McAfee PASCDE-AB-IA Product Guide - Page 64

Table 1: Monitor tab, Table 2: Exclude tab, Click

Page 64 highlights

File Integrity Monitoring and entitlement reporting Create and apply a file integrity monitoring policy Option Create a policy based on this existing policy Policy Name Notes Definition Select an existing policy, such as My Default, or another file integrity monitoring policy. Type a meaningful name for the policy Type information about the policy. This field is optional. 6 Click OK. The policy configuration window opens. Use the three tabs to configure the policy. Table 1: Monitor tab Use this: To do this: Add Open the Monitor Item dialog box: • File path - Type a file path to the monitored file(s). • File name - Type a file name to monitor, using wildcard characters as needed. • Include subfolders - Monitor files in subfolders of the file path. This is useful when you use wildcard characters in file names. • Follow symlinks - Monitor files referenced by symlinks or shortcuts in the file path. • Monitoring setting • File Entitlement - Monitors whether a file has changed. • File Entitlement, File Integrity - Monitors whether a file has changed or whether the file's entitlements have changed. • File Entitlement, File Integrity, File Versioning - Monitors whether a file has changed, whether the file's entitlements have changed, and stores changes for supported text files . Edit Max versioned file size (1-4 MB) Remove Change the configuration of the selected file. Select the maximum size of the files in the policy. You can only use versioning on text files. This has no effect on files that do not have versioning enabled. Remove the selected file from the list of files to be monitored. Table 2: Exclude tab Use this: Add Edit To do this: Open the Exclude Item dialog box: • File path - Type a file path to the file(s) you want to exclude from monitoring. • File name - Type a file that you want to exclude from monitoring. This is useful when you use wildcard characters for monitored files. Change the configuration of the selected file. 64 McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Definition
Option
Select an existing policy, such as My Default, or another
file integrity monitoring policy.
Create a policy based on this existing policy
Type a meaningful name for the policy
Policy Name
Type information about the policy.This field is optional.
Notes
6
Click
OK
.The policy configuration window opens. Use the three tabs to configure the policy.
Table 1: Monitor tab
To do this:
Use this:
Open the Monitor Item dialog box:
Add
File path
Type a file path to the monitored file(s).
File name
Type a file name to monitor, using
wildcard characters as needed.
Include subfolders
Monitor files in subfolders
of the file path. This is useful when you use wildcard
characters in file names.
Follow symlinks
Monitor files referenced by
symlinks or shortcuts in the file path.
Monitoring setting
File Entitlement
Monitors whether a file has
changed.
File Entitlement, File Integrity
Monitors
whether a file has changed or whether the file's
entitlements have changed.
File Entitlement, File Integrity, File
Versioning
Monitors whether a file has
changed, whether the file's entitlements have
changed, and stores changes for supported
text files .
Change the configuration of the selected file.
Edit
Select the maximum size of the files in the policy.You
can only use versioning on text files.This has no effect
on files that do not have versioning enabled.
Max versioned file size (1-4 MB)
Remove the selected file from the list of files to be
monitored.
Remove
Table 2: Exclude tab
To do this:
Use this:
Open the Exclude Item dialog box:
Add
File path
Type a file path to the file(s) you want
to exclude from monitoring.
File name
Type a file that you want to exclude
from monitoring. This is useful when you use
wildcard characters for monitored files.
Change the configuration of the selected file.
Edit
File Integrity Monitoring and entitlement reporting
Create and apply a file integrity monitoring policy
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
64