McAfee PASCDE-AB-IA Product Guide - Page 4

Creating and managing audits

Page 4 highlights

Contents Data collection scans 28 The Maintain Foundstone Audits server task 28 The Data Import server task 29 Server support 29 Configure McAfee Vulnerability Manager and the ePolicy Orchestrator extension 29 Create a McAfee Vulnerability Manager workgroup 30 Configure the McAfee Vulnerability Manager single sign-on feature 30 Create a data source to synchronize McAfee Vulnerability Manager and ePolicy Orchestrator. . . . 31 Register a McAfee Vulnerability Manager database server with McAfee Policy Auditor 32 Manage McAfee Vulnerability Manager credential sets 33 Create an Asset Discovery scan 33 Create an MVM Data Import task 34 Add systems found by McAfee Vulnerability Manager scans to the System Tree 35 Create a Data Collection Scan 35 View McAfee Vulnerability Manager scan status 36 How to handle missing audit results 36 Troubleshoot missing audit results 37 How to handle mismatched McAfee Vulnerability Manager certificates 37 Troubleshoot mismatched McAfee Vulnerability Manager certificates 38 Creating and managing audits 39 Audits and how they work 39 Audit frequency 40 When audits are run 40 Per audit data maintenance 40 Benchmark profiles and their effect on audits 41 Considerations for including systems in an audit 41 Benchmark labels and how they are used 41 Findings 42 Agentless audits 42 Activate benchmarks 42 Create an audit 43 Run an audit manually 43 Disable an audit 44 Delete audits 44 Audit whiteout and blackout periods 44 Set whiteout and blackout periods 44 Service Level Agreements 45 4 McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Data collection scans
...............................................................
28
The Maintain Foundstone Audits server task
............................................
28
The Data Import server task
.........................................................
29
Server support
....................................................................
29
Configure McAfee Vulnerability Manager and the ePolicy Orchestrator extension
.....................
29
Create a McAfee Vulnerability Manager workgroup
.......................................
30
Configure the McAfee Vulnerability Manager single sign-on feature
..........................
30
Create a data source to synchronize McAfee Vulnerability Manager and ePolicy Orchestrator
....
31
Register a McAfee Vulnerability Manager database server with McAfee Policy Auditor
..........
32
Manage McAfee Vulnerability Manager credential sets
....................................
33
Create an Asset Discovery scan
......................................................
33
Create an MVM Data Import task
.....................................................
34
Add systems found by McAfee Vulnerability Manager scans to the System Tree
...............
35
Create a Data Collection Scan
.......................................................
35
View McAfee Vulnerability Manager scan status
.........................................
36
How to handle missing audit results
..........................................................
36
Troubleshoot missing audit results
....................................................
37
How to handle mismatched McAfee Vulnerability Manager certificates
..............................
37
Troubleshoot mismatched McAfee Vulnerability Manager certificates
........................
38
Creating and managing audits
.............................................................
39
Audits and how they work
..................................................................
39
Audit frequency
....................................................................
40
When audits are run
................................................................
40
Per audit data maintenance
..........................................................
40
Benchmark profiles and their effect on audits
...........................................
41
Considerations for including systems in an audit
.........................................
41
Benchmark labels and how they are used
..............................................
41
Findings
..........................................................................
42
Agentless audits
...................................................................
42
Activate benchmarks
......................................................................
42
Create an audit
...........................................................................
43
Run an audit manually
.....................................................................
43
Disable an audit
..........................................................................
44
Delete audits
.............................................................................
44
Audit whiteout and blackout periods
..........................................................
44
Set whiteout and blackout periods
.....................................................
44
Service Level Agreements
..................................................................
45
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
4
Contents