McAfee EPOCDE-AA-BA Product Guide - Page 316

B, C, D, BMC Remedy Action Request System

Page 316 highlights

Index B bandwidth considerations for event forwarding 32 considerations for pull tasks 192 distributed repositories and 78 replication tasks and 193 Rogue System Sensor and 273 sensor-to-server traffic 273 best practices agent-to-server communication interval 149 duplicating policies before assigning 165 importing Active Directory containers 142 policy assignment locking 165 product deployment 200 System Tree creation 135 BMC Remedy Action Request System versions 6.3 and 7.0 297 borders (See System Tree organization) 124 branches Change Branch action 206 Current 195, 209 deleting DAT and engine packages 208 Evaluation 206 manually moving packages between 208 Previous 207 types of, and repositories 80 broadcast segments and Rogue System Sensor 272 Broken Inheritance creating queries 170 C catch-all groups 130 certificate authentication configuring ePolicy Orchestrator 58 configuring users 60 disabling 59 enabling 59 introduction to 58 strategies for use 58 troubleshooting 60 uploading server certificates 59 Change Branch action 206 charts (See queries) 242 Check IP Integrity action 129 client tasks about 199, 200 client task catalog 200 creating and scheduling 204 deleting 205 editing settings for 205 installing RSD sensors 282 objects 200 sharing 200 working with 204 command-line options notifications and registered executables 221 rogue system detection 286 communication port, Rogue System Detection 269 communication to the server 273 compliance compliant systems 266 configuring RSD settings 61 creating a query for 250 generating events 250 components ePolicy Orchestrator server, about 16 ePolicy Orchestrator, about 16 repositories, about 78 configuration essential features 27 general server settings 31 overview 22 contacts responses and 224 conventions and icons used in this guide 11 creating issues 290 creating tickets 296 credentials caching deployment 31 modifying database registrations 262 changing, on distributed repositories 94 criteria-based tags applying 133, 134 sorting 140 Current branch checking in update packages 209 defined 80 for updates 195 custom login messages 34 D dashboard monitors configuring 234 moving and resizing 235 removing 231 working with 234 dashboards setting defaults 32 adding monitors 230 configuring for exported reports 36 configuring monitors 234 copying 231 creating 230 default 233 default monitors 235 deleting 232 export 232 granting permissions to 233 import 232 316 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

B
bandwidth
considerations for event forwarding
32
considerations for pull tasks
192
distributed repositories and
78
replication tasks and
193
Rogue System Sensor and
273
sensor-to-server traffic
273
best practices
agent-to-server communication interval
149
duplicating policies before assigning
165
importing Active Directory containers
142
policy assignment locking
165
product deployment
200
System Tree creation
135
BMC Remedy Action Request System
versions 6.3 and 7.0
297
borders (See System Tree organization)
124
branches
Change Branch action
206
Current
195
,
209
deleting DAT and engine packages
208
Evaluation
206
manually moving packages between
208
Previous
207
types of, and repositories
80
broadcast segments and Rogue System Sensor
272
Broken Inheritance
creating queries
170
C
catch-all groups
130
certificate authentication
configuring ePolicy Orchestrator
58
configuring users
60
disabling
59
enabling
59
introduction to
58
strategies for use
58
troubleshooting
60
uploading server certificates
59
Change Branch action
206
charts (See queries)
242
Check IP Integrity action
129
client tasks
about
199
,
200
client task catalog
200
creating and scheduling
204
deleting
205
editing settings for
205
installing RSD sensors
282
objects
200
sharing
200
working with
204
command-line options
notifications and registered executables
221
rogue system detection
286
communication port, Rogue System Detection
269
communication to the server
273
compliance
compliant systems
266
configuring RSD settings
61
creating a query for
250
generating events
250
components
ePolicy Orchestrator server, about
16
ePolicy Orchestrator, about
16
repositories, about
78
configuration
essential features
27
general server settings
31
overview
22
contacts
responses and
224
conventions and icons used in this guide
11
creating issues
290
creating tickets
296
credentials
caching deployment
31
modifying database registrations
262
changing, on distributed repositories
94
criteria-based tags
applying
133
,
134
sorting
140
Current branch
checking in update packages
209
defined
80
for updates
195
custom login messages
34
D
dashboard monitors
configuring
234
moving and resizing
235
removing
231
working with
234
dashboards
setting defaults
32
adding monitors
230
configuring for exported reports
36
configuring monitors
234
copying
231
creating
230
default
233
default monitors
235
deleting
232
export
232
granting permissions to
233
import
232
Index
316
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide