McAfee EPOCDE-AA-BA Product Guide - Page 6

Working with the agent from the McAfee ePO server, Using the Software Manager to check in software

Page 6 highlights

Contents Subnets and IP address ranges 124 Tags and systems with similar characteristics 124 Operating systems and software 125 Tags and how they work 125 Active Directory and NT domain synchronization 126 Active Directory synchronization 126 NT domain synchronization 127 Criteria-based sorting 128 How settings affect sorting 129 IP address sorting criteria 129 Tag-based sorting criteria 130 Group order and sorting 130 Catch-all groups 130 How a system is added to the System Tree when sorted 130 Working with tags 132 Creating tags with the Tag Builder 132 Excluding systems from automatic tagging 133 Applying tags to selected systems 133 Applying criteria-based tags automatically to all matching systems 133 Creating and populating groups 135 Creating groups manually 136 Adding systems manually to an existing group 137 Exporting systems from the System Tree 138 Importing systems from a text file 138 Sorting systems into criteria-based groups 140 Importing Active Directory containers 142 Importing NT domains to an existing group 144 Synchronizing the System Tree on a schedule 146 Updating the synchronized group with an NT domain manually 147 Moving systems manually within the System Tree 147 Transferring systems between McAfee ePO servers 148 13 Working with the agent from the McAfee ePO server 149 Agent-server communication 149 Agent-server communication interval 150 Agent-server communication interruption handling 150 Wake-up calls and tasks 151 SuperAgents and broadcast wake-up calls 151 SuperAgent caching and communication interruptions 152 Viewing agent and product properties 153 Responding to policy events 153 Running client tasks immediately 154 Sending manual wake-up calls to systems 155 Sending manual wake-up calls to a group 155 Locate inactive agents 156 Queries provided by McAfee Agent 156 Windows system and product properties reported by the agent 157 14 Using the Software Manager to check in software 159 What's in the Software Manager 159 Checking in, updating, and removing software using the Software Manager 160 15 Using policies to manage products and systems 163 Policy management 163 Policy application 165 How policy assignment rules work 166 6 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Subnets and IP address ranges
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
124
Tags and systems with similar characteristics
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
124
Operating systems and software
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
125
Tags and how they work
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
125
Active Directory and NT domain synchronization
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
126
Active Directory synchronization
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
126
NT domain synchronization
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
127
Criteria-based sorting
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
128
How settings affect sorting
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
129
IP address sorting criteria
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
129
Tag-based sorting criteria
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
130
Group order and sorting
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
130
Catch-all groups
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
130
How a system is added to the System Tree when sorted
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
130
Working with tags
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
132
Creating tags with the Tag Builder
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
132
Excluding systems from automatic tagging
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
133
Applying tags to selected systems
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
133
Applying criteria-based tags automatically to all matching systems
.
.
.
.
.
.
.
.
.
.
133
Creating and populating groups
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
135
Creating groups manually
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
136
Adding systems manually to an existing group
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
137
Exporting systems from the System Tree
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
138
Importing systems from a text file
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
138
Sorting systems into criteria-based groups
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
140
Importing Active Directory containers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
142
Importing NT domains to an existing group
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
144
Synchronizing the System Tree on a schedule
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
146
Updating the synchronized group with an NT domain manually
.
.
.
.
.
.
.
.
.
.
.
.
147
Moving systems manually within the System Tree
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
147
Transferring systems between McAfee ePO servers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
148
13
Working with the agent from the McAfee ePO server
149
Agent-server communication
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
149
Agent-server communication interval
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
150
Agent-server communication interruption handling
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
150
Wake-up calls and tasks
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
151
SuperAgents and broadcast wake-up calls
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
151
SuperAgent caching and communication interruptions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
152
Viewing agent and product properties
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
153
Responding to policy events
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
153
Running client tasks immediately
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
154
Sending manual wake-up calls to systems
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
155
Sending manual wake-up calls to a group
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
155
Locate inactive agents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
156
Queries provided by McAfee Agent
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
156
Windows system and product properties reported by the agent
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
157
14
Using the Software Manager to check in software
159
What's in the Software Manager
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
159
Checking in, updating, and removing software using the Software Manager
.
.
.
.
.
.
.
.
.
.
160
15
Using policies to manage products and systems
163
Policy management
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
163
Policy application
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
165
How policy assignment rules work
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
166
Contents
6
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide