McAfee PASCDE-AB-IA Product Guide - Page 95

McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6

Page 95 highlights

Index file integrity monitoring (continued) apply a policy to systems 65 baselines 60 built-in query reports 67 compare file versions 62, 65 concept 59 configuring number of versions stored 61 create a policy 63 entitlement reporting 62 excluding paths and files 60 file information monitored 60 file validation 60 file versions 61 frequency 59 including paths and files 60 purge events 62, 66 reset baseline 67 wildcard characters 60 file version comparison 62, 65 file versions, file integrity monitoring 61 findings violations 42 Findings results, hide and unhide 75 Findings, enhancements hide or unhide Findings results 75 import third-party Findings content 75 Findings, information compliant 74 incomplete 74 violations 74 Findings, settings creating an audit 75 Findings data retention 75 threads for Findings processing 75 violation limit 75 Findings, types of violations actual and expected values 74 instance data 74 positive feedback 74 flat scoring model, Policy Auditor 50 flat unweighted scoring model, Policy Auditor 50 frequency (how often data is gathered) 40 H hide Findings results 75 I installation repair Policy Auditor 37, 38 M Maintain Foundstone audits server tasks 28 managed systems, Policy Auditor 14 McAfee ServicePortal, accessing 9 O OVAL export audit results 47 use in audits 39 OVAL implementation 90 P per audit data maintenance 40 permission sets, Policy Auditor default 19 edit 21 how they work 18 Policy Auditor activate benchmarks 42 agent plug-in, concept 22 components installed 12 Data Collection Scan 28 import Asset Discovery Scan results 28 using ePolicy Orchestrator features 13 Vulnerability Manager ePO Extension 28 Vulnerability Manager integration 27 Policy Auditor agent plug-in about 12 agent-server communication 25 concept 22 deploying 24 managing content 24 overview 22 supported platforms 22 uninstall 25 Policy Auditor permission sets default 19 edit 21 how they work 18 Policy Auditor Product Guide audience 8 Policy Auditor server settings edit 18 what they control 16 Policy Auditor, dashboards default provided by Policy Auditor 77 PA:Compliance Summary dashboard 80 PA:MS Patch Status Summary dashboard 80 PA:Operations 80 PA:PCI Summary 81 queries as dashboard monitors 82 Policy Auditor, file integrity monitoring accept events 62, 66 apply a policy to systems 65 baselines 60 built-in query reports 67 compare file versions 62, 65 configuring number of versions stored 61 create a policy 63 entitlement reporting 62 excluding paths and files 60 file information monitored 60 file validation 60 file versions 61 including paths and files 60 purge events 62, 66 reset baseline 67 wildcard characters 60 Policy Auditor, rollup reporting built-in rollup reports 71 configure 72 rollup capabilities 68 Rollup Data - PA:Audit Benchmark Results 69 Rollup Data - PA:Audit Patch Check Result 71 Rollup Data - PA:Audit Rule Result 70 rollup reporting considerations 68 rollup server tasks 69 Policy Auditor, waivers deleting 57 exception waivers 52 McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

file integrity monitoring
(continued)
apply a policy to systems
65
baselines
60
built-in query reports
67
compare file versions
62
,
65
concept
59
configuring number of versions stored
61
create a policy
63
entitlement reporting
62
excluding paths and files
60
file information monitored
60
file validation
60
file versions
61
frequency
59
including paths and files
60
purge events
62
,
66
reset baseline
67
wildcard characters
60
file version comparison
62
,
65
file versions, file integrity monitoring
61
findings
violations
42
Findings results, hide and unhide
75
Findings, enhancements
hide or unhide Findings results
75
import third-party Findings content
75
Findings, information
compliant
74
incomplete
74
violations
74
Findings, settings
creating an audit
75
Findings data retention
75
threads for Findings processing
75
violation limit
75
Findings, types of violations
actual and expected values
74
instance data
74
positive feedback
74
flat scoring model, Policy Auditor
50
flat unweighted scoring model, Policy Auditor
50
frequency (how often data is gathered)
40
H
hide Findings results
75
I
installation repair
Policy Auditor
37
,
38
M
Maintain Foundstone audits server tasks
28
managed systems, Policy Auditor
14
McAfee ServicePortal, accessing
9
O
OVAL
export audit results
47
use in audits
39
OVAL implementation
90
P
per audit data maintenance
40
permission sets, Policy Auditor
default
19
edit
21
how they work
18
Policy Auditor
activate benchmarks
42
agent plug-in, concept
22
components installed
12
Data Collection Scan
28
import Asset Discovery Scan results
28
using ePolicy Orchestrator features
13
Vulnerability Manager ePO Extension
28
Vulnerability Manager integration
27
Policy Auditor agent plug-in
about
12
agent-server communication
25
concept
22
deploying
24
managing content
24
overview
22
supported platforms
22
uninstall
25
Policy Auditor permission sets
default
19
edit
21
how they work
18
Policy Auditor Product Guide audience
8
Policy Auditor server settings
edit
18
what they control
16
Policy Auditor, dashboards
default provided by Policy Auditor
77
PA:Compliance Summary dashboard
80
PA:MS Patch Status Summary dashboard
80
PA:Operations
80
PA:PCI Summary
81
queries as dashboard monitors
82
Policy Auditor, file integrity monitoring
accept events
62
,
66
apply a policy to systems
65
baselines
60
built-in query reports
67
compare file versions
62
,
65
configuring number of versions stored
61
create a policy
63
entitlement reporting
62
excluding paths and files
60
file information monitored
60
file validation
60
file versions
61
including paths and files
60
purge events
62
,
66
reset baseline
67
wildcard characters
60
Policy Auditor, rollup reporting
built-in rollup reports
71
configure
72
rollup capabilities
68
Rollup Data - PA:Audit Benchmark Results
69
Rollup Data - PA:Audit Patch Check Result
71
Rollup Data - PA:Audit Rule Result
70
rollup reporting considerations
68
rollup server tasks
69
Policy Auditor, waivers
deleting
57
exception waivers
52
Index
95
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6