McAfee MTP08EMB3RUA Product Guide - Page 21

Create user groups, User groups, Customized policies, Policy setting

Page 21 highlights

Introducing Total Protection Service Management with the SecurityCenter 1 • User groups - Create groups for computers that have one or more common characteristics. This enables you to view and manage them as a single entity when needed. • Customized policies - Select settings for protection features, save them in a policy, and assign the policy to computers or groups of computers. This enables you to configure settings targeted specifically for each computer's environment and risk factors. From the SecurityCenter, access important information and additional management tools. • Installation wizard and links to remote installation methods. • Detailed identification, activity, and detection data for the groups and computers on your account. • Administrative reports. • Policy configuration tools. • Account configuration data, reference information, subscription status, and tools for managing your accounts and subscriptions. • Helpful utilities. • Product documentation and links to product support and demos. Create user groups A group consists of one or more computers that share a particular feature. Each computer running the client software belongs to a group. By default, computers are placed in the Default Group. In large accounts, groups are an essential tool for managing computers because they let you manage different types of computers more easily. You can view all the computers in a group, view detections and reports for the group, and assign security settings (called policies) to a group as a single entity rather than individually. You can base groups on geographic location, department, computer type, user tasks, or anything meaningful to your organization. For example, you might place all laptops used by traveling sales representatives into a single group called Sales Team. You can then view details about this group of computers separately from other computers in your account. You can easily check detections for these computers or customize their security settings to protect them from the risks specific to users of public networks. To create groups, use the Computers tab on the SecurityCenter website. The following example shows how an administrator might configure policies for client computers in three different groups. You should configure policies for your users to meet your own company's needs. Policy setting On-Demand Scan Enable outbreak response Scan within archives during on-access scans Weekly Enabled No Daily Enabled Enabled Daily Enabled Enabled McAfee Total Protection Service 5.1.5 Product Guide 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

User groups
— Create groups for computers that have one or more common characteristics. This
enables you to view and manage them as a single entity when needed.
Customized policies
— Select settings for protection features, save them in a policy, and assign
the policy to computers or groups of computers. This enables you to configure settings targeted
specifically for each computer's environment and risk factors.
From the SecurityCenter, access important information and additional management tools.
Installation wizard and links to remote installation methods.
Detailed identification, activity, and detection data for the groups and computers on your account.
Administrative reports.
Policy configuration tools.
Account configuration data, reference information, subscription status, and tools for managing your
accounts and subscriptions.
Helpful utilities.
Product documentation and links to product support and demos.
Create user groups
A group consists of one or more computers that share a particular feature.
Each computer running the client software belongs to a group. By default, computers are placed in the
Default Group.
In large accounts, groups are an essential tool for managing computers because they let you manage
different types of computers more easily. You can view all the computers in a group, view detections
and reports for the group, and assign security settings (called
policies
) to a group as a single entity
rather than individually. You can base groups on geographic location, department, computer type, user
tasks, or anything meaningful to your organization.
For example, you might place all laptops used by traveling sales representatives into a single group
called Sales Team. You can then view details about this group of computers separately from other
computers in your account. You can easily check detections for these computers or customize their
security settings to protect them from the risks specific to users of public networks.
To create groups, use the
Computers
tab on the SecurityCenter website.
The following example shows how an administrator might configure policies for client computers in
three different groups. You should configure policies for your users to meet your own company’s needs.
Policy setting
On-Demand Scan
Weekly
Daily
Daily
Enable outbreak response
Enabled
Enabled
Enabled
Scan within archives during
on-access scans
No
Enabled
Enabled
Introducing Total Protection Service
Management with the SecurityCenter
1
McAfee Total Protection Service 5.1.5 Product Guide
21