McAfee EPOCDE-AA-BA Product Guide - Page 318

F, G, events, Rogue System Detection

Page 318 highlights

Index ePolicy Orchestrator adding to trusted sites 259 ePolicy Orchestrator software about 15 Evaluation branch defined 80 using for new DATs and engine 206 evaluation mode 34 events notification intervals 33 compliance events 250 determining which are forwarded 32 filtering, server settings 39 forwarding and notifications 215 events, Rogue System Detection actions and 282 sensor settings 63 exceptions Rogue System Blacklist 269 rogue system status 266 Exceptions list adding systems 276 compared to Rogue Sensor Blacklist 269 exporting 278 importing systems to 278 removing systems from 280 executables configuring 220 deleting 221 editing, notifications and 221 registered, adding 221 registered, duplicating 221 working with, for responses 220 exporting about 110 client task objects 111 dashboards 111 permission sets 50 policies 111 policy assignments 111 queries 111 reports 260 repositories 111 responses 111, 217 systems 111 tags 111 tasks 111 exporting systems 138 extension files installing 207 Rogue System Detection 265 F fallback sites about 78 configuring 73 deleting 75 edit existing 75 switching to source 75 features, ePolicy Orchestrator components 16 filters Event Filtering settings 39 for server task log 115 query results 242 setting for response rules 223 FTP repositories about 79 creating and configuring 86 editing 90 enabling folder sharing 90 G geographic borders, advantages of 124 global administrators about 43 changing passwords on user accounts 44 creating groups 121 creating user accounts 44 deleting permission sets 51 deleting user accounts 45 permissions 43 source sites, configuring 73 global unique identifier (GUID) 130 global updates contents 33 global updating enabling 191 process description 190 requirements 190 grouping, See notifications groups catch-all 130 configuring criteria for sorting 140 controlling access 47 creating manually 136 criteria-based 130 defined 121 importing NT domains 144 moving systems manually 147 operating systems and 125 pasting policy assignments to 179 policies, inheritance of 121 policy enforcement for a product 178 sorting criteria 140 sorting, automated 124 318 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

ePolicy Orchestrator
adding to trusted sites
259
ePolicy Orchestrator software
about
15
Evaluation branch
defined
80
using for new DATs and engine
206
evaluation mode
34
events
notification intervals
33
compliance events
250
determining which are forwarded
32
filtering, server settings
39
forwarding and notifications
215
events, Rogue System Detection
actions and
282
sensor settings
63
exceptions
Rogue System Blacklist
269
rogue system status
266
Exceptions list
adding systems
276
compared to Rogue Sensor Blacklist
269
exporting
278
importing systems to
278
removing systems from
280
executables
configuring
220
deleting
221
editing, notifications and
221
registered, adding
221
registered, duplicating
221
working with, for responses
220
exporting
about
110
client task objects
111
dashboards
111
permission sets
50
policies
111
policy assignments
111
queries
111
reports
260
repositories
111
responses
111
,
217
systems
111
tags
111
tasks
111
exporting systems
138
extension files
installing
207
Rogue System Detection
265
F
fallback sites
about
78
configuring
73
deleting
75
edit existing
75
switching to source
75
features, ePolicy Orchestrator
components
16
filters
Event Filtering settings
39
for server task log
115
query results
242
setting for response rules
223
FTP repositories
about
79
creating and configuring
86
editing
90
enabling folder sharing
90
G
geographic borders, advantages of
124
global administrators
about
43
changing passwords on user accounts
44
creating groups
121
creating user accounts
44
deleting permission sets
51
deleting user accounts
45
permissions
43
source sites, configuring
73
global unique identifier (GUID)
130
global updates
contents
33
global updating
enabling
191
process description
190
requirements
190
grouping, See notifications
groups
catch-all
130
configuring criteria for sorting
140
controlling access
47
creating manually
136
criteria-based
130
defined
121
importing NT domains
144
moving systems manually
147
operating systems and
125
pasting policy assignments to
179
policies, inheritance of
121
policy enforcement for a product
178
sorting criteria
140
sorting, automated
124
Index
318
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide