McAfee EPOCDE-AA-BA Product Guide - Page 315

Index,

Page 315 highlights

Index A about this guide 11 access requirements for System Tree 123 accounts, See user accounts actions, Rogue System Detection events and 63 queries and installing sensors 282 Active Directory applying permission sets 55 configuring Windows authorization 57 containers, mapping to System Tree groups 142 implementation strategies 55 systems only synchronization 127 Active Directory synchronization borders and 124 deleting systems 126, 127 duplicate entry handling 126 integration with System Tree 126 Synchronize Now action 126 systems and structure 127 tasks 126 to System Tree structure 142 types 127 adding comments to issues 294 administrator accounts, See user accounts administrators, global, See global administrators agent alien, on rogue systems 266 configuring policies to use repositories 174 configuring proxy settings for 83 first call to server 130 grouping 105 grouping by assignment rules 106 GUID and System Tree location 130 inactive, on rogue systems 266 maintenance 149 McAfee Agent, ePolicy Orchestrator components 16 properties, viewing 153 responses and event forwarding 214 wake-up calls 155 agent communication port 36 agent deployment credentials 31 Agent Handlers about 101 Agent Handlers (continued) assigning agents 103 assignment priority 107 configuring and managing 103 how they work 101 moving agents between 105 multiple 101 priority in sitelist file 102 scalability 22 when not to use 22 when to use 22 agent-server communication about 149 secure communication keys (ASSC) 67 System Tree sorting 129 agent-server secure communication (ASSC) about 64 using different key pairs for servers 71 using one key pair 70 viewing systems that use a key pair 71 working with keys 68, 69 aggregation, See notifications Applied Policies creating queries 170 Apply Tag action 132 ASCI (See agent-to-server communication interval) 150 assigning issues 294 assignment of ticketed issues to users 296 assignment rules agents and handlers 106 Audit Log about 112 purging 113 viewing action history 112 working with 112 authentication configuring for Windows 56 authentication, configuring for Windows 53 authorization configuring for Windows 56 strategies 55 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 315

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Index
A
about this guide
11
access requirements for System Tree
123
accounts, See user accounts
actions, Rogue System Detection
events and
63
queries and installing sensors
282
Active Directory
applying permission sets
55
configuring Windows authorization
57
containers, mapping to System Tree groups
142
implementation strategies
55
systems only synchronization
127
Active Directory synchronization
borders and
124
deleting systems
126
,
127
duplicate entry handling
126
integration with System Tree
126
Synchronize Now action
126
systems and structure
127
tasks
126
to System Tree structure
142
types
127
adding comments to issues
294
administrator accounts, See user accounts
administrators, global, See global administrators
agent
alien, on rogue systems
266
configuring policies to use repositories
174
configuring proxy settings for
83
first call to server
130
grouping
105
grouping by assignment rules
106
GUID and System Tree location
130
inactive, on rogue systems
266
maintenance
149
McAfee Agent, ePolicy Orchestrator components
16
properties, viewing
153
responses and event forwarding
214
wake-up calls
155
agent communication port
36
agent deployment credentials
31
Agent Handlers
about
101
Agent Handlers
(continued)
assigning agents
103
assignment priority
107
configuring and managing
103
how they work
101
moving agents between
105
multiple
101
priority
in sitelist file
102
scalability
22
when not to use
22
when to use
22
agent-server communication
about
149
secure communication keys (ASSC)
67
System Tree sorting
129
agent-server secure communication (ASSC)
about
64
using different key pairs for servers
71
using one key pair
70
viewing systems that use a key pair
71
working with keys
68
,
69
aggregation, See notifications
Applied Policies
creating queries
170
Apply Tag action
132
ASCI (See agent-to-server communication interval)
150
assigning issues
294
assignment of ticketed issues to users
296
assignment rules
agents and handlers
106
Audit Log
about
112
purging
113
viewing action history
112
working with
112
authentication
configuring for Windows
56
authentication, configuring for Windows
53
authorization
configuring for Windows
56
strategies
55
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
315