McAfee PASCDE-AB-IA Product Guide - Page 13

Use of ePolicy Orchestrator software features

Page 13 highlights

Getting started with McAfee Policy Auditor Use of ePolicy Orchestrator software features Installing the agent plug-in adds a product icon to the McAfee Agent system tray. In Windows environments, the product icon optionally displays a balloon tip to indicate the system is being audited. Systems that have the McAfee Policy Auditor agent plug-in installed are known, in McAfee Policy Auditor terminology, as managed systems. Use of ePolicy Orchestrator software features McAfee Policy Auditor is an extension of ePolicy Orchestrator software, and uses and relies upon many of its features. McAfee Policy Auditor is configured from the ePolicy Orchestrator server. The ePolicy Orchestrator server is the center of your managed environment and provides a single location where you can administer and monitor security settings throughout your network. You can use the default settings or configure the settings to match your organizational needs. This table lists the applicable ePolicy Orchestrator software features and describes how they are used by McAfee Policy Auditor. You should become familiar with each of the listed features and their uses. ePolicy Orchestrator feature Assign Policies Client tasks Location Used by McAfee Policy Auditor Menu | Systems | To assign policies, like file integrity System Tree | Assigned monitor, to managed systems. Policies Menu | Systems | System Tree | Client Tasks • To deploy the McAfee Policy Auditor agent plug-in to detected systems. • To update the McAfee Policy Auditor agent plug-into the latest version. • To wake up the McAfee Agent on selected systems. Contacts Dashboards and Monitors Menu | User To create user contact information Management | Contacts when you want to notify specific personnel by email of an event. Menu | Reporting | Dashboards • To create a new dashboard containing McAfee Policy Auditor monitors • To manage the various dashboards you use for policy audits • To access detailed information about policy audits Detected Systems (Rogue System Detection) Menu | Systems | Detected Systems • To identify systems detected by McAfee Foundstone • To determine whether the coverage of network enforcement appliances is sufficient. Issues Menu | Automation | Issues To prioritize, assign, and track issues. Issues can also be associated with tickets in a third-party ticketing server. McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6 13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Installing the agent plug-in adds a product icon to the McAfee Agent system tray. In Windows
environments, the product icon optionally displays a balloon tip to indicate the system is being
audited.
Systems that have the McAfee Policy Auditor agent plug-in installed are known, in McAfee Policy
Auditor terminology, as managed systems.
Use of ePolicy Orchestrator software features
McAfee Policy Auditor is an extension of ePolicy Orchestrator software, and uses and relies
upon many of its features.
McAfee Policy Auditor is configured from the ePolicy Orchestrator server.The
ePolicy Orchestrator server is the center of your managed environment and provides a single
location where you can administer and monitor security settings throughout your network.You
can use the default settings or configure the settings to match your organizational needs.
This table lists the applicable ePolicy Orchestrator software features and describes how they
are used by McAfee Policy Auditor.You should become familiar with each of the listed features
and their uses.
Used by McAfee Policy Auditor
Location
ePolicy Orchestrator feature
To assign policies, like file integrity
monitor, to managed systems.
Menu | Systems |
System Tree | Assigned
Policies
Assign Policies
Menu | Systems |
System Tree | Client
Tasks
Client tasks
To deploy the McAfee Policy
Auditor agent plug-in to detected
systems.
To update the McAfee Policy
Auditor agent plug-into the latest
version.
To wake up the McAfee Agent on
selected systems.
To create user contact information
when you want to notify specific
personnel by email of an event.
Menu | User
Management | Contacts
Contacts
Menu | Reporting |
Dashboards
Dashboards and Monitors
To create a new dashboard
containing McAfee Policy Auditor
monitors
To manage the various
dashboards you use for policy
audits
To access detailed information
about policy audits
Menu | Systems |
Detected Systems
Detected Systems (Rogue System Detection)
To identify systems detected by
McAfee Foundstone
To determine whether the
coverage of network enforcement
appliances is sufficient.
To prioritize, assign, and track issues.
Issues can also be associated with
tickets in a third-party ticketing server.
Menu | Automation |
Issues
Issues
Getting started with McAfee Policy Auditor
Use of ePolicy Orchestrator software features
13
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6