McAfee EPOCDE-AA-BA Product Guide - Page 5

Managing your network security with your ePolicy, Orchestrator server, Setting up registered servers

Page 5 highlights

Contents Using SuperAgents as distributed repositories 84 Creating SuperAgent repositories 85 Selecting which packages are replicated to SuperAgent repositories 86 Deleting SuperAgent distributed repositories 86 Creating and configuring FTP, HTTP, and UNC repositories 86 Creating a folder location on an FTP, HTTP server or UNC share 87 Adding the distributed repository to ePolicy Orchestrator 87 Avoiding replication of selected packages 89 Disabling replication of selected packages 89 Enabling folder sharing for UNC and HTTP repositories 90 Editing distributed repositories 90 Deleting distributed repositories 90 Using local distributed repositories that are not managed 91 Working with the repository list files 92 Exporting the repository list SiteList.xml file 92 Exporting the repository list SiteMgr.xml file for backup or use by other servers . . . . . 93 Importing distributed repositories from the SiteMgr.xml file 93 Importing source sites from the SiteMgr.xml file 93 Changing credentials on multiple distributed repositories 94 9 Setting up registered servers 95 Registering servers 95 Registering McAfee ePO servers 95 Registering LDAP servers 97 Registering SNMP servers 98 Registering a database server 99 10 Setting up Agent Handlers 101 Agent Handlers and what they do 101 How Agent Handlers work 101 Handler groups and priority 102 Working with Agent Handlers 103 Assigning agents to Agent Handlers 103 Managing Agent Handler assignments 104 Setting up Agent Handler groups 104 Managing Agent Handler groups 105 Moving agents between handlers 105 11 Other important server information 109 About Internet Protocols in managed environment 109 Exporting objects from ePolicy Orchestrator 110 Importing items into ePolicy Orchestrator 110 Exporting objects and data from your ePolicy Orchestrator server 111 ePolicy Orchestrator Log Files 112 The Audit Log 112 The Server Task log 114 The Threat Event Log 116 Managing your network security with your ePolicy Orchestrator server 12 Organizing the System Tree 121 The System Tree structure 121 Considerations when planning your System Tree 123 Administrator access 123 Environmental borders and their impact on system organization 124 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Using SuperAgents as distributed repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
84
Creating SuperAgent repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
85
Selecting which packages are replicated to SuperAgent repositories
.
.
.
.
.
.
.
.
.
.
86
Deleting SuperAgent distributed repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
86
Creating and configuring FTP, HTTP, and UNC repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
86
Creating a folder location on an FTP, HTTP server or UNC share
.
.
.
.
.
.
.
.
.
.
.
.
87
Adding the distributed repository to ePolicy Orchestrator
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
87
Avoiding replication of selected packages
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
89
Disabling replication of selected packages
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
89
Enabling folder sharing for UNC and HTTP repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
90
Editing distributed repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
90
Deleting distributed repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
90
Using local distributed repositories that are not managed
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
91
Working with the repository list files
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
92
Exporting the repository list SiteList.xml file
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
92
Exporting the repository list SiteMgr.xml file for backup or use by other servers
.
.
.
.
.
93
Importing distributed repositories from the SiteMgr.xml file
.
.
.
.
.
.
.
.
.
.
.
.
.
.
93
Importing source sites from the SiteMgr.xml file
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
93
Changing credentials on multiple distributed repositories
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
94
9
Setting up registered servers
95
Registering servers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
95
Registering McAfee ePO servers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
95
Registering LDAP servers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
97
Registering SNMP servers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
98
Registering a database server
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
99
10
Setting up Agent Handlers
101
Agent Handlers and what they do
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
101
How Agent Handlers work
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
101
Handler groups and priority
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
102
Working with Agent Handlers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
103
Assigning agents to Agent Handlers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
103
Managing Agent Handler assignments
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
104
Setting up Agent Handler groups
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
104
Managing Agent Handler groups
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
105
Moving agents between handlers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
105
11
Other important server information
109
About Internet Protocols in managed environment
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
109
Exporting objects from ePolicy Orchestrator
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
110
Importing items into ePolicy Orchestrator
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
110
Exporting objects and data from your ePolicy Orchestrator server
.
.
.
.
.
.
.
.
.
.
.
.
.
.
111
ePolicy Orchestrator Log Files
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
112
The Audit Log
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
112
The Server Task log
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
114
The Threat Event Log
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
116
Managing your network security with your ePolicy
Orchestrator server
12
Organizing the System Tree
121
The System Tree structure
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
121
Considerations when planning your System Tree
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
123
Administrator access
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
123
Environmental borders and their impact on system organization
.
.
.
.
.
.
.
.
.
.
.
124
Contents
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
5