority. In some cases, the outcome can be that some rule settings are overridden. For example, consider a user or system that is included in two policy assignment rules, rules A and B. Rule A has priority level 1, and allows included users unrestricted access to internet content. Rule B has priority level 2, and heavily restricts the same user's access to internet content. In this scenario, rule A is enforced because it has higher priority. As a result, the user has unrestricted access to internet content. 166 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Policy ownership
All policies for products and features to which you have permissions are available from the
Policy Catalog
page. To prevent any user from editing other users’ policies, each policy is assigned an owner — the
user who created it.
Ownership provides that no one can modify or delete a policy except its creator or a global
administrator. Any user with appropriate permissions can assign any policy in the
Policy Catalog
page,
but only the owner or a global administrator can edit it.
If you assign a policy that you do not own to managed systems, be aware that if the owner of the
named policy modifies it, all systems where this policy is assigned receive these modifications.
Therefore, if you wish to use a policy owned by a different user, McAfee recommends that you first
duplicate the policy, then assign the duplicate to the desired locations. This provides you ownership of
the assigned policy.
You can specify multiple non-global administrator users as owners of a
single policy.
How policy assignment rules work
Policy assignments rules reduce the overhead of managing numerous policies for individual users or
systems that meet specific criteria, while maintaining more generic policies across your System Tree.
This level of granularity in policy assignment limits the instances of broken inheritance in the System
Tree needed to accommodate the policy settings that particular users or systems require. Policy
assignments can be based on either user specific or system specific criteria:
User-based policies
— Policies that include at least one user specific criteria. For example, you can
create a policy assignment rule that is enforced for all users in your engineering group. You can
then create another policy assignment rule for members of your IT department so they can log on
to any computer in the engineering network with the access rights they need to troubleshoot
problems on a specific system in that network. User based policies
can
also include system based
criteria.
System-based policies
— Policies that include only system based criteria. For example, you can
create a policy assignment rule that is enforced for all servers on your network based on the tags
you've applied, or all systems in a specific location in your System Tree. System based policies
cannot
include user based criteria.
Policy assignment rule priority
Policy assignment rules can be prioritized to simplify maintenance of policy assignment management.
When you set priority to a rule, it is enforced before other assignments with a lower priority.
In some cases, the outcome can be that some rule settings are overridden. For example, consider a
user or system that is included in two policy assignment rules, rules A and B. Rule A has priority level
1, and allows included users unrestricted access to internet content. Rule B has priority level 2, and
heavily restricts the same user's access to internet content. In this scenario, rule A is enforced
because it has higher priority. As a result, the user has unrestricted access to internet content.
15
Using policies to manage products and systems
How policy assignment rules work
166
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide