McAfee EPOCDE-AA-BA Product Guide - Page 64

Managing security keys, Security keys and how they work, Agent-server secure communication ASSC keys

Page 64 highlights

7 Configuring advanced server settings Managing security keys 3 Edit the Sensors per Subnet field to set the maximum number of sensors active in each subnet, or select All sensors active. 4 Add a list of Sensor Scanning MAC addresses and OUIs that the sensors should not actively probe, regardless of the configured policy. 5 Edit the Active Period time field to set the maximum amount of time that passes before the server tells a sensor to sleep, to allow a new sensor to become active. The Active Period setting does not set the communication times for the active and inactive sensors. Communication time is configured using communication policy settings for Rogue System Detection. 6 Click Save. Managing security keys Security keys are used to verify and authenticate communications and content within your ePolicy Orchestrator managed environment. Contents Security keys and how they work Master repository key pair Agent-server secure communication (ASSC) keys Backing up and restoring keys Security keys and how they work The ePolicy Orchestrator server relies on three security key pairs. The three security pairs are used to: • Authenticate agent-server communication. • Verify the contents of local repositories. • Verify the contents of remote repositories. Each pair's secret key signs messages or packages at their source, while the pair's public key verifies the messages or packages at their target. Agent-server secure communication (ASSC) keys • The first time the agent communicates with the server, it sends its public key to the server. • From then on, the server uses the agent public key to verify messages signed with the agent's secret key. • The server uses its own secret key to sign its message to the agent. • The agent uses the server's public key to verify the agent's message. • You can have multiple secure communication key pairs, but only one can be designated as the master key. 64 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

3
Edit the
Sensors per Subnet
field to set the maximum number of sensors active in each subnet, or
select
All sensors active
.
4
Add a list of
Sensor Scanning
MAC addresses and OUIs that the sensors should not actively probe,
regardless of the configured policy.
5
Edit the
Active Period
time field to set the maximum amount of time that passes before the server
tells a sensor to sleep, to allow a new sensor to become active.
The Active Period setting does not set the communication times for the
active and inactive sensors. Communication time is configured using
communication policy settings for Rogue System Detection.
6
Click
Save
.
Managing security keys
Security keys are used to verify and authenticate communications and content within your ePolicy
Orchestrator managed environment.
Contents
Security keys and how they work
Master repository key pair
Agent-server secure communication (ASSC) keys
Backing up and restoring keys
Security keys and how they work
The ePolicy Orchestrator server relies on three security key pairs.
The three security pairs are used to:
Authenticate agent-server communication.
Verify the contents of local repositories.
Verify the contents of remote repositories.
Each pair's secret key signs messages or packages at their source, while the pair's public key verifies
the messages or packages at their target.
Agent-server secure communication (ASSC) keys
The first time the agent communicates with the server, it sends its public key to the server.
From then on, the server uses the agent public key to verify messages signed with the agent's
secret key.
The server uses its own secret key to sign its message to the agent.
The agent uses the server's public key to verify the agent's message.
You can have multiple secure communication key pairs,
but only one can be designated as the
master key
.
7
Configuring advanced server settings
Managing security keys
64
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide