McAfee GSSCDE-AA-DA User Guide - Page 60

Configuring reports, Uninstallation, Removing GroupShield for Exchange from Client Computer

Page 60 highlights

McAfee® GroupShield™ 7.0 User Guide 5 Integrating with ePolicy Orchestrator 3.6 Uninstallation „ If No is selected, the complete report is shown. Tabs may vary based on which report is selected. See ePolicy Orchestrator Product Guide v 3.6 for more details on all the available settings tabs. Note Configuring reports There are several ways in which you can control what data appears on reports. You can define the version number of virus definition files, scanning engines, and supported products that need to be installed on the client computers for them to be considered compliant based on your company's anti-virus and security program. You can also limit the results of reports by selected product criteria. (For example, computer name, operating system, virus name or action taken on infected files.) Once the results of a report appear, you can then perform a number of tasks on the data. You can view details on required report data. (For example, to determine which client computers do not have a compliant version of GroupShield). Some reports even provide links to other reports called sub-reports that provide data related to the current report. You can also print reports or export report data into a variety of file formats (including HTML and Microsoft® Excel). See the ePolicy Orchestrator v 3.6 Product Guide for more details on configuring reports. Note Uninstallation Removing GroupShield for Exchange from Client Computer Using the ePolicy Orchestrator server, you can uninstall the GroupShield software installed on a client computer. Removing the GroupShield software from the client computer 1 From the ePolicy Orchestrator console, select the Site or the Exchange Server on which you intend to remove GroupShield and click the Tasks tab. The Deployment Task page appears. 2 Double-click the Deployment task. The ePolicy Orchestrator Scheduler dialog box appears. 3 Deselect Inherit under the Tasks tab and select Enable (scheduled task runs at specified time). 4 Click Settings under the Tasks tab. The Task Settings page appears. 60

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

60
McAfee
®
GroupShield
7.0 User Guide
Integrating with ePolicy Orchestrator 3.6
Uninstallation
5
If
No
is selected, the complete report is shown.
Configuring reports
There are several ways in which you can control what data appears on reports. You can
define the version number of virus definition files, scanning engines, and supported
products that need to be installed on the client computers for them to be considered
compliant based on your company’s anti-virus and security program. You can also limit
the results of reports by selected product criteria. (For example, computer name,
operating system, virus name or action taken on infected files.) Once the results of a
report appear, you can then perform a number of tasks on the data. You can view
details on required report data. (For example, to determine which client computers do
not have a compliant version of GroupShield). Some reports even provide links to other
reports called sub-reports that provide data related to the current report. You can also
print reports or export report data into a variety of file formats (including HTML and
Microsoft
®
Excel).
Uninstallation
Removing GroupShield for Exchange from Client Computer
Using the ePolicy Orchestrator server, you can uninstall the GroupShield software
installed on a client computer.
Removing the GroupShield software from the client computer
1
From the
ePolicy Orchestrator
console, select the
Site
or the Exchange Server on which
you intend to remove GroupShield and click the
Tasks
tab. The
Deployment Task
page
appears.
2
Double-click the
Deployment task
. The
ePolicy Orchestrator Scheduler
dialog box appears.
3
Deselect
Inherit
under the
Tasks
tab and select
Enable (scheduled task runs at specified
time)
.
4
Click
Settings
under the
Tasks
tab. The
Task Settings
page appears.
Note
Tabs may vary based on which report is selected. See
ePolicy Orchestrator Product
Guide v 3.6
for more details on all the available settings tabs.
Note
See the
ePolicy Orchestrator v 3.6 Product Guide
for more details on configuring
reports.