McAfee EPOCDE-AA-BA Product Guide - Page 287

Default Rogue System Detection queries, Switch, Description, Query, Definition

Page 287 highlights

Detecting Rogue Systems Default Rogue System Detection queries 21 Switch --port Description Overrides the Server Port configuration setting in the registry that you specified during installation. This parameter takes effect only when running in command-line mode, which also requires the --console command-line switch. Sample syntax:sensor.exe --port "8081" --console --server "[server name]" or "[IP address]" Overrides the Server Name configuration setting in the registry that you specified during installation. This parameter takes effect only when running in command-line mode, which also requires the --console command-line switch. Sample syntax:sensor.exe --server "MyServerName" --console --uninstall --version Unregisters the sensor with the Windows Service Control Manager. Prints the version of the sensor and exits. Default Rogue System Detection queries Rogue System Detection provides default queries that you can use to retrieve specific information from your network. These queries can be modified or duplicated in the same manner as other queries in ePolicy Orchestrator. You can also create custom queries, display query results in dashboard monitors, and add those dashboard monitors to the Dashboards section in ePolicy Orchestrator. For more information on using dashboards, seeAssessing Your Environment With Dashboards. Rogue System Detection query definitions Query Active Sensor Response (Last 24 Hours) Passive Sensor Response (Last 24 Hours) Rogue Systems, By Domain (Last 7 Days) Rogue Systems, By OS (Last 7 Days) Rogue Systems, By OUI (Last 7 Days) Subnet Coverage Definition Returns the details of active sensors installed on your network in the last 24 hours, in pie chart format. Returns the details of passive sensors installed on your network in the last 24 hours, in pie chart format. Returns the details of systems detected on your network as rogue systems in the last seven days, grouped by domain, in table format. Returns the details of systems detected on your network as rogue systems in the last seven days, grouped by operating system, in pie chart format. Returns the details of systems detected on your network as rogue systems in the last seven days, grouped by organizationally unique identifier, in pie chart format. Returns the details of detected subnets on your network, in pie chart format. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 287

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Switch
Description
--port
Overrides the Server Port configuration setting in the registry that you specified
during installation.
This parameter takes effect only when running in command-line mode, which
also requires the
--console
command-line switch.
Sample syntax:
sensor.exe --port "8081" --console
--server
"[server
name]" or "[IP
address]"
Overrides the Server Name configuration setting in the registry that you
specified during installation.
This parameter takes effect only when running in command-line mode, which
also requires the
--console
command-line switch.
Sample syntax:
sensor.exe --server "MyServerName" --console
--uninstall
Unregisters the sensor with the Windows Service Control Manager.
--version
Prints the version of the sensor and exits.
Default Rogue System Detection queries
Rogue System Detection provides default queries that you can use to retrieve specific information
from your network. These queries can be modified or duplicated in the same manner as other queries
in ePolicy Orchestrator. You can also create custom queries, display query results in dashboard
monitors, and add those dashboard monitors to the Dashboards section in ePolicy Orchestrator.
For more information on using dashboards, see
Assessing Your Environment With Dashboards
.
Rogue System Detection query definitions
Query
Definition
Active Sensor Response (Last
24 Hours)
Returns the details of active sensors installed on your network in the last
24 hours, in pie chart format.
Passive Sensor Response (Last
24 Hours)
Returns the details of passive sensors installed on your network in the last
24 hours, in pie chart format.
Rogue Systems, By Domain
(Last 7 Days)
Returns the details of systems detected on your network as rogue systems
in the last seven days, grouped by domain, in table format.
Rogue Systems, By OS (Last 7
Days)
Returns the details of systems detected on your network as rogue systems
in the last seven days, grouped by operating system, in pie chart format.
Rogue Systems, By OUI (Last 7
Days)
Returns the details of systems detected on your network as rogue systems
in the last seven days, grouped by organizationally unique identifier, in pie
chart format.
Subnet Coverage
Returns the details of detected subnets on your network, in pie chart format.
Detecting Rogue Systems
Default Rogue System Detection queries
21
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
287