McAfee PASCDE-AB-IA Product Guide - Page 36

View McAfee Vulnerability Manager scan status, How to handle missing audit results

Page 36 highlights

Configuring agentless audits How to handle missing audit results 6 Select Credentials and click on the appropriate account type in the tree pane or from the Account Type drop-down list. Type the required credential information in the appropriate fields. Click Add. 7 You can specify multiple credentials, such as credentials for each domain in the search range, and click Add after specifying each credential. Consult the McAfee Vulnerability Manager documentation for details on other settings for this tab. Click Next. The Scheduler tab appears. 8 Select the appropriate schedule type and settings. Click OK to save the scan. TIP: McAfee recommends that you select the Immediate option. Once McAfee Vulnerability Manager has had the opportunity to scan for systems, you can change the scan to occur at regular intervals. View McAfee Vulnerability Manager scan status You can view the status and results of McAfee Vulnerability Manager scans. The Asset Discovery Scan needs to finish running before you add assets to the ePolicy Orchestrator System Tree. Task For option definitions, click ? in the interface. 1 In the ePolicy Orchestrator user interface, click Menu | Risk & Compliance | Audits | View Foundstone Scan Status. The Scan Status page opens in a new browser window. The Status column shows the scans that are complete. 2 Click to view the scan report. How to handle missing audit results McAfee Policy Auditor uses the concept of frequency to determine how often audit data should be gathered. Frequency is defined as "Audit results should be no older than nnn time unit," where "nnn" is a number and "time unit" is "days," "weeks," and "months." For example, if the frequency for an audit is defined as one month and a managed system has not been audited in more than one month, the system is out of frequency and its status is unknown. The McAfee Vulnerability Manager extension uses the Data Collection Scan to audit systems and gather compliance data. The Data Collection Scan must finish before the PA: Maintain Foundstone server task is run. When the PA: Maintain Foundstone server task runs, it requests audit results for any missing results, any expired results, or any results that will expire within the next 24 hours. Thus, audits with a one-day frequency is set for auditing every time the PA: Maintain Foundstone audits server task is run. The task also assembles previously-collected audit results, synchronizes information, and performs cleanup tasks. The PA: Maintain Foundstone audits server task must be given a sufficient amount of time to assemble data before the MVM Data Import server task is run. The MVM Data Import task collects the latest asset data and imports it into the ePolicy Orchestrator server database. McAfee Policy Auditor then has the latest information to appear in reports and queries. To make sure that your audit results are up to date, configure the Data Collection Scan, PA: Maintain Foundstone audits server task, and MVM Data Import server task to give the system enough time to conduct audits and assemble result data. 36 McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

6
Select
Credentials
and click on the appropriate account type in the tree pane or from the
Account Type
drop-down list.Type the required credential information in the appropriate
fields. Click
Add
.
7
You can specify multiple credentials, such as credentials for each domain in the search
range, and click
Add
after specifying each credential. Consult the McAfee Vulnerability
Manager documentation for details on other settings for this tab. Click
Next
.The Scheduler
tab appears.
8
Select the appropriate schedule type and settings. Click
OK
to save the scan.
TIP:
McAfee recommends that you select the
Immediate
option. Once McAfee Vulnerability
Manager has had the opportunity to scan for systems, you can change the scan to occur
at regular intervals.
View McAfee Vulnerability Manager scan status
You can view the status and results of McAfee Vulnerability Manager scans.The Asset Discovery
Scan needs to finish running before you add assets to the ePolicy Orchestrator System Tree.
Task
For option definitions, click
?
in the interface.
1
In the ePolicy Orchestrator user interface, click
Menu | Risk & Compliance | Audits | View
Foundstone Scan Status
. The Scan Status page opens in a new browser window. The
Status
column shows the scans that are complete.
2
Click to view the scan report.
How to handle missing audit results
McAfee Policy Auditor uses the concept of frequency to determine how often audit data should
be gathered. Frequency is defined as "Audit results should be no older than
nnn
time unit,"
where "nnn" is a number and "time unit" is "days," "weeks," and "months." For example, if the
frequency for an audit is defined as one month and a managed system has not been audited
in more than one month, the system is out of frequency and its status is unknown.
The McAfee Vulnerability Manager extension uses the Data Collection Scan to audit systems
and gather compliance data.The Data Collection Scan must finish before the PA: Maintain
Foundstone server task is run.
When the PA: Maintain Foundstone server task runs, it requests audit results for any missing
results, any expired results, or any results that will expire within the next 24 hours.Thus, audits
with a one-day frequency is set for auditing every time the PA: Maintain Foundstone audits
server task is run.The task also assembles previously-collected audit results, synchronizes
information, and performs cleanup tasks.
The PA: Maintain Foundstone audits server task must be given a sufficient amount of time to
assemble data before the MVM Data Import server task is run. The MVM Data Import task
collects the latest asset data and imports it into the ePolicy Orchestrator server database.
McAfee Policy Auditor then has the latest information to appear in reports and queries.
To make sure that your audit results are up to date, configure the Data Collection Scan, PA:
Maintain Foundstone audits server task, and MVM Data Import server task to give the system
enough time to conduct audits and assemble result data.
Configuring agentless audits
How to handle missing audit results
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
36