McAfee EPOCDE-AA-BA Product Guide - Page 323

S, Run Tag Criteria action

Page 323 highlights

reports about 251 adding elements 254 adding to a group 258 configuring chart elements 256 configuring image elements 254 configuring table elements 255 configuring template and location for 36 configuring text elements 255 creating 253 deleting 261 editing existing 253 exported query results 240 exporting 260 formats 240 headers and footers 256 importing 261 removing elements 257 reordering elements 258 running 259 running with a server task 260 scheduling 260 structure and page size 251 viewing output 258 working with 252 repositories branches 80, 206, 208 creating SuperAgent repository 85 how they work together 82 importing from repository list files 93 master, configuring proxy settings for 83 replication and selection of 193 replication tasks 197 scheduling a pull task 194 scheduling a replication task 196 security keys 64, 66 source site 78, 195 types of 78 unmanaged, copying content to 91 repository list files about 81 adding distributed repository to 87 exporting to 92, 93 importing from 93 priority of Agent Handlers 102 SiteList.xml, uses for 81 working with 92 Response Builder wizard 224 response rules creating and editing 222 Description page 222 setting filters for 223 setting thresholds 223 responses assigning permissions 217 Index responses (continued) configuring 216, 220, 224 configuring to automatically create issues 291 contacts for 224 event forwarding 214 frequently asked questions 226 planning 214 registered executables, working with 220 rules that trigger 224 SNMP servers 217, 219 Rogue Sensor Blacklist about 269 adding systems 277 removing systems from 280 Rogue System Detection about 265 compliance settings 61 configuring server settings 61 deploying sensors 281 operating system support 272 policy configuration 275 policy settings 269 sensor blacklist 269 sensor settings 63 sensor-to-server communication port 269 status and states 266 working with subnets 284-286 Rogue System Sensor about 272 active, configuring 63 blacklist 269 data gathering 273 installation 281 installing 282 operating systems and 272 removing 283 Rogue System Detection settings, configuring 63 status and sensor states 267 traffic and intelligent filtering 272 working with 280 rogue systems about 265 system status 266 Top 25 Subnets list 268 rules configuring contacts for responses 224 defaults for notifications 213 setting up for notifications, SNMP servers 220 Run Tag Criteria action 132 S scalability about 21 horizontal 21 planning 21 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 323

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

reports
about
251
adding elements
254
adding to a group
258
configuring chart elements
256
configuring image elements
254
configuring table elements
255
configuring template and location for
36
configuring text elements
255
creating
253
deleting
261
editing existing
253
exported query results
240
exporting
260
formats
240
headers and footers
256
importing
261
removing elements
257
reordering elements
258
running
259
running with a server task
260
scheduling
260
structure and page size
251
viewing output
258
working with
252
repositories
branches
80
,
206
,
208
creating SuperAgent repository
85
how they work together
82
importing from repository list files
93
master, configuring proxy settings for
83
replication and selection of
193
replication tasks
197
scheduling a pull task
194
scheduling a replication task
196
security keys
64
,
66
source site
78
,
195
types of
78
unmanaged, copying content to
91
repository list files
about
81
adding distributed repository to
87
exporting to
92
,
93
importing from
93
priority of Agent Handlers
102
SiteList.xml, uses for
81
working with
92
Response Builder wizard
224
response rules
creating and editing
222
Description page
222
setting filters for
223
setting thresholds
223
responses
assigning permissions
217
responses
(continued)
configuring
216
,
220
,
224
configuring to automatically create issues
291
contacts for
224
event forwarding
214
frequently asked questions
226
planning
214
registered executables, working with
220
rules that trigger
224
SNMP servers
217
,
219
Rogue Sensor Blacklist
about
269
adding systems
277
removing systems from
280
Rogue System Detection
about
265
compliance settings
61
configuring server settings
61
deploying sensors
281
operating system support
272
policy configuration
275
policy settings
269
sensor blacklist
269
sensor settings
63
sensor-to-server communication port
269
status and states
266
working with subnets
284
286
Rogue System Sensor
about
272
active, configuring
63
blacklist
269
data gathering
273
installation
281
installing
282
operating systems and
272
removing
283
Rogue System Detection settings, configuring
63
status and sensor states
267
traffic and intelligent filtering
272
working with
280
rogue systems
about
265
system status
266
Top 25 Subnets list
268
rules
configuring contacts for responses
224
defaults for notifications
213
setting up for notifications, SNMP servers
220
Run Tag Criteria action
132
S
scalability
about
21
horizontal
21
planning
21
Index
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
323