McAfee EPOCDE-AA-BA Product Guide - Page 212

About using Automatic Responses, Automatic Responses and how it works, Send SNMP traps

Page 212 highlights

18 Responding to events in your network About using Automatic Responses About using Automatic Responses The complete set of event types for which you can configure an automatic response depends on the software products you are managing with your ePolicy Orchestratorserver. By default, your response can include these actions: • Create issues • Execute server tasks • Run external commands • Run system commands • Send email messages • Send SNMP traps The ability to specify the event categories that generate a notification message and the frequencies with which such messages are sent are highly configurable. This feature is designed to create user-configured notifications and actions when the conditions of a rule are met. These include, but are not limited to: • Detection of threats by your anti-virus software product. Although many anti-virus software products are supported, events from VirusScan Enterprise include the IP address of the source attacker so that you can isolate the system infecting the rest of your environment. • Outbreak situations. For example, 1000 virus-detected events are received within five minutes. • High-level compliance of ePolicy Orchestrator server events. For example, a repository update or a replication task failed. • Detection of new rogue systems. Automatic Responses and how it works Before you plan the implementation of Automatic Responses, you should understand how this feature works with ePolicy Orchestrator and the System Tree. This feature does not follow the inheritance model used when enforcing policies. Automatic Responses use events that occur on systems in your environment that are delivered to the server and configured response rules associated with the group that contains the affected systems and each parent above it. If the conditions of any such rule are met, designated actions are taken, per the rule's configurations. 212 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

About using Automatic Responses
The complete set of event types for which you can configure an automatic response depends on the
software products you are managing with your ePolicy Orchestratorserver.
By default, your response can include these actions:
Create issues
Execute server tasks
Run external commands
Run system commands
Send email messages
Send SNMP traps
The ability to specify the event categories that generate a notification message and the frequencies
with which such messages are sent are highly configurable.
This feature is designed to create user-configured notifications and actions when the conditions of a
rule are met. These include, but are not limited to:
Detection of threats by your anti-virus software product. Although many anti-virus software
products are supported, events from VirusScan Enterprise include the IP address of the source
attacker so that you can isolate the system infecting the rest of your environment.
Outbreak situations. For example, 1000 virus-detected events are received within five minutes.
High-level compliance of ePolicy Orchestrator server events. For example, a repository update or a
replication task failed.
Detection of new rogue systems.
Automatic Responses and how it works
Before you plan the implementation of Automatic Responses, you should understand how this feature
works with ePolicy Orchestrator and the System Tree.
This feature does not follow the inheritance model used when enforcing
policies.
Automatic Responses use events that occur on systems in your environment that are delivered to the
server and configured response rules associated with the group that contains the affected systems and
each parent above it. If the conditions of any such rule are met, designated actions are taken, per the
rule’s configurations.
18
Responding to events in your network
About using Automatic Responses
212
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide