McAfee MTP08EMB3RUA Product Guide - Page 19

Updates using Rumor technology, Updates through relay servers, Management with the SecurityCenter

Page 19 highlights

Introducing Total Protection Service Management with the SecurityCenter 1 Updates using Rumor technology When one computer shares updates with other computers on the local area network (LAN), rather than requiring each computer to retrieve updates from the update website individually, the Internet traffic load on the network is reduced. This process of sharing updates is called Rumor. 1 Each client computer checks the version of the most recent catalog file on the Internet site. This catalog file contains information for every component in the Total Protection Service client software, and is stored in a digitally signed, compressed .cab file format. • If the version is the same as the catalog file on the client computer, the process stops here. • If the version is different from the catalog file on the client computer, the client computer attempts to retrieve the latest catalog file from its peers. It queries if other computers on the LAN have already downloaded the new catalog file. 2 The client computer retrieves the required catalog file (directly from the Internet site or from one of its peers) and uses it to determine if new components are available for Total Protection Service. 3 If new components are available, the client computer attempts to retrieve them from its peers. It queries whether computers on the LAN have already downloaded the new components. • If so, the client computer retrieves the update from a peer. (Digital signatures are checked to verify that the computer is valid.) • If not, the client computer retrieves the update directly from the update site. 4 On the client computer, the catalog file is extracted and new components are installed. Updates through relay servers Internet Independent Updating (IIU) enables computers to update Total Protection Service client software when they are not connected to the Internet. At least one computer on the subnet must have an Internet connection to be able to communicate with the update site. That computer is configured to act as a relay server, and computers without an Internet connection use this computer to connect with the Internet and retrieve updates directly from the McAfee update site. 1 When a computer without Internet access fails to connect directly to the update site, it requests a response from a relay server on the LAN and uses that computer to communicate with the update site. 2 The computer without an Internet connection downloads updates directly from the update site through the relay server. You can specify which computers function as relay servers when you install the client software or at a later time. See the installation guide for more information. Management with the SecurityCenter Your service provider sends you a unique URL and login credentials for your account, which you can use to log on to the SecurityCenter, a pre-configured, web-based management console for your account. From the SecurityCenter, you can access tools to monitor the status of computers on your account, view reports on detections and activities, and configure security settings that address the specific needs of your account. McAfee Total Protection Service 5.1.5 Product Guide 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Updates using Rumor technology
When one computer shares updates with other computers on the local area network (LAN), rather
than requiring each computer to retrieve updates from the update website individually, the Internet
traffic load on the network is reduced. This process of sharing updates is called Rumor.
1
Each client computer checks the version of the most recent catalog file on the Internet site. This
catalog file contains information for every component in the Total Protection Service client
software, and is stored in a digitally signed, compressed .cab file format.
If the version is the same as the catalog file on the client computer, the process stops here.
If the version is different from the catalog file on the client computer, the client computer
attempts to retrieve the latest catalog file from its peers. It queries if other computers on the
LAN have already downloaded the new catalog file.
2
The client computer retrieves the required catalog file (directly from the Internet site or from one
of its peers) and uses it to determine if new components are available for Total Protection Service.
3
If new components are available, the client computer attempts to retrieve them from its peers. It
queries whether computers on the LAN have already downloaded the new components.
If so, the client computer retrieves the update from a peer. (Digital signatures are checked to
verify that the computer is valid.)
If not, the client computer retrieves the update directly from the update site.
4
On the client computer, the catalog file is extracted and new components are installed.
Updates through relay servers
Internet Independent Updating (IIU) enables computers to update Total Protection Service client
software when they are not connected to the Internet.
At least one computer on the subnet must have an Internet connection to be able to communicate
with the update site. That computer is configured to act as a relay server, and computers without an
Internet connection use this computer to connect with the Internet and retrieve updates directly from
the McAfee update site.
1
When a computer without Internet access fails to connect directly to the update site, it requests a
response from a relay server on the LAN and uses that computer to communicate with the update
site.
2
The computer without an Internet connection downloads updates directly from the update site
through the relay server.
You can specify which computers function as relay servers when you install the client software or at a
later time. See the installation guide for more information.
Management with the SecurityCenter
Your service provider sends you a unique URL and login credentials for your account, which you can
use to log on to the SecurityCenter, a pre-configured, web-based management console for your account.
From the SecurityCenter, you can access tools to monitor the status of computers on your account,
view reports on detections and activities, and configure security settings that address the specific
needs of your account.
Introducing Total Protection Service
Management with the SecurityCenter
1
McAfee Total Protection Service 5.1.5 Product Guide
19