McAfee EPOCDE-AA-BA Product Guide - Page 4
Creating user accounts, Setting up permission sets, Configuring advanced server settings
View all McAfee EPOCDE-AA-BA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 4 highlights
Contents Configuring the template and location for exported reports 36 Using a proxy server 36 SSL certificates 37 Enabling System Tree sorting on the server 39 ePolicy Orchestrator server settings categories and their descriptions 39 5 Creating user accounts 43 About user accounts 43 Global administrators 43 Working with user accounts 44 Creating user accounts 44 Editing user accounts 44 Deleting user accounts 45 6 Setting up permission sets 47 How users, groups, and permission sets fit together 47 Working with permission sets 49 Creating a new permission set 49 Modifying an existing permission set 50 Duplicating a permission set 50 Exporting permission sets 50 Importing permission sets 51 Removing a permission set 51 Deleting permission sets 51 7 Configuring advanced server settings 53 Configuring Active Directory user login 53 Managing ePolicy Orchestrator users with Active Directory 53 Configuring Windows authentication and authorization 56 Authenticating with certificates 58 When to use certificate authentication 58 Configuring ePolicy Orchestrator for certificate authentication 58 Uploading server certificates 59 Removing server certificates 59 Configuring users for certificate authentication 60 Problems with certificate authentication 60 Configuring Rogue System Detection server settings 61 Configuring server settings for Rogue System Detection 61 Managing security keys 64 Security keys and how they work 64 Master repository key pair 65 Agent-server secure communication (ASSC) keys 67 Backing up and restoring keys 71 Configuring source and fallback sites 73 Working with source and fallback sites 73 8 Setting up repositories 77 Repository types and what they do 78 Types of distributed repositories 79 Repository branches and their purposes 80 Repository list file and its uses 81 How repositories work together 82 Ensuring access to the source site 82 Configuring proxy settings 83 Configuring proxy settings for the McAfee Agent 83 Configuring proxy settings for McAfee Labs Security Threats 84 4 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide