Walkthrough Guide
Walkthrough Guide
revision 2.0
ePolicy Orchestrator ®
McAfee ®
System Protection
Industry-leading intrusion prevention solutions
Walkthrough Guide
revision 2.0
ePolicy Orchestrator ®
McAfee ®
System Protection
Industry-leading intrusion prevention solutions
COPYRIGHT
Copyright © 2005 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN
(STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA),
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN,
MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE,
PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN
KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its
affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered
and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU
DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF
APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
• Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). • Cryptographic software written by Eric
A. Young and software written by Tim J. Hudson. • Some software programs that are licensed (or sublicensed) to the user under the GNU
General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute
certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which
is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software
covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee pro-+34vide rights to
use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over
the rights and restrictions herein. • Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. • Software
originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. • Software written by Douglas W. Sauder. • Software developed by the
Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at
www.apache.org/licenses/LICENSE-2.0.txt. • International Components for Unicode ("ICU") Copyright ©1995-2002 International Business
Machines Corporation and others. • Software developed by CrystalClear Software, Inc., Copyright ©2000 CrystalClear Software, Inc. • FEADÆ
OptimizerÆ technology, Copyright Netopsystems AG, Berlin, Germany. • Outside InÆ Viewer Technology ©1992-2001 Stellent Chicago, Inc.
and/or Outside InÆ HTML Export, © 2001 Stellent Chicago, Inc. • Software copyrighted by Thai Open Source Software Center Ltd. and Clark
Cooper, © 1998, 1999, 2000. • Software copyrighted by Expat maintainers. • Software copyrighted by The Regents of the University of California,
© 1996, 1989, 1998-2000. • Software copyrighted by Gunnar Ritter. • Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle,
Santa Clara, California 95054, U.S.A., © 2003. • Software copyrighted by Gisle Aas. © 1995-2003. • Software copyrighted by Michael A. Chase,
© 1999-2000. • Software copyrighted by Neil Winton, ©1995-1996. • Software copyrighted by RSA Data Security, Inc., © 1990-1992. • Software
copyrighted by Sean M. Burke, © 1999, 2000. • Software copyrighted by Martijn Koster, © 1995. • Software copyrighted by Brad Appleton,
© 1996-1999. • Software copyrighted by Michael G. Schwern, ©2001. • Software copyrighted by Graham Barr, © 1998. • Software copyrighted
by Larry Wall and Clark Cooper, © 1998-2000. • Software copyrighted by Frodo Looijaard, © 1997. • Software copyrighted by the Python Software
Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. • Software
copyrighted by Beman Dawes, © 1994-1999, 2002. • Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000
University of Notre Dame. • Software copyrighted by Simone Bordet & Marco Cravero, © 2002. • Software copyrighted by Stephen Purcell,
© 2001. • Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). • Software copyrighted by
International Business Machines Corporation and others, © 1995-2003. • Software developed by the University of California, Berkeley and its
contributors. • Software developed by Ralf S. Engelschall <[email protected]> for use in the mod_ssl project (http:// www.modssl.org/).
• Software copyrighted by Kevlin Henney, © 2000-2002. • Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002. • Software
copyrighted by David Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. • Software copyrighted by
Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000. • Software copyrighted by Boost.org, © 1999-2002. • Software
copyrighted by Nicolai M. Josuttis, © 1999. • Software copyrighted by Jeremy Siek, © 1999-2001. • Software copyrighted by Daryle Walker,
© 2001. • Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002. • Software copyrighted by Samuel Krempp, © 2001. See
http://www.boost.org for updates, documentation, and revision history. • Software copyrighted by Doug Gregor ([email protected]), © 2001,
2002. • Software copyrighted by Cadenza New Zealand Ltd., © 2000. • Software copyrighted by Jens Maurer, ©2000, 2001. • Software
copyrighted by Jaakko Järvi ([email protected]), ©1999, 2000. • Software copyrighted by Ronald Garcia, © 2002. • Software copyrighted by
David Abrahams, Jeremy Siek, and Daryle Walker, ©1999-2001. • Software copyrighted by Stephen Cleary ([email protected]), ©2000.
• Software copyrighted by Housemarque Oy <http://www.housemarque.com>, © 2001. • Software copyrighted by Paul Moore, © 1999.
• Software copyrighted by Dr. John Maddock, © 1998-2002. • Software copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999. • Software
copyrighted by Peter Dimov, © 2001, 2002. • Software copyrighted by Jeremy Siek and John R. Bandela, © 2001. • Software copyrighted by
Joerg Walter and Mathias Koch, © 2000-2002. • Software copyrighted by Carnegie Mellon University © 1989, 1991, 1992. • Software copyrighted
by Cambridge Broadband Ltd., © 2001-2003. • Software copyrighted by Sparta, Inc., © 2003-2004. • Software copyrighted by Cisco, Inc and
Information Network Center of Beijing University of Posts and Telecommunications, © 2004. • Software copyrighted by Simon Josefsson,
© 2003. • Software copyrighted by Thomas Jacob, © 2003-2004. • Software copyrighted by Advanced Software Engineering Limited, © 2004.
• Software copyrighted by Todd C. Miller, © 1998. • Software copyrighted by The Regents of the University of California, © 1990, 1993, with code
derived from software contributed to Berkeley by Chris Torek.
PATENT INFORMATION
Protected by US Patents 6,470,384; 6,493,756; 6,496,875; 6,553,377; 6,553,378.
®
Issued September 2005 / ePolicy Orchestrator software version 3.6
DBN-002-<EN>
Contents
Walkthrough
1 Introduction 6
Components of ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Policy, properties, and events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Tasks, services, and accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Other times when credentials are needed . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Minimum requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
iii
®
ePolicy Orchestrator 3.6 Walkthrough Guide Contents
7 Outbreaks 72
Tasks to do on a daily or weekly basis to stay prepared . . . . . . . . . . . . . . . . . 72
Server and client tasks you should schedule to run regularly . . . . . . . . . 72
Checklist — Are you prepared for an outbreak? . . . . . . . . . . . . . . . . . . . . . . . . .74
Other methods to recognize an outbreak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Network utilization key indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
E-mail utilization key indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Virus detection events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Checklist — You think an outbreak is occurring . . . . . . . . . . . . . . . . . . . . . . . . 75
iv
®
ePolicy Orchestrator 3.6 Walkthrough Guide Contents
Lab Evaluation
8 Installing and setting up 78
Setting up a lab environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Add systems to your Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Organize systems into groups for servers and workstations . . . . . . . . . . . . . 89
Configure the agent policy settings before deployment . . . . . . . . . . . . . . . . . 91
Deploy agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Installing agent manually on client systems. . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Add VirusScan Enterprise to the master repositor. . . . . . . . . . . . . . . . . . . . . y 95
Pull updates from McAfee source repository . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Create a distributed repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Create a shared folder on the system to use as a repository . . . . . . . . . . 98
Add the distributed repository to the ePolicy Orchestrator server. . . . . . 99
Replicate master repository data to distributed repository . . . . . . . . . . 101
Configure remote sites to use the distributed repository . . . . . . . . . . . . 101
Schedule a pull task to update master repository daily . . . . . . . . . . . . . . . . . 109
Schedule a replication task to update your distributed repository. . . . . . . . 110
Schedule a client update task to update DATs daily . . . . . . . . . . . . . . . . . . . 110
Use SuperAgents to wake up all agents on the network. . . . . . . . . . . . . . . . . 111
Convert an agent on each subnet into a SuperAgent . . . . . . . . . . . . . . . . . . . 112
Enable global updating on ePolicy Orchestrator server . . . . . . . . . . . . . . . . 113
v
SECTION 1
Walkthrough
This section provides a walkthrough of conceptual and best practices information.
Introduction
Installing or Upgrading the Server
Organizing the Directory and Repositories
Deploying the Agent and Products
Rogue System Detection
ePolicy Orchestrator Notifications
Outbreaks
1 Introduction
ePolicy Orchestrator 3.6 is a powerful tool that allows you to manage security policy,
assess and enforce policy, identify and take actions on rogue systems, and notify you
of certain events that occur, all across your entire network.
Database server.
6
ePolicy Orchestrator® 3.6 Walkthrough Guide Introduction 1
Components of ePolicy Orchestrator
Update repositories.
The server:
The ePolicy Orchestrator server should be hosted on a dedicated server. Typically, the
ePolicy Orchestrator server is accessed via remote ePolicy Orchestrator consoles
(installed on other systems), although it can be accessed from a local console as well.
For information on server sizing, see the ePolicy Orchestrator 3.6 Hardware Sizing and
Bandwidth Usage White Paper.
Database server
ePolicy Orchestrator uses a back-end database to store data, which is represented in
the console tree of the user interface. The database contains information from each
managed system.
The reporting and query features of ePolicy Orchestrator (accessed through the
consoles) allow you to view this data in ways you can customize.
7
ePolicy Orchestrator® 3.6 Walkthrough Guide Introduction 1
Components of ePolicy Orchestrator
Typically, you will want one that is accessible to anyone in your environment who needs
to access the ePolicy Orchestrator server. For example, you would want all
administrators to be able to access the ePolicy Orchestrator server from a console to
perform their management tasks. You can assign roles with different rights and
permissions to users.
Retrieves updates.
Executes scheduled tasks.
Enforces policies.
Every system you want to manage must have this component installed.
Sensors “listen” to all broadcast layer 2 communications on the subnets. Although you
can deploy multiple sensors to a subnet, only one is listening at a time. This allows a
minimum of network activity, and ensures one sensor is always listening per subnet.
Master repository
The master repository exists on the ePolicy Orchestrator server and is the central
location for all McAfee product updates. The master repository goes to the McAfee
Download Site (source repository) at defined times to retrieve all available updates and
signatures. The master repository contains a copy of the contents of the McAfee
Download Site that can be accessed by the various update repositories in your
organization.
Update repositories
Update repositories are distributed throughout your environment, providing easy
access for managed systems to pull DAT files, product updates, and product
installations. Depending on how your network is configured, you may want to set up
different types of repositories. You can create HTTP, FTP, and UNC share distributed
repositories anywhere on your network, or you can create an update repository per
subnet by converting an agent on each subnet into a SuperAgent repository.
8
ePolicy Orchestrator® 3.6 Walkthrough Guide Introduction 1
Policy, properties, and events
Policies
A policy is a set of software configurations. The set of options differs depending on the
product and system you are managing. For example, a policy for VirusScan Enterprise
includes the configuration options for the On-Access Scanner and the On-Demand
Scanner. You can set these configuration options differently for different systems.
Policies are the security product configurations that you want to ensure each site,
group, or individual systems have. Policies are enforced during the policy enforcement
interval. This interval is set to five minutes by default. Therefore, anytime an end user
changes the settings on the system, the settings are returned to those set in the policy
within five minutes.
New to version 3.6 is the ability to create named policies, that you can assign to
independent locations of the Directory.
Properties
Properties are collected from each system by the installed agent. These include:
Events
When a threat or compliance issue on a system is recognized by an installed and
managed security product, an event file is created by the product that the agent
delivers to the server to be processed. These events are processed and stored in the
database.
Events are processed by event parser and applied to the notification rules or ePolicy
Orchestrator Notifications. Notifications is a feature that allows you to configure rules
to alert you to events in your network.
If the event triggers a notification rule, any of the following can happen depending on
the rule’s configurations:
9
ePolicy Orchestrator® 3.6 Walkthrough Guide Introduction 1
Tasks, services, and accounts
This information is useful if you encounter issues with the following tasks.
If the local system account’s rights are diminished, installations on client systems of
Note
the agent or security products may fail on client systems.
10
ePolicy Orchestrator® 3.6 Walkthrough Guide Introduction 1
Minimum requirements
Minimum requirements
The following are minimum hardware and software requirements for the ePolicy
Orchestrator 3.6 server.
These are the minimum requirements. The number of systems you plan to manage
Note
as well as network considerations impact the hardware specifications your solution
requires. For more information on hardware sizing, see the ePolicy Orchestrator 3.6
Hardware Sizing and Bandwidth Usage White Paper.
11
2 Installing or Upgrading the Server
Whether you are installing ePolicy Orchestrator 3.6 as a new installation or upgrading
from prior versions you must understand the minimum system requirements,
preparation tasks on your network, and which pieces of information to take to the
installation or upgrade.
Information on hardware sizing and bandwidth usage are located in the Hardware
Sizing and Bandwidth Usage White Paper.
Pre-installation preparation.
12
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the Server 2
Installing for the first time
Pre-installation preparation
Before installing ePolicy Orchestrator 3.6, complete the following tasks:
Determine what database you are going to use. ePolicy Orchestrator includes the
Microsoft SQL Database Engine (MSDE) 2000 (Service Pack 3) database which can
be used for all of the reporting and data storage needs. This database has a storage
limit of 2GB. This means that a standard installation and configuration of ePolicy
Orchestrator 3.6 can record approximately 12 months of data for 10,000 client
systems.
If the standard database does not meet your needs, utilize a Microsoft SQL Server
2000 database.
McAfee recommends that a dedicated server is used for the database if you are
Note
managing more than 2,000 client systems.
Update both the ePolicy Orchestrator server system and the ePolicy Orchestrator
database server system with the latest Microsoft security updates.
Install and/or update the anti-virus software on the ePolicy Orchestrator server and
database server systems and scan for viruses.
Install and/or update firewall software on the ePolicy Orchestrator server system.
(For example, Desktop Firewall 8.5.)
Notify the network staff of the ports you intend to use for HTTP communications via
ePolicy Orchestrator.
Server password.
Database server.
Server password
During the installation wizard, you are asked to provide a password for the
Administrator account to access the ePolicy Orchestrator server. Use a password that
is memorable and contains a combination of alpha- and numeric-characters.
Special characters (for example, %, <,>, and &) are not supported in passwords.
Note
Database server
During the installation wizard, you are asked to select the MSDE 2000 database, or use
an already installed database server on the local system or remote (MSDE 2000, or
SQL Server 2000).
13
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the Server 2
Installing for the first time
If you are going to use a database other than the MSDE 2000 provided with ePolicy
Orchestrator, you should install the database software before installing ePolicy
Orchestrator.
If you are planning on managing more than 2,000 systems, use a dedicated server
with Microsoft SQL Server 2000 with Service Pack 3 for the database.
Once ePolicy Orchestrator is installed, you cannot change some of these assignments
through the ePolicy Orchestrator console without uninstalling the software.
Make sure that the ports you assign are not already assigned to other products.
McAfee strongly recommends that you change this to another port due to potential
Note
conflicts in many environments. For example, to 82.
McAfee strongly recommends that you change this to another port due to potential
Note
conflicts in some environments. For example, to 83. This port cannot be changed after
installation.
Agent Wake-Up communication port — This is the port used to send agent
wakeup calls. The default port is 8081. This port can be changed after installation.
Agent Broadcast communication port — This is the port used to send
SuperAgent wakeup calls. The default port is 8082. This port can be changed after
installation.
14
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the Server 2
Upgrading from a previous version
This allows you to use the feature upon implementation, while you are still learning
about it.
For complete information and procedures to install ePolicy Orchestrator 3.6, see the
ePolicy Orchestrator 3.6 Installation Guide.
Preparation.
Upgrading issues.
Preparation
Before upgrading to ePolicy Orchestrator 3.6 complete the following tasks:
Upgrade the database software if it does not meet the minimum requirements.
Update both the ePolicy Orchestrator server system and the ePolicy Orchestrator
database server system with the latest Microsoft security updates. (Specifically, be
sure to install Service Pack 3 on all MSDE and SQL Server 2000 databases.)
Install and/or update the anti-virus software on the ePolicy Orchestrator server
system and scan for viruses.
Install and/or update firewall software on the server system. (For example, Desktop
Firewall 8.5.)
Notify the network staff of the ports you intend to use for HTTP communications via
ePolicy Orchestrator.
15
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the Server 2
Upgrading from a previous version
Once ePolicy Orchestrator is installed, you cannot change some of these assignments
through the ePolicy Orchestrator console without uninstalling the software.
Make sure that the ports you assign are not already assigned to other products.
McAfee strongly recommends that you change this to another port due to potential
Note
conflicts in many environments. For example, to 82.
McAfee strongly recommends that you change this to another port due to potential
Note
conflicts in some environments. For example, to 83. this port cannot be changed after
installation.
Agent Wake-Up communication port — This is the port used to send agent
wakeup calls. The default port is 8081. This port can be changed after installation.
Agent Broadcast communication port — This is the port used to send
SuperAgent wakeup calls. The default port is 8082. This port can be changed after
installation.
16
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing or Upgrading the Server 2
Upgrading from a previous version
This allows you to use the feature upon implementation, while you are still learning
about it.
For complete information and procedures to upgrade to ePolicy Orchestrator 3.6, see
the ePolicy Orchestrator 3.6 Installation Guide.
Upgrading issues
If your agents are not upgrading to version 3.5 agents, and you’re running VirusScan
7.0.0 on those systems, you may need to physically go to these systems and perform
the following steps:
3 Go back to the ePolicy Orchestrator server and deploy an agent to the system.
17
3 Organizing the Directory and
Repositories
The ePolicy Orchestrator software requires you to configure and set up several
components. Although extensive, the configurations allow you to customize the
product specifically for your environment. Carefully planning the implementation of
your ePolicy Orchestrator solution is essential before installing the software.
Repositories.
Directory
The Directory contains all your managed network systems that you are managing with
ePolicy Orchestrator. It is possible to add all the systems to be managed by ePolicy
Orchestrator into one site in the Directory. However, this flat unorganized list makes
setting specific policies for different systems very difficult. Therefore, organizing the
systems in smaller units within the Directory is essential.
Sites
A site is a first-level group immediately under the Directory root of the console tree.
Systems contained within a site can be organized into groups. Sites can contain groups
and individual systems.
Groups
A group is a secondary grouping beneath a site. It can contain more groups
(sub-groups) and individual systems, but a group cannot contain a site.
18
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
ePolicy Orchestrator Directory: concepts and roles
Lost&Found groups
Lost&Found groups store system names whose locations could not be determined by
the ePolicy Orchestrator server. The administrator (with appropriate rights) must move
the systems in Lost&Found groups to the appropriate place in the Directory to manage
them. Each site has a Lost&Found group, and the Directory has a global Lost&Found
group.
Inheritance
Inheritance is an important property that makes policy administration simpler. Because
of inheritance, child nodes in the Directory hierarchy inherit policies that have been set
at their parent nodes. For example:
Site policies are inherited by groups and individual systems within that site.
Group policies are inherited by sub-groups or individual systems within that group.
Inheritance is enabled by default for all sites, groups and individual systems that you
add to your Directory. This allows you to set policies and schedule scan tasks in fewer
places.
However, inheritance can be turned off at any location of the Directory to allow for
customization.
Let inheritance do the work for you. While you can assign security policies and
Note
schedule client on-demand scans or DAT file update tasks at any node of the
Directory, consider setting policies at the highest-level node possible. If you do, you’ll
have fewer changes to make. Avoid setting policies at the individual system level if
possible.
Global administrator.
Global administrator
Global administrators have read and write permissions and rights to all operations.
When you install the server and console, a global administrator account with the user
name admin is created.
You can create additional global administrator accounts for other people who need
global administrative rights to all aspects of the console.
19
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
ePolicy Orchestrator Directory: concepts and roles
Global administrators can use the console to deploy agents and security products,
change agent or product policies, create and run client tasks for updating DAT files or
performing on-demand scans for any node in any site in the Directory. In addition, only
global administrators can perform certain server-based functions.
Check packages into the master repository, move packages between branches, or
delete packages from the master repository.
Only global administrators can perform the following server management functions:
View and change all options on all tabs in the Events dialog box, if using ePolicy
Orchestrator authentication.
Import events into ePolicy Orchestrator databases and limit events that are stored
there.
Create, rename, or delete sites.
Site administrators
Site administrators have read, write, and delete permissions and rights to all operations
(except those restricted to global administrator user accounts) for one or more
products, and one or more sites in the Directory.
Site administrators can use the console to deploy agents and security products, change
agent or product policies, create and run client tasks for all groups or systems within
their sites in the Directory (for products to which they have permissions). Site
administrators can also run reports, but the reports show only data on systems located
within their sites. The site administrator is able to see, but not change, other sites in
the Directory.
You can also create site administrator accounts if you have administrators who you
want to only have ePolicy Orchestrator permissions to specific products.
20
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
ePolicy Orchestrator Directory: concepts and roles
Global reviewers
Global reviewers can view, but not edit, all settings in the console (except for Rogue
System Detection), including property settings, policy, and task settings for all nodes in
the Directory. Global reviewers can also run enterprise-wide and site-specific reports.
Site reviewers
Site reviewers can only view settings and run reports for specified products within
specified sites of the Directory.
As part of the planning process, consider the best way to divide systems into sites and
groups prior to building the Directory.
Sites
A site is a primary-level unit immediately under the Directory root in the console tree.
Traits of sites include:
Sites (and their groups and systems) are administered by a global administrator or
by a site administrator who has ownership of the specific site. (Site administrators
have administrative rights only over the sites to which ownership has been
assigned.)
Each site contains a Lost&Found group; a temporary container for systems for
which ePolicy Orchestrator wasn’t able to automatically place in the correct location
within the site.
Groups
A group is a secondary-level (or subsequent level) unit of the Directory. Traits of groups
include:
Groups can be created by global administrators, or the site administrator of the site
to which the group belongs.
21
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
ePolicy Orchestrator Directory: concepts and roles
Lost&Found groups
The Directory root and each site includes a Lost&Found group. Depending on the
methods you use to create and maintain Directory segments, the server uses different
characteristics to determine where to place systems within the Directory. Lost&Found
groups store systems whose locations could not be determined by the server.
Environmental borders
How you implement ePolicy Orchestrator and organize the systems for management
depends significantly on the borders that exist in your network. Borders influence the
organization of the Directory differently than the organization of your network topology.
Topological
Your network is already defined by domains or Active Directory containers. The better
organized your network environment, the easier it is to create and use the Directory.
Geographical
If your organization includes facilities in multiple geographic locations, even on multiple
continents, this must be taken into consideration when building your Directory.
Available bandwidth and administrative roles must be considered when your
organization has multiple locations.
Grouping systems first by geography provides several advantages for setting policies:
You can set update policies for the site or group so that all systems update from one
or more distributed software repositories located nearby.
If sites are located in other countries, you can deploy language-specific versions of
the agent or security software to these systems at once.
You can configure the update and product deployment policies for these systems
once.
22
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
ePolicy Orchestrator Directory: concepts and roles
Political
Many large networks are divided because different individuals or groups are
responsible for managing various portions of the network. Sometimes these borders
do not coincide with the topological or geographical borders. Who you want to access
and manage the various segments of the Directory can affect how you structure it.
Functional
Some networks are divided by the roles of the groups and individuals using the
network; for example, Sales and Engineering. Even if the network is not divided by
functional borders, you may need to organize the Directory by functionality if different
groups of users require different policies.
Different business groups may run different kinds of software that require special
anti-virus or security policies. For example, you may want to arrange your e-mail
exchange servers or SQL database servers into a group and set specific exclusions for
VirusScan Enterprise on-access scanning.
When planning, focus on the access individuals require or have to the ePolicy
Orchestrator server or nodes, and the borders you must accommodate.
If you use IP filters, you must set the IP filtering properties at each level of the Directory
properly. Know that:
To set an IP filter for a group, you must also set IP filters in parent groups or sites.
The IP ranges specified in lower-level groups must be a subset of the IP range of the
parent.
IP filters cannot overlap between different groups. Each IP range or subnet mask in
a given site or group must cover a unique set of IP addresses that cannot be
contained in other filter settings in other sites or groups.
After creating groups and setting your IP filters, run an IP integrity check task to make
sure your IP filter hierarchy is valid. This task alerts you if there are any conflicts or
overlaps between IP filters for different sites or groups.
You can assign IP ranges or IP subnet mask values to sites and groups as you create
them, or add or edit them at any time later.
23
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
ePolicy Orchestrator Directory: concepts and roles
Automatically populating the Directory with this method is the result of an algorithm
that uses both IP filters you create and domain information for the NT domain to which
the new system belongs.
Be careful if you have sites or groups in your Directory with the same name as NT
Tip
domains. The domain name search rule takes precedence over the IP group rule.
If you want the system to populate the appropriate location, create the IP group under
the site or group associated with the domain, or do not create the domain group under
the site.
The server uses the following search algorithm to place systems in the Directory based
on the criteria in this order:
1 Site IP filter — If a site with a matching IP filter is found, the system is placed in
that site based on the criteria in this order:
a In a group named the same as the NT domain to which the system belongs.
If no group match for IP address or domain name is found, the system is placed in the
Note
Lost&Found group of the site.
2 Site Domain name — If no site is found with a matching IP filter, the server
searches for a site with the same name as the NT domain to which the system
belongs. If such a site is found, the server searches for a group with a matching IP
filter and places the system within. If no group is found, the system is placed in the
Lost&Found group of the site.
3 No site IP filter or domain name match is found — If the server cannot find an IP
or domain name match in any site, the server adds the system to the global
Lost&Found.
Automatic IP address sorting does not apply to systems that you add to the Directory
Note
using Active Directory integration.
24
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
Repositories
Repositories
Before implementing the ePolicy Orchestrator software, you should decide the type of
update repositories to use, and how they should be organized.
Source repository
The source repository provides all updates for your master repository. The default
source repository for clean installations is the McAfee FTP update site (FtpSite), but
you can change the source repository or even configure multiple source repositories if
you require. McAfee recommends using the McAfee HTTP (HttpSite) or FTP (FTPSite)
update sites as your source repository.
You can download updates manually and check them into your master repository.
Note
However, using a source repository automates this process.
McAfee posts software updates to these sites regularly. For example, DAT files are
posted daily. Update your master repository with updates as they are available.
Use pull tasks to copy source repository contents to the master repository.
The McAfee update sites provide virus definition (DAT) and scanning engine file
updates (SCP templates and Spam rules are also available if the corresponding
managed products are in the master repository as well). All other packages and updates
must be checked into the master repository manually.
Fallback repository
The fallback repository is a repository from which managed systems can retrieve
updates when their usual repositories are not accessible. For example, when network
outages or virus outbreaks occur, accessing your established update infrastructure may
be difficult. Therefore, managed systems can remain up-to-date in such situations. The
default fallback repository is the McAfee HTTP download site (HTTPSite) for clean
installations, upgrades keep the designated repository. You can only define one fallback
repository.
Master repository
The master software repository maintains the latest versions of security software and
updates for your environment. This repository is the source of software and updates for
the rest of your environment. There is only one master repository for each ePolicy
Orchestrator server.
The master repository is configured when installed. However, you must ensure that
proxy server settings are configured correctly. By default, ePolicy Orchestrator uses
Microsoft Internet Explorer proxy settings.
25
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
Repositories
Distributed repository
Distributed repositories host copies of your master repository contents (although you
can restrict which files get copied from the master repository to each of the distributed
repository). Consider using distributed repositories and placing them throughout your
network strategically to ensure managed systems are updated while network traffic is
minimized, especially across slow connections.
As you update your master repository, ePolicy Orchestrator replicates the contents to
the distributed repositories, instead of to each system.
A large organization can have multiple locations with limited bandwidth connections
between them. Distributed repositories limit updating traffic across low-bandwidth
connections. If you create a distributed repository in the remote location and configure
the systems within the remote location to update from this distributed repository, the
updates are copied across the slow connection only once — to the distributed
repository — instead of once to each system in the remote location.
SuperAgent repositories
Use systems hosting SuperAgents as distributed repositories. If global updating is
enabled, SuperAgent repositories update managed systems automatically as soon as
selected updates and packages are checked into the master repository. You do not need
to spend additional time creating and configuring repositories or the update tasks.
Folder locations are created automatically on the host system before adding the
repository to the repository list.
26
ePolicy Orchestrator® 3.6 Walkthrough Guide Organizing the Directory and Repositories 3
Repositories
FTP repositories
If you are unable to use SuperAgent repositories, you can use an existing FTP server to
host a distributed repository. Use your existing FTP server software such as Microsoft
Internet Information Services (IIS) to create a new folder and site location for the
distributed repository. See your web server documentation for details to create a site.
HTTP repositories
If you are unable to use SuperAgent repositories, you can use an existing HTTP server
to host a distributed repository. Use your existing HTTP server software such as
Microsoft Internet Information Services (IIS) to create a new folder and site location for
the distributed repository. See your web server documentation for details to create a
site.
Unmanaged repositories
If you are unable to use managed distributed repositories, ePolicy Orchestrator
administrators can create and maintain distributed repositories that are not managed
by ePolicy Orchestrator.
Once the distributed repository is created, you can use ePolicy Orchestrator to
configure managed systems of a specific Directory site or group to update from it.
McAfee recommends that you manage all distributed repositories through ePolicy
Tip
Orchestrator. Managing distributed repositories with ePolicy Orchestrator and using
global updating, or scheduled replication tasks frequently ensures your managed
environment is up-to-date. Only use non-managed distributed repositories if your
network or organizational policy do not allow managed repositories.
27
4 Deploying the Agent and Products
Once the ePolicy Orchestrator server and consoles are installed, you must deploy
certain core components and security products in order to manage your systems.
The agent collects and sends information among the server, update repositories,
managed systems, and products. Systems cannot be managed without an installed
agent.
Due to the variety of network environments, McAfee provides several methods for you
to get the agent on to the systems you want to manage.
On the client system, if the agent was installed as part of another product
installation or deployed from the console to the system, it is installed by default in
this location:
28
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
ePolicy Orchestrator agent
On the client system, if you are upgrading the agent from version 2.5.1, the new
agent is also installed after the existing agent is uninstalled, by default in this
location:
<system_drive>\program files\network associates\common framework
Once the agent has been installed, you cannot change its installation directory
Caution
without first uninstalling it.
Each agent language package includes only those files needed to display the user
interface for that language. Agent language packages can be replicated to distributed
repositories.
After the initial ASCI, the agent retrieves the new package that corresponds to the
in-use locale and applies it. In this way, the agent retrieves only language packages for
the locales being used on each managed system.
The agent software continues to appear in the current language until the new
Note
language package has been applied.
Multiple language packages can be stored on managed systems at the same time to
allow users to switch between available languages by changing the locale. If a locale is
selected for which a language package is not available locally, the agent software
appears in English.
Dutch Polish
German (Standard)
29
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
ePolicy Orchestrator agent
C:\PROGRAM FILES\MCAFEE\EPO\3.6.0\DB\SOFTWARE\CURRENT\
ePOAGENT3000\INSTALL\0409\FRAMEPKG.EXE
This is the installation package that the ePolicy Orchestrator server uses to deploy
agents.
The default agent installation package contains no embedded user credentials. When
executed on the system, the installation uses the account of the currently logged-on
user.
Microsoft Windows XP Service Pack 2 and later operating systems do not allow
Note
embedded administrator credentials until the package file name has been added to
the exception list of the Windows firewall.
2 In the details pane, select the General tab, then click Agent Installation Package Creation
Wizard.
4 Type the User Name (<DOMAIN>\<USER>) and Password you want to embed in the
package, then click Next.
5 On the Install Directory dialog box, click Browse and select the location to which you
want to save the custom agent installation package.
30
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
ePolicy Orchestrator agent
6 Click Next. The Create Package dialog box appears, showing the progress of the
creation.
If you plan to deploy the custom installation package with ePolicy Orchestrator, check
the package into your master repository.
Agent-server communication
During agent-server communication, the agent and server exchange information using
SPIPE, a proprietary network protocol used by ePolicy Orchestrator for secure network
transmissions. At each communication, the agent collects its current system properties
and events, then sends them to the server. The server sends any new or changed
policies, tasks, and repository list to the agent. The agent then enforces the new
policies locally on the managed system.
Agent-to-server-communication interval.
Agent-to-server-communication interval
The agent-to-server-communication interval (ASCI) is set on the General tab of the ePO
Agent 3.5.0 policy pages. This setting determines how often the agent calls into the
server for data exchange and updated instructions. By default, the ASCI is set to 60
minutes. With this setting, the agent checks into the server once every hour. This is a
configurable setting on the agent policy pages.
31
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
ePolicy Orchestrator agent
For complete information on balancing bandwidth, server hardware, and ASCI, see
Note
the ePolicy Orchestrator 3.6 Hardware Sizing and Bandwidth Usage white paper.
You can force the agent to communicate to the server immediately after the installation
by running the CMDAGENT.EXE with the /P command-line option.
Wakeup calls
When you send a wakeup call from the server to agents in your environment, the
agents are prompted to call into the server. Wakeup calls can be sent manually or
scheduled as a task and are useful when you have made policy changes or checked in
updates to the master repository that you want to be applied to the managed systems
sooner than when the ASCI may occur.
32
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
ePolicy Orchestrator agent
Instead of sending agent wakeup calls from the server to every agent, the server sends
the SuperAgent wakeup call to SuperAgents in the selected Directory segment. When
SuperAgents receive this wakeup call, they send broadcast wakeup calls to all the
agents in their network broadcast segments. This reduces network traffic, which is
beneficial in large networks where ePolicy Orchestrator may manage agents in remote
sites over lower-speed WAN or VPN connections.
Server
11
— Broadcast Segment—
SuperAgent
22
44
Agent Agent Agent Agent
2 SuperAgents send a broadcast wakeup call to all agents in the same broadcast segment.
3 All agents (regular agents and SuperAgents) exchange data with the server.
4 Any agents without an operating SuperAgent on its subnet are not be prompted to
communicate with the server.
Ensure that the agent wakeup port (8081 by default) is not blocked by your firewall.
33
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Distributing agents
The agent activity log is an XML file named AGENT_<SYSTEM>.XML where <SYSTEM>
is the NetBIOS name of the system on which the agent is installed. This log file
records agent activity related to such things as policy enforcement, agent-to-server
communication, and event forwarding. You can define a size limit of this log file.
You can configure the level of logging of agent activity on the Logging tab of the ePO
Agent 3.5.0 | Configuration policy pages.
Distributing agents
Due to the variety of scenarios and requirements of different environments, there are
several methods you can use to distribute the agent to the systems you want to
manage. Before using any of these methods, you should consider each.
The following table details the advantages and disadvantages of the different methods
to distribute the agent.
34
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Distributing agents
Requirements
To use this method, several requirements must be met, including:
Systems to which you want to deploy the agent must already be added to the
Directory.
35
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Distributing agents
If you have not yet created the Directory, you can send the agent installation package
Note
to systems at the same time that you are adding sites, groups, and systems to the
Directory.
However, McAfee does not recommend this procedure if you are creating your
Directory by importing large NT domains or Active Directory containers. This can
generate too much network traffic.
Domain administrator rights are required to access the default Admin$ shared folder
on the desired systems. The ePolicy Orchestrator server service requires access to
this shared folder in order to install agents and other software.
Verify the ePolicy Orchestrator server can communicate with the desired systems.
Before beginning a large agent deployment, use ping commands to verify that the
server can communicate with a few systems in each segment of your network to
which you want to deploy agents.
If the targeted systems respond to the ping, then ePolicy Orchestrator can
communicate with them.
The ability to successfully use ping commands from the ePolicy Orchestrator to the
Note
managed systems is not required for the agent to communicate with the server after
the agent is installed. This is only a useful test for determining if you can deploy
agents from the server to them.
Verify that the Admin$ share folders on the desired systems are accessible from the
server.
This test also confirms your administrator credentials, because you cannot access
remote Admin$ shares without administrator rights.
To access Admin$ shares on desired systems from the ePolicy Orchestrator server:
b Type the path to the client Admin$ share by specifying either the system name or
IP address.
If the systems are properly connected over the network, your credentials have
sufficient rights, and the Admin$ shared folder is present, you should see a Windows
Explorer dialog box.
Ensure file and print sharing is enabled. (This is disabled by default on Windows 95,
Windows 98, and Windows ME systems.)
In addition, if you have systems in your network running these operating systems,
you must make sure they can be managed by ePolicy Orchestrator. By default,
these systems do not allow ePolicy Orchestrator administration. To enable these
systems for ePolicy Orchestrator administration, download VCREDIST.EXE and DCOM
1.3 updates from the Microsoft web site and install them on each client as required.
36
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Distributing agents
To deploy the agent from the ePolicy Orchestrator console or install a custom agent
installation package on systems running Windows XP Home, you must enable
network access.
d Select Local Security Policy. The Local Security Settings application window appears.
e In the console tree under Security Settings | Local Policies, select Security Options. The
available policies appear in the details pane.
f Select Network access: Sharing and security model for local accounts to open the Network
access dialog box.
g Select Classic - local user authenticate as themselves, then click OK. Local users are
able to authenticate and access resources on the system from the network.
You assigned IP sorting filters or NT domain names when creating the segments of
your Directory.
You already have a managed environment and you want to ensure that new systems
logging onto the network become managed as a result.
You already have a managed environment and you want to ensure systems are
running a current version of the agent.
The details of the login script used to install the agent can vary, depending on your
needs. Consult your operating system documentation for more details on how to write
login scripts.
37
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Distributing agents
You have systems running Windows 95, Windows 98, or Windows ME and do not
want to enable file and print sharing on them.
You assigned IP sorting filters or NT domain names when creating the segments of
your Directory.
You can install the agent on the system, or distribute the FRAMEPKG.EXE installer to users
in your organization and have them run the installation program themselves.
After the agent is installed, it calls into the server and adds the new system to the
Directory.
Enabling the agent in this way, rather than re-deploying the 1.5MB agent installation
package to each system, can save significant network bandwidth when you have many
systems with disabled agents on the network.
You cannot change the agent installation folder without uninstalling and reinstalling
Note
the agent. Agents that you enable may be in a different folder location than agents that
you deploy in your network using another method.
You must copy the SITELIST.XML repository list file from the ePolicy Orchestrator server
to the desired systems. The repository list contains network address information the
agent requires to call into the server after installing.
To enable the agent on unmanaged systems running a McAfee product with a disabled
agent:
1 Export the repository list (SITELIST.XML) from the ePolicy Orchestrator server and
copy it to a temporary folder on the system, such as C:\TEMP.
38
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Distributing agents
Reference the SITELIST.XML file in the temporary folder. By default, the FRMINST.EXE
file is installed in the following location:
Such products were most likely installed with an older version of the agent. These
Note
agents are not automatically upgraded to the latest agent version that is on the ePolicy
Orchestrator server. To upgrade the agent, you should also enable and run the
deployment task to install the new agent on the managed system.
Before creating an image for this purpose, remove the agent GUID registry value from
Note
the agent registry key. A GUID is regenerated on the first ASCI with the ePolicy
Orchestrator server.
You may not have access to systems in some portions of your environment except
when they are brought in for repair.
For instructions, see the documentation for your preferred image-creation product.
These systems require different agents, which can be downloaded from the McAfee
Note
web site. These agent installation packages are not installed on the ePolicy
Orchestrator server by default.
39
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying packages
Each McAfee product that ePolicy Orchestrator can deploy provides a product
deployment package (PKGCATALOG.z) file. ePolicy Orchestrator can deploy these
packages to any of your managed systems, once they are checked into the master
repository. The package catalog file contains the product installation files, which are
compressed in a secure format.
PKGCATALOG.Z files are used for both virus definition (DAT) and engine update packages.
You can configure product policy settings before or after deployment. McAfee
recommends configuring policy settings before deploying the product to network
systems, this can save time and ensure that your systems as protected as desired as
soon as possible.
Global administrators can check these package types into the master repository with
pull tasks, or manually:
Table 4-3 Supported packaged types
Package type Description Origination
Virus definition (DAT) files. The regular, daily DAT files FTPSite and HttpSite update
released by McAfee. sites, and the McAfee web site.
File type: PKGCATALOG.Z
Use a pull task to download DAT
files directly into the master
repository, or download and
check them into the master
repository manually.
Scanning engine. The updated scanning engine FTPSite and HttpSite update
for McAfee anti-virus products, sites, and the McAfee web site.
File type: PKGCATALOG.Z
such as VirusScan Enterprise.
Use a pull task to download
Engines are usually updated engine files directly into the
once or twice a year.
master repository, or download
and check them into the master
repository manually.
SuperDAT (SDAT.EXE) files. The SuperDAT files contain McAfee web site.
both DAT and engine files in
File type: SDAT.EXE Download and check SuperDAT
one update package.
files into the master repository
If bandwidth is a concern, manually.
McAfee recommends
updating DAT and engine files
separately.
40
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying packages
You are notified when you check in packages that are not signed by McAfee. If you are
confident of the content and validity of the package, continue with the check-in. These
packages are secured in the same manner described above, but are signed by ePolicy
Orchestrator when they are checked in.
41
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying and updating products
Using digital signatures guarantees that packages originated from McAfee or were
checked in by you, and that they have not been tampered with or corrupted. The agent
only trusts package catalog files signed by ePolicy Orchestrator or McAfee. This
protects your network from receiving packages from unsigned or untrusted sources.
If the update location you specify in the AutoUpdate or AutoUpgrade task settings is a
distributed repository managed by ePolicy Orchestrator, you must enable legacy
product support when you check the corresponding package into the master repository.
Doing so copies the packages into both directory structures, enabling you to support
legacy products.
1 Check the update package into the master repository with a pull task or manually.
42
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying and updating products
2 If using global updating, nothing else is necessary provided global updating has
been configured and enabled.
If not using global updating, use a replication task to copy the contents of the master
repository to the distributed repositories.
3 If not using global updating, create and schedule an update or deployment task for
agents to retrieve and install the update on managed systems.
Deployment task
Once you have checked in the product deployment package, you can use the
deployment task to install the product on managed systems. The deployment task is a
unique client task created automatically when ePolicy Orchestrator installs. It installs
any product that is deployable through ePolicy Orchestrator and has been checked into
the master repository.
If you chose to deploy server-based McAfee products, deploy them to specific systems,
rather than groups or sites.
Update tasks
Once an update package has been checked into the master repository and replicated
to the distributed repositories, the agents on the managed systems still need to know
when to go to the distributed repositories for updates. This is unnecessary if you are
using global updating.
You can create and configure client update tasks to control when and how managed
systems receive update packages. If you are not using global updating, creating these
client update tasks are the only way you can control client updating with ePolicy
Orchestrator.
If you are using global updating, a client update task is unnecessary, although you can
create a daily client update task for redundancy.
43
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying and updating products
Create a task to update DAT and engine files daily at the highest level of the
Directory that is inherited by all systems. If your organization is large, you can use
randomization intervals to mitigate the bandwidth impact of all systems updating at
the same time. Also, for large networks with offices in different time zones, running
the task at the local system time on the managed system, rather than at the same
time for all systems, helps balance network load.
Schedule the update task at least an hour after the scheduled replication task, if you
are using scheduled replication tasks.
Run update tasks for DAT and engine files at least once a day. Managed systems
can be logged off from the network and miss the scheduled task; running the task
frequently ensures these systems receive the update.
Maximize bandwidth efficiency and create several scheduled client update tasks
that update separate components and run at different times. For example, you can
create one update task to update only DAT files, then create another to update both
DAT and engine files weekly or monthly — engine packages are released less
frequently.
Create and schedule additional update tasks for products that do not use the agent
for Windows.
Use the Run missed task option. This can be useful if systems are logged off from the
network at the scheduled update time, ensuring they update after logging onto the
network.
Global updating
McAfee recommends using global updating with your updating strategy. Global
updating automates replication to your distributed repositories and updating managed
systems. Replication and update tasks are not required. Checking contents into your
master repository initiates a global update. The entire process should complete within
an hour in most environments.
Additionally, you can specify which packages and updates initiate a global update.
However, when you only specify that certain content initiates a global update, ensure
that you create a replication task to distribute content that was not selected to initiate
a global update.
When using global updating, McAfee recommends scheduling a regular pull task (to
Note
update the master repository) at a time when network traffic is minimal. Although
global updating is much faster than other methods, network traffic over the updating
time period is increased.
44
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying and updating products
3 A SuperAgent wakeup call with the SITESTAT.XML file is broadcast to all agents. This
file lists the contents of the master repository. If a package the managed systems
requires is in the list, the agent goes to a distributed repository to get the package.
Requirements
The following requirements must be met to implement global updating:
Pull tasks
Use pull tasks to update your master repository with DAT and engine update packages
from the source repository. DAT and engine files must be updated often. McAfee
releases new DAT files daily and engine files less frequently. Deploy these packages to
managed systems as soon as possible to protect them against the latest threats.
EXTRA.DAT files must be checked into the master repository manually. They are
Note
available from the McAfee web site.
A scheduled pull task runs automatically and regularly at times and days you specify.
For example, you can schedule a daily repository pull task at 5:00 AM.
You can also use the Pull now task to check updates into the master repository
immediately. For example, when McAfee alerts you to a fast-spreading virus and
releases a new DAT file to protect against it.
If a pull task fails you must check the packages into the master repository manually.
Once you have updated your master repository, you can distribute these updates to
your systems automatically with global updating or with replication tasks.
Bandwidth and network usage. If you are using global updating, as recommended,
schedule a pull task to run when bandwidth usage by other resources is low. With
global updating, the update files are distributed automatically after the pull task
completes.
Frequency of the task. DAT files are released daily, but you may not want to use your
resources daily for updating.
45
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying and updating products
Replication and update tasks. Schedule replication tasks and client update tasks to
ensure the update files are distributed throughout your environment.
Replication tasks
Use replication tasks to copy the contents of the master repository to distributed
repositories. Unless you have replicated master repository updates to all your
distributed repositories, some systems do not receive them. Ensure all your distributed
repositories are up-to-date.
If you are using global updating, replication occurs automatically — replication tasks
Note
are not necessary.
Scheduling regular replication tasks is the best way to ensure that your FTP, HTTP, and
UNC distributed repositories are up-to-date. Scheduling daily replication tasks ensures
that managed systems stay up-to-date.
With version 3.6, you can now specify which content gets replicated from the master
Note
repository to the distributed repositories (defined by the distributed repository), and
specify to which distributed repositories are replicated (defined in the task).
McAfee recommends scheduling a daily incremental replication task and a weekly full
Tip
replication task. This maximizes network bandwidth efficiency by updating only
essential, incremental changes during the week and guarantees completeness.
Repository selection
New distributed repositories are added to the repository list (SITELIST.XML) file
containing all available distributed repositories. The agent of a managed system
updates its repository list each time it communicates with the ePolicy Orchestrator
server. The agent performs repository selection each time the agent (McAfee
Framework Service) service starts and when the repository list changes.
Selective replication provides more control over the updating of individual repositories.
When scheduling replication tasks, you can choose:
46
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
About deploying and updating products
Specific files and signatures that are replicated to the distributed repositories.
Selecting only those types of files that are necessary to each system that checks
into the distributed repository lessens the impact on bandwidth resources. When
you define or edit your distributed repositories, you can choose which packages you
want to replicate to the distributed repository.
This functionality is intended for updating products that are installed on several
Note
systems only in your environment, like GroupShield and Webshield. The functionality
allows you to distribute such updates only to the distributed repositories these
systems check into.
You can also tightly control which distributed repositories agents use for updating by
enabling or disabling distributed repositories in the agent policy settings. McAfee does
not recommend disabling repositories in the policy settings. Allowing agents to update
from any distributed repository ensures they receive the updates.
Selective updating
ePolicy Orchestrator allows you to select which updates (DAT file, engine, and
product-specific updates) you want client systems to receive, so that valuable
bandwidth isn’t wasted transferring unnecessary files. You can use selective updating
with both global updating and update tasks.
You can also use this feature to selectively update only those components that you will
want updated as soon as possible once an update is released. For example, DAT files
and VirusScan Enterprise updates.
Due to the challenges customers face, ePolicy Orchestrator 3.6 provides different types
of update repositories and several methods for implementing them:
When a new update repository is created, the SITELIST.XML file is updated and the
Note
locations to which agents point for updates are adjusted.
The ePolicy Orchestrator server sends the repository list to the agent during
agent-to-server communication. You can also export it to a file, manually deploy it, then
apply it to client systems using command-line options.
47
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Checking in product deployment packages manually
You cannot check in packages to your master repository while pull or replication tasks
Note
are executing.
1 Locate the PKGCATALOG.Z file you want to check in. See the product’s configuration
guide for details on the location.
2 Copy the entire contents of the folder containing the package, then save it to a
temporary folder on your ePolicy Orchestrator server.
You must copy all the files in the PKGCATALOG.Z folder, or the package check-in fails.
Caution
4 In the details pane, under AutoUpdate Tasks, click Check in package. The Check-in package
wizard appears.
9 Click Finish to begin checking in the package. Wait a few minutes while the package
checks into the repository.
48
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Configuring the deployment task to install products on client systems
12 In the details pane, scroll through the list and locate the product and version of the
deployment package to verify the action was successful.
13 If you are using distributed repositories in your environment, be sure to replicate the
package to them.
1 In the console tree, select the site, group, or individual system to which to deploy
the product.
2 In the details pane, select the Task tab, then double-click Deployment in the task list.
the ePolicy Orchestrator Scheduler dialog box appears.
Figure 4-5 Deployment task for the selected node in the Directory
49
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Configuring the deployment task to install products on client systems
3 Select the Task tab and deselect Inherit under Schedule Settings.
4 Under Schedule Settings, select Enable (scheduled task runs at specified time). The task
does not run unless you enable it here.
5 Click Settings.
The Product deployment options list shows which products are available to deploy
through ePolicy Orchestrator. The products listed are those for which you have
already checked in a PKGCATALOG.Z file to the master repository. If you do not see
the product you want to deploy listed here, you must first check in that product’s
PKGCATALOG.Z file.
7 Set the Action to Install for the product you want to deploy.
8 To specify command-line install options, click for each item and type the desired
command-line options in the Command line text field. See your product
documentation for information on command-line options.
9 Click OK to save the product deployment options and return to the ePolicy Orchestrator
Scheduler dialog box.
50
ePolicy Orchestrator® 3.6 Walkthrough Guide Deploying the Agent and Products 4
Configuring the deployment task to install products on client systems
10 In the ePolicy Orchestrator Scheduler dialog box, select the Schedule tab.
12 Schedule as desired.
In the task list on the Tasks tab of the details pane, the Enabled status for the deployment
task is set to True.
Once configured, the agents receive the deployment instruction when they call into the
ePolicy Orchestrator server.
51
5 Rogue System Detection
Even though you already use ePolicy Orchestrator to manage your security products,
your protection is only as good as your coverage. Deploying agents to the systems you
know about in your network and keeping them up-to-date is only part of a
comprehensive strategy. The next step is ensuring you cover each system that
connects to your network.
In any managed network, there are inevitably a small number of systems that do not
have an agent on them at any given time. These can be systems that frequently log
onto and off from the network, including test servers, laptop systems, or wireless
devices. Unprotected systems are often the weak spot of any security strategy,
creating entry points by which viruses and other potentially harmful programs can
access to your network.
Rogue System Detection helps you monitor all the systems on your network — not only
the ones ePolicy Orchestrator manages already, but the rogue systems as well. A rogue
system is any system that is not currently managed by an ePolicy Orchestrator agent,
but should be.
When the sensor detects a new system on the network, it sends a message to the
ePolicy Orchestrator server. The server then checks whether the newly-identified
system has an active agent installed and managed. If the new system is unknown to
the ePolicy Orchestrator server, Rogue System Detection allows you to take
remediation steps including alerting network and anti-virus administrators or
automatically deploying an ePolicy Orchestrator agent to the system.
The sensor is a small Win32 native executable application. Similarly with an ePolicy
Orchestrator SuperAgent, you must have at least one sensor in each broadcast
segment, usually the same as a network subnet, in your network. The sensor runs on
any NT-based Windows operating system, such as Windows 2000, Windows XP, or
Windows 2003.
52
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
The sensor does not actively probe the network to search for which devices are
connected.
The sensor does not determine whether the system is a rogue system. It detects
Note
systems connected to the network and reports these detections back to the ePolicy
Orchestrator server.
To optimize performance and minimize network traffic, the sensor is designed to limit
its communication to the server by only relaying new system detections, and to ignore
any re-detected systems for a user-configurable time. For example, the Rogue System
sensor detects itself among the list of detected systems. If the sensor sent a message
every time it detected a packet from itself, the result would be a network overloaded
with sensor detection messages.
The sensor always reports any system the first time it is detected on the network.
The sensor adds the MAC address of each detected system to the packet filter, so
that it is not detected again until removed from the filter.
The sensor implements aging on the MAC filter so that after a time period, MAC
addresses for systems that have already been detected are removed from the filter,
causing those systems to be re-detected and reported to the server.
53
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
The sensor packages the gathered information about the detected system into an XML
message. It sends this message via secure HTTPS to the ePolicy Orchestrator server
for processing. The server then queries the ePolicy Orchestrator database to determine
whether the system is a rogue system.
To save bandwidth in large deployments, you can configure how often the sensors send
detection messages to the server. You can configure the sensor to cache detection
events for a given time period, such as one hour, and then send a single message
containing all the events from that time period.
At regular intervals, the ePolicy Orchestrator server changes primary sensors so that it
is not dependant on any one sensor for too long. Also, if the primary sensor is disabled
or stops responding, the ePolicy Orchestrator server automatically assigns a different
sensor on that broadcast segment the role of primary sensor.
The Subnet List table on the Subnets tab of the Rogue System Detection interface allows
you to view the subnets in your network where you already have ePolicy Orchestrator
agents. From here you can deploy sensors to systems.
54
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
For example, a new system may have just logged onto the network. This system had
an agent installed with a network login script at its initial logon. Since the initial agent
call to the server may take up to ten minutes, the rogue system sensor detects the
system before the agent communicates with the server and is added to the database
as a managed system. The system is classified as a rogue system, even though it is not
really a rogue system because it already has an agent. If you configure automatic
responses or automatic e-mail alerts for rogue detections, specifying a reasonable
grace period using the Rogue (Grace Period) rogue type can help you minimize false
positive detections.
55
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
The following table lists and describes each rogue type and its description:
Subnet status
Each subnet listed in the Subnet List table on the Subnets tab receives a status of Covered
if there is an active rogue system sensor is installed on a system in that subnet. A
subnet has an Uncovered status if there are no sensors present. You can click each
subnet to view a list of all systems in the subnet that have an active agent installed.
56
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
Distributing Rogue System sensors
Before distributing sensors, configure the settings on the Rogue System Sensor policy
pages.
In the future, network access sensors will be deployed from the Subnet List.
Note
You can allow sensor host systems to be selected automatically based on specific
criteria, or you can manually select them. As part of the sensor deployment, a Rogue
System Sensor Install client task is created for the host systems. This task allows you to
uninstall the sensor or upgrade it to a newer version.
If you allow Rogue system Detection to pick systems automatically on the subnet, you
can specify criteria for choosing systems. You can specify any or all of the criteria listed
here when configuring automatic sensor deployment:
57
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
Taking actions on detected rogue systems manually
You can install the sensor either via a SETUP.EXE installation wizard or via the command
line.
For specific instructions, see the ePolicy Orchestrator 3.6 Product Guide.
The following table lists the manual actions you can take on selected systems in the
Machine List table. Some of these are covered in greater detail in following sections.
58
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
Configuring automatic responses for specific events
Rogue Machine Detected. A new system is found that had not already found in the
ePolicy Orchestrator database.
Subnet Uncovered. A subnet in your network, that does not have a rogue system
sensor installed, is discovered.
An automatic response can contain one or more of the actions described in the
following table. For example, if you configure a response to deploy an ePolicy
Orchestrator agent to newly-detected systems, you may also want to send an e-mail to
administrators to follow up on the agent installation.
59
ePolicy Orchestrator® 3.6 Walkthrough Guide Rogue System Detection 5
Configuring automatic responses for specific events
60
6 ePolicy Orchestrator Notifications
The ePolicy Orchestrator Notifications feature can alert you to any events that occur on
the managed systems in your environment or on the ePolicy Orchestrator server itself.
You can configure rules in ePolicy Orchestrator to send e-mail, SMS, or text pager
messages (or SNMP traps), as well as run external commands, when specific events
are received and processed by the ePolicy Orchestrator server. The ability to specify the
event categories that generate a notification message and the frequencies with which
notifications are sent are highly configurable.
This feature notifies specified individuals when the conditions of a rule are met. These
can include:
This feature also allows you to configure notification rules to execute command lines
and launch registered executables when the specified conditions are met.
About Notifications
Before you plan the implementation of Notifications, you should understand how this
feature works with ePolicy Orchestrator and its Directory.
This feature does not follow the inheritance model of policy enforcement.
Note
61
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
About Notifications
When events occur on systems in your environment, they are delivered to the ePolicy
Orchestrator server, and the notification rules (associated with the group or site that
contains the affected systems and each parent above it) are applied to the events. If the
conditions of any such rule are met, a notification message is sent, or an external
command is run, per the rule’s configurations.
This design allows you to configure independent rules at the different levels of the
Directory. These rules can have different:
Aggregation
Use aggregation to determine the thresholds of events at which the rule sends a
notification message. For example, you can configure the same rule to send a
notification message when the ePolicy Orchestrator server receives 100 virus detection
events from different systems within an hour or whenever it has received 1000 virus
detection events altogether from any system.
Throttling
Once you have configured the rule to notify you of a possible outbreak situation, you
may want to use throttling to ensure you do not get too many notification messages. If
you are administering a large network, then you may be receiving tens of thousands of
events during an hour, creating thousands of notification messages based on such a
rule. ePolicy Orchestrator Notifications allows you to throttle the number of notification
messages you receive based on a single rule. For example, you can specify in this same
rule that you don’t want to receive more than one notification message in an hour.
When using throttling, the notification message received contains a summary of events
that occurred within the throttling period that would have triggered the rule otherwise.
62
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
About Notifications
For both scenarios, we can assume that each group, site, and the Directory root of the
console tree has a similar rule configured. Each rule is configured to send a notification
message when 100 virus infection events have been received from any product within
60 minutes. For reference purposes, each rule is named VirusDetected_<node name>,
where <nodename> is the name of the node as it appears in the Directory (for
example, VirusDetected_Group2c).
Scenario one
For this scenario, 100 virus infections are detected in Goup2C within 60 minutes in a
single day.
63
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Determining when events are forwarded
Scenario two
For this scenario, 50 virus infections are detected in Group2C and 50 virus infections are
detected in Group3B within 60 minutes in a single day.
Conditions of the VirusDetected_Directory rule are met, sending notification messages (or
launching registered executables) per the rules’ configurations. This the only rule that
can be applied to all 100 events.
If you choose to have events sent immediately (as set by default in ePolicy Orchestrator
Agent 3.5.0 McAfee Default policy), the agent forwards all events as soon as they are
received. If you want all events sent to the ePolicy Orchestrator server immediately so
that they can be processed by Notifications when the events occur, configure the agent
to send them immediately.
If you choose not to have events sent immediately, the agent only forwards events
immediately that are designated by the issuing product as high priority. Other events
are only sent at the agent-to-server communication intervals.
If the currently applied named policy is not set for immediate uploading of events,
either edit the currently applied named policy or create a new named policy for the ePO
Agent 3.5.0 | Configuration policy pages. This setting is configured on the Events tab of
these policy pages.
64
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Determining which events are forwarded
If you choose not to select which events are forwarded, all events are forwarded. This
Note
is the default setting.
1 In the console tree, select the desired ePolicy Orchestrator database server under
Reporting and log onto it with ePolicy Orchestrator authentication.
You must be a global administrator to make any changes to the Filtering tab.
Note
4 Select Send only the selected events to ePO on the Filtering tab.
Planning
Before creating rules that send notifications, you can save time by planning:
The types of events (both product and server) that could generate and send a
notification message in your environment.
Who should receive which notifications. For example, it may not be necessary to
notify the site administrator of site B about a failed replication in site A, but you may
want all site administrators to know that an infected file was discovered in site A.
Which types and levels of thresholds you want to set for each rule. For example, you
may not want to receive an e-mail message every time an infected file is detected
during an outbreak. Instead, you can choose to have such an e-mail message sent
— at most — once every five minutes, regardless of how often that server is
receiving the event.
Which command lines or registered executables you want to run when the
conditions of a rule are met.
65
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Rules
Rules
Rules allow you to define when, how, and to whom, notifications are sent, as well as
any executables you want to run when the rule is triggered. You can create or edit rules
once you have made some specific configurations to the feature.
But until all of your configurations are complete and you’ve familiarized yourself with
the abilities of ePolicy Orchestrator, you can use the default rules provided with the
product.
E-mail contacts list from which you select recipients for notification messages.
List of SNMP servers to use while creating rules. You can configure rules to send
SNMP traps to SNMP servers when the conditions are met for a rule.
List of external commands to run when the conditions of a rule are met.
These are all configured through the interface of Notifications. For instructions, see the
ePolicy Orchestrator 3.6 Product Guide.
Default rules
ePolicy Orchestrator provides six default rules that you can enable for immediate use
while you learn more about the feature.
Once enabled, the default rules send notification e-mail messages to the e-mail
Note
address you provided on the Set E-mail Address panel of the installation wizard. This
is also the Administrator address in both the Notifications and Rogue System
Detection contact lists.
You can edit any of the default rules as necessary.
Specify the e-mail server from which the notification messages are sent.
Ensure the recipient e-mail address is the one you want to receive e-mail messages.
Send a test e-mail from the Basic Configuration section of the Configuration tab.
66
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Viewing the history of Notifications
Creating rules
Creating a rule is a four-step process:
1 Describe the rule — Naming the rule and defining the level of the Directory to which
it applies.
2 Set filters for the rule — Specifying the products, event categories, and any threat
names that apply to the rule.
3 Set thresholds of the rule — Defining the aggregation and throttling of the rule.
4 Configure the notifications for the rule — Defining the messages you want sent,
their delivery type, and any executables you want to run when the rules conditions
are met.
For complete instructions, see the ePolicy Orchestrator 3.6 Product Guide.
67
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Viewing the history of Notifications
Notification summary
The Notification Summary page allows you to view a summary of the number of
notifications sent by product, category, priority, or rule name:
3 Select the Time by which you want to limit the Notification Summary data. These
include:
All Times
Last Hour
Last 8 Hours
Last Day
Last Week
4 Select the Site for which you want to limit the Notification Summary data. You can select
individual sites or All sites.
If the global administrator has not allowed reviewers and site administrators to view
Note
Directory notifications and rules, site administrators and site reviewers are limited to
viewing only notifications and rules for their sites. Site administrators and site
reviewers can never view notifications and rules specific only to other sites.
5 In Group by, select Product, Category, Priority, or Rule name from the drop-down list, and
the quantity of notifications sent for the Group by selection.
Notification list
The Notification List page allows you to view a list of all notifications sent. This list can be
sorted by the data of any column by clicking the column title.
1 In the console tree, select Notifications under the desired Directory in the console tree.
3 Click any column title (for example, Notification Type) to sort the list by that column.
If the global administrator has not selected to allow reviewers and site administrators
Note
to view Directory notifications and rules, site administrators and reviewers are limited
to viewing only notifications and rules for their sites. Site administrators and site
reviewers can never view notifications and rules specific only to other sites.
Notification details
Click any notification from the Notification List page to view its details, including:
68
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Viewing the history of Notifications
Sites.
Received products.
Rule names.
69
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Viewing the history of Notifications
Entercept Stinger
70
ePolicy Orchestrator® 3.6 Walkthrough Guide ePolicy Orchestrator Notifications 6
Viewing the history of Notifications
Checking in additional NAP files can add event categories to this list.
Note
71
7 Outbreaks
The most effective response to viruses is to know your system, have current anti-virus
software installed, detect outbreaks early, then respond quickly and efficiently. An
effective strategy includes both prevention as well as response.
The ePolicy Orchestrator software can help reduce the costs of managing an outbreak.
When you use ePolicy Orchestrator, you can manage all of your sites from a central
location, which makes management easier, more efficient, and ensures consistently
applied policies across your enterprise.
72
ePolicy Orchestrator® 3.6 Walkthrough Guide Outbreaks 7
Tasks to do on a daily or weekly basis to stay prepared
You can also re-configure any of these scheduled tasks to Run Immediately should you
need to run a particular task manually.
To keep anti-virus and security software on client systems up-to-date, make sure you
have the right client tasks created and scheduled for the appropriate parts of your
Directory. The following describes a sample of what your client task configuration
might look like in a typical deployment.
73
ePolicy Orchestrator® 3.6 Walkthrough Guide Outbreaks 7
Checklist — Are you prepared for an outbreak?
The ePolicy Orchestrator software has been fully installed and implemented.
An anti-virus software product has been installed and configured on your systems.
For example, McAfee VirusScan Enterprise 8.0i.
Your anti-virus software is up-to-date with the latest virus definition (DAT) files. You
are performing regular, scheduled updates of the virus scanning engine and virus
definition (DAT) files for each of the anti-virus products that you manage through
ePolicy Orchestrator. You can also use reports to determine coverage. For more
information and instructions, see the reporting guide.
Turn off all network appliances and services you are not using.
Examine which services need inbound and outbound traffic, and which ports they
use. (Specifically, which of the first 1024 ports are used. On your gateway firewall,
disallow traffic on ports not used by your appliances and services.
Examine what types of e-mail attachments are acceptable in your environment, and
disallow others.
Your Microsoft products running on managed systems are up-to-date with the latest
patches and Service Packs. (Generally, Microsoft releases these on a monthy basis.)
You can use McAfee System Compliance Profiler to ensure all of your systems are
compliant to the latest Microsoft patches and Service Packs.
You have configured Notifications to send a message to you or others when
specified events (like a virus detection) are received and processed by the server.
The Rogue System Detection feature is implemented to recognize and deploy
agents to rogue systems and devices coming on to your network.
You are performing regular, scheduled updates of products through ePolicy
Orchestrator to ensure your security products are running the latest patch or Service
Pack.
You have enabled the agent wakeup call and tested the agent’s communication with
the systems on your network.
Users complain of slowness. Users are often the first to notice when a full-scale
outbreak is taking place. Systems slow down, network systems stop responding,
and applications start displaying messages.
74
ePolicy Orchestrator® 3.6 Walkthrough Guide Outbreaks 7
Checklist — You think an outbreak is occurring
Monitoring tools (for example, tools from Sniffer Technologies) detect a change in
the network utilization levels.
Users complain of slowness. Users are often the first to notice when a full-scale
outbreak is taking place. E-mail slows down or does not work at all.
CPU utilization of Microsoft Exchange servers goes up significantly.
Monitoring tools (for example, tools from Sniffer Technologies) detect a change in
the e-mail utilization levels.
McAfee Outbreak Manager notifies you via e-mail that a potential outbreak may be
indicated.
McAfee Alert Manager notifies you that a virus has been detected.
When an outbreak occurs, you can respond in many ways. Use the You think an
outbreak is occurring checklist to respond to an outbreak.
Visit the AVERT home page to get the latest virus information.
Modify the firewall and network security settings to block viral activity. To help you
determine what to block and how the virus behaves, visit the Virus Information
Library on the AVERT web site.
Increase detection settings for all anti-virus products to meet the threat. Visit the
Virus Information Library for an analysis of the threat.
75
ePolicy Orchestrator® 3.6 Walkthrough Guide Outbreaks 7
Checklist — You think an outbreak is occurring
Regularly enforce agents with an agent wakeup call, and run coverage reports to
determine that protection is in place.
To ensure full coverage, you must have the ePolicy Orchestrator agent installed on
Caution
each system.
If you do not have a McAfee anti-virus product installed or do not have the ePolicy
Orchestrator agent deployed to each system, you must manually scan the system
or system using the command-line scanner, or use another anti-virus product.
76
SECTION 2
Lab Evaluation
This section provides instructions for setting up a simple ePolicy Orchestrator implementation in a lab environment.
This section describes how to install and deploy ePolicy Orchestrator in a test
environment. It provides easy steps to get ePolicy Orchestrator 3.6 up and running
quickly, and presents important features of the product.
78
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
One or more client systems (servers or workstations) to which you deploy agents
and VirusScan Enterprise 8.0i.
See the ePolicy Orchestrator 3.6 Installation Guide and VirusScan Enterprise 8.0i
Installation Guide for complete software and hardware requirements for the ePolicy
Note
Orchestrator server, the agent, and VirusScan Enterprise 8.0i.
79
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
On the server, open a command window (Start | Run) and type cmd at the prompt.
ping MyComputer
ping 192.168.14.52
3 Confirm that client NT Admin$ share folders are accessible from the server.
From the system on which you plan to install the ePolicy Orchestrator server, test
access to the default Admin$ share folder on each client system. This access is
required for the ePolicy Orchestrator server to install agents and other software, and
testing confirms your administrator credentials.
Type the path to the client Admin$ share (use system name or IP address):
\\MyComputer\Admin$
\\192.168.14.52\Admin$
If systems are properly connected over the network, your credentials have sufficient
rights, the Admin$ share folder is present, and you see a Windows Explorer dialog
box.
support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q259403&
www.microsoft.com/com/dcom/dcom95/dcom1_3.asp
5 Enable File and Print Sharing on Windows 95, Windows 98, or Windows Me
client systems.
To deploy the agent to systems running Windows 95, Windows 98, or
Windows Me, you must first enable File and Print Sharing . After the agent is deployed,
you can disable File and Print Sharing and still be able to manage agent policies on
those systems.
If you install the agent manually or through another method such as login scripts, this
step is not required.
Note
80
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
1 From the system on which you plan to install the ePolicy Orchestrator server and
console, open a web browser and go to:
http://www.mcafeesecurity.com/us/downloads/evals/
2 Select ePolicy Orchestrator Enterprise Edition 3.6 from the list and click the TRY link.
3 Fill out the form and follow directions to download the EPO360EML.ZIP file.
6 Extract the contents of the downloaded .ZIP files into a temporary folder on the
system you plan to use as your test ePolicy Orchestrator server.
You need to access files in these folders at various times during the deployment
process covered in this guide.
81
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
STEP
1 Locate and start the SETUP.EXE file located in the root of the folder where you
extracted the EPO360EML.ZIP.
2 Click Next at the initial page of the ePolicy Orchestrator 3.6.0 Setup wizard.
4 Read the license agreement. If you agree to the terms select I accept the terms in the
license agreement, then click OK. (If you don’t agree, then click Cancel and quit the
product evaluation.)
5 On Installation Options, select Install Server and Console and click Next. You can also
change the installation folder if desired.
6 If you see a message box stating that your server does not have a static IP address,
ignore it by clicking OK.
7 On the Set Administrator Password dialog box, enter the password you would like to use
for the ePolicy Orchestrator server. You cannot leave this blank.
8 On the Select Database Server dialog box, select Install a server on this computer and use it.
This option installs the free MSDE database included with ePolicy Orchestrator.
9 Click Next.
10 On the Database Server Account dialog box, deselect Use the same account as the Server
service, then select This is a SQL Server account. Type in and verify a secure password.
This is the SA account that your ePolicy Orchestrator server service uses to access
the MSDE database.
82
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
12 On the HTTP Configuration dialog box, change the Agent-to-Server communication port to
82 and the Console-to-Server communication port to 83.
Some HTTP ports (ports 80 and 81 in particular), are commonly used by many HTTP
applications and services. Because of this, port 80 may already be in use and not
available. McAfee recommends changing the port number to avoid any conflicts.
If you do see a warning message saying that one or more HTTP ports are in use,
click OK and repeat Step 12, this time specifying unused HTTP ports.
14 On the Set E-mail Address dialog box, type the e-mail address to which the default
notification rules send messages once they are enabled.
This e-mail address is used by the ePolicy Orchestrator Notifications feature. This
feature is covered in this guide, so enter an e-mail address that receives messages
you can view.
15 On the Ready to Install dialog box, click Install to begin the installation.
The installation takes approximately 20 minutes to complete and may prompt you
to reboot the system during the installation.
16 Click OK when prompted to reboot and be sure to log back in when the system
reboots to allow the installation to continue.
Once the installation is complete, you can open the ePolicy Orchestrator console to
begin deploying agents and anti-virus products to the client systems in your network.
83
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
1 Click the Start button, then select Programs | McAfee | ePolicy Orchestrator 3.6.0 Console.
3 When the Log on to Server dialog box appears, make sure the Server name displays the
name of your ePolicy Orchestrator server and that the User name is admin, type the
Password you set during the installation wizard, then click OK.
4 If you have installed an evaluation version, click OK at the Evaluation splash screen.
Wait a few moments while the ePolicy Orchestrator server initializes. You are now
ready to use the ePolicy Orchestrator console.
STEP
Before you start managing anti-virus policies for client systems on your network, you
must add those systems to your ePolicy Orchestrator Directory. After installing the
server, you initially have one system in the Directory — the ePolicy Orchestrator server
itself.
To organize your systems, you can group them into logical collections called sites and
groups. You can create a hierarchy of sites and groups, much like you would create a
hierarchy of folders in Windows Explorer. Grouping is useful for assigning policies and
tasks. You can group systems according to any criteria that makes sense for your
organization.
NT Domain. Using your existing NT network domains as sites makes creating your
Directory fast and easy. Having your Directory structure mirror your network
structure can also mean you only have to remember one hierarchy, not two.
Active Directory containers. Using your existing Active Directory network
containers as sites makes creating your Directory fast and easy. Having your
Directory structure mirror your network structure also means you only have to
remember one hierarchy.
Servers and workstations. You may want to configure separate policies for
products like VirusScan Enterprise 8.0i, depending on whether the software is
running on a server or a workstation. Dividing your Directory into groups is not
required, especially for testing in a small lab environment. However, you can use
groups to experiment with setting policies for groups of systems or for how you
might want to organize your Directory.
84
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Other typical methods of grouping include, but are not limited to:
Option A: Automatically add entire existing NT domains to your Directory. Very easy
and fast. Useful if you plan to deploy agents to every system in that domain. Use
this method if you organized your test client systems into domains in your lab
network, as in the examples in this guide.
Option B: Automatically add entire Active Directory containers to your Directory.
Very easy and fast. Useful if all or part of your environment is controlled by Active
Directory and if you want portions of your ePolicy Orchestrator Directory to mirror
portions of your Active Directory.
Option C: Manually add individual systems to your Directory. While this may be too
slow when deploying ePolicy Orchestrator in a live network, it is fast enough for
adding a handful of systems in your test network.
The examples in this guide use this method to create Directory sites from an NT domain
on the test network, Domain1.
3 In the New Site dialog box, type a name for the site. Make sure the name you type
matches exactly the name of your NT domain.
5 Click Add under IP Management to specify an IP address range for the site.
6 In the IP Management dialog box, type an IP subnet mask or IP range to specify the IP
address ranges of systems that belong to this site.
8 Click OK to save the new site and close the New Site dialog box.
85
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
9 In the Add Sites dialog box, make sure that Send agent package is NOT selected and
click OK to create and populate the sites in the Directory. Although you can deploy
agents at this point, you will do that in a later step once we have modified the agent
policy settings.
After a few moments, the systems are added to your Directory. When completed, you
can see that ePolicy Orchestrator first created a site in the Directory with the name of
your network test domain and added all the systems in that domain as children of that
domain.
The examples in this guide use this method to create Directory sites from an Active
Directory container, with two sub-containers.
To use ePolicy Orchestrator software’s Active Directory tools, it is important that both
the ePolicy Orchestrator server and the system running the console (if different) can
Note
reach the Active Directory server.
The Active Directory Import wizard is a tool to import Active Directory systems for the first
time, while you create the entire Directory, or only a specific site of the Directory. Use
the Active Directory Discovery task to poll these Active Directory containers regularly for
any new systems.
86
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
3 In the New Site dialog box, type a name for the site, for example Container1, then click
OK.
4 Make sure that Send agent package is NOT selected, then click OK.
5 Right-click Directory, and select All Tasks | Import Active Directory Computers.
7 On the ePolicy Orchestrator Destination Group panel of the wizard you can select the root
or a site of the Directory to import the Active Directory systems.
For the purposes of this guide, select the site you just created from the Import to this
ePO location drop-down list, then click Next.
If you want to import your entire Active Directory structure, minus exceptions, to use
as your ePolicy Orchestrator Directory, select Root from this list. This results in the
Note
Active Directory structure, minus exceptions, being imported into the Lost&Found of
the Directory root.
8 On the Active Directory Authentication panel, type Active Directory user credentials with
administrative rights for the Active Directory server.
9 In the Active Directory Source Container dialog box, click Browse to select the desired
source container in the Active Directory Browser dialog box, then click OK.
10 If you wish to exclude a specific sub-container of the selected container, click Add
under Exclude the following sub-containers, then select the desired sub-container to
exclude and click OK.
11 Click Next, and view the active log for any new systems that have been imported.
Verify in the console tree that these systems were imported.
87
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
12 Click Finish.
The Active Directory systems have been imported into the Lost&Found group of the
site to which you imported them. If your Active Directory container included
sub-containers, the Lost&Found group retains the Active Directory hierarchy.
13 Click and drag the top of this structure from the Lost&Found group, to the site above
it. (The site you selected in the wizard. For example Container1.)
Congratulations. You have imported your Active Directory systems into a site in the
ePolicy Orchestrator Directory.
In a production environment, once Active Directory containers have been imported, you
should create an Active Directory Discovery task. This task regularly polls
administrator-specified Active Directory containers for any new systems, and for
systems that have been removed. See the ePolicy Orchestrator 3.6 Product Guide for
instructions. This task is beyond the scope of this guide.
1 Right-click Directory node in the console tree and select New | Site.
3 Type a name for the site, such as Domain1 in our example, into the Name field of the
New Site dialog box.
4 Specify an IP mask or address range for the site if needed. See the previous section
for details.
5 Click OK. The Domain1 site is added to the Sites to be added list on the Add Sites dialog
box.
7 Click OK. ePolicy Orchestrator adds the new, empty sites to the Directory.
1 In the console tree, right-click the site you added and select New | Computer.
2 In the Add Computers dialog box, add new systems either by clicking Browse to locate
them in your NT Network Neighborhood, or by clicking Add and typing the system’s
NetBIOS name.
3 Click OK once you have added the names of all the systems.
ePolicy Orchestrator adds the new systems to the Directory beneath the site.
88
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
The example in this guide creates groups in each site for servers and workstations. Use
these groups later when setting different VirusScan Enterprise policies for servers and
workstations.
The VirusScan Enterprise 8.0i policy pages for ePolicy Orchestrator 3.6.0 allow you to
set separate policy settings for servers and workstations without creating these
Note
groups. However, grouping systems by operating system is a conceptually simple way
to illustrate how using Directory groups can make managing policies easier. If needed,
create other kinds of groups that better fit your test network or policy management
needs.
1 Right-click a site that you added to the Directory and select New | Group.
3 On the New Group dialog box, type the name Workstations into the Name text box.
You must also set an IP mask at the parent site. The IP mask or IP range that you set
for the group must be consistent with the IP range specified at the site level. In the
Note
examples used in this guide, the workstations and servers in Domain1 all fit within the
192.168.14.0/24 subnet.
Also note that IP management is not necessary for Active Directory systems.
b In the IP Management dialog box, type an IP subnet mask or IP range to specify the
IP address ranges of systems that belong to this site.
c Click OK to save the IP settings and close the IP Management dialog box.
5 Click OK to close the New Group dialog box. The group is added to the Groups to be
added list.
6 Click OK on the Add Groups dialog box to add the group to your Directory.
Once the new groups appear in the Directory, drag systems from that site into the
appropriate group as you would drag files in Windows Explorer. You must drag systems
in the Directory one at a time; you cannot select multiple systems. Alternatively, you
can use the Directory search feature (right-click Directory and select Search) to move
multiple systems at one time.
89
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
While dragging systems into groups, ignore the IP Integrity warning message if you see it
by clicking OK.
Repeat all these steps to create a server group for your site, as well as additional server
and workstation groups for other sites, if you have them. You can also make groups
within groups. For example, the test network shown in this guide has systems running
both Windows 2000 and Windows 98. Due to limitations with older versions of
Windows, we need to set different policies for systems running Windows 98. Creating
Win98 and Win2K subgroups within our Workstation group makes setting these
different policies easier.
Now your test Directory is finished. You have created sites and added systems, either
manually or by importing existing NT domains on your network. And you have
separated the systems in each site into separate groups for servers and different types
of workstation operating systems. You’re ready for the next step—deploying agents.
STEP
Deploying the agent from the ePolicy Orchestrator server requires the following:
90
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
From the Directory in the console tree, you can install the agent on each system in a
site at once. To do this, send an agent install command to the site. Because of
inheritance, you can specify an agent installation at the parent site (or group) level and
all child nodes inherit the command.
Initiate separate agent installations to separate sites of your Directory. These two agent
installation commands install the agent to all systems in these sites.
2 Deploy agents.
Alternatively, if you do not plan to use ePolicy Orchestrator to deploy the agent, you can
install the agent manually from the client system. See Installing agent manually on
client systems on page 94.
To change the agent policy settings so that the agent icon appears in the system
tray after installation:
2 In the details pane, select the Policies tab, then open ePO Agent 3.5.0 from the list of
products.
4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box
appears.
5 Provide a New policy name for the policy (for example, New Agent Policy), then click
OK. The Policy Settings dialog box appears.
91
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
7 Click Apply All, then click Close. The new policy is created and added to the Policy
Catalog page.
8 Click Apply at the end of the Configuration row on the Assign Policies page to assign the
new policy to the site selected in the console tree.
1 In the console tree, select the desired Directory node to which you want to assign
the new policy.
2 In the details pane, select the Policies tab, then open ePO Agent 3.5.0 from the list of
products.
4 Select the name of the new policy (for example, New Agent Policy) from the Policy
Name drop-down list.
5 Click Apply.
Now your policies are set and your agents are ready to deploy. The next step is to begin
an agent install.
2 Deploy agents
Use the Send Agent Install feature to deploy agents to your client systems. Deploy agents
to all your test systems in a site at once by initiating the agent installation at your site
level in the Directory.
1 In the console tree, right-click the desired site, then select Send Agent Install.
2 Provide credentials with administrator rights on the target systems for the agent
installation.
3 Click OK on the Install Agent dialog box to accept all default settings and begin the
agent installation.
92
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Before deploying the agent, deselect Use ePO server credentials on the Install Agent dialog
box, and type an appropriate user name and password with domain administrator rights
in the target domain.
1 In the console tree of the ePolicy Orchestrator console, right-click your server and
select Server Events.
2 Skim the Server Event Viewer for events. Successful agent installations are not
displayed here, but failed installs are.
When agent deployment is complete and the agents have called back to the server for
the first time, the systems in your Directory are marked with green checks.
If the agents have installed and the Directory does not reflect this, manually refresh the
Directory by right-clicking Directory and selecting Refresh. Note that the Directory does
not show the systems as managed until they call back to the server, usually within 10
minutes. This is true even though the agent is installed and running on the client
systems.
You can also watch the installation from any of your client systems. The default policy
suppresses the installation interface (which we did not change when we set agent
policies in this example). So you cannot see the installation interface. However, you can
open the Task Manager on the client system and watch the CPU usage spike briefly as
the installation begins. Once the agent is installed and running, two new services
appear in the Processes window: UPDATERUI.EXE and FRAMEWORKSERVICE.EXE. Also,
because of how we modified the agent policies before deploying, the agent icon
appears in the system tray after installing and reporting back to the server.
93
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
Use the FRAMEPKG.EXE file located on your ePolicy Orchestrator server to install the
agent. The FRAMEPKG.EXE file is automatically created when you install the ePolicy
Orchestrator server. It contains address information for your ePolicy Orchestrator
server to allow the new agent to communicate with the server immediately.
C:\Program Files\Mcafee\ePO\3.6.0\DB\Software\Current\
EPOAGENT3000\Install\0409
1 Copy the FRAMEPKG.EXE file to the local client or network folder accessible from the
client.
2 Run FRAMEPKG.EXE by double-clicking it. Wait a few moments while the agent
installs.
At some random interval within ten minutes, the agent reports back to the ePolicy
Orchestrator server for the first time. At this point, the system is added to the Directory
as a managed system. If you specified IP address filtering for your Directory sites and
groups, the client is added to the appropriate site or group for its IP address. Otherwise,
the system is added to the Lost&Found group. Once the system is added to the
Directory, you can manage its policies through the ePolicy Orchestrator console.
You can bypass the ten-minute callback interval and force the new agent to call back to
the server immediately. You do this from any system on which an agent has just been
installed.
1 From the client system where you just installed the agent, open a DOS command
window by selecting Start | Run, type command, and press Enter.
2 In the command window, navigate to the agent installation folder containing the
CMDAGENT.EXE file.
3 Type the following command (note the spaces between command line options):
CMDAGENT /p /e /c
4 Press ENTER. The agent calls into the ePolicy Orchestrator server immediately.
5 From the ePolicy Orchestrator console on your server, refresh the Directory by
pressing F5. The new client system on which you installed the agent should now
appear in your Directory.
94
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
STEP
Systems in the Domain1 site receive updates and product deployments directly from the
master repository, located on the ePolicy Orchestrator server. Systems located in the
Container1 site, however, receive them from a distributed repository.
Use the following procedure for using and setting up repositories in your test
environment:
2 In the details pane, select Check in Package. The Check in package wizard appears.
95
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
3 Click Next.
4 On the second page of the wizard, select Products or updates, then click Next.
6 Locate and select the PKGCATALOG.Z package file, then click Next.
7 At the final wizard page, click Finish to begin the package check-in.
Wait a few moments while ePolicy Orchestrator uploads the package to the repository.
To check in the VirusScan 4.5.1 package (for Windows 95, Windows 98, or
Windows ME client systems):
VirusScan Enterprise 8.0i does not run on Windows 95, Windows 98, or Windows ME.
If you have client systems in your test network running these versions of Windows,
deploy VirusScan 4.5.1 to these systems. To do this, repeat the same procedure above
to check in the VirusScan 4.5.1 deployment package to the software repository. The
4.5.1 package is also called PkgCatalog.z and is located in your temporary folder to
which you have extracted the VirusScan 4.5.1 installation files.
Test that your ePolicy Orchestrator server can connect over the Internet to the
source repository.
Update your master repository with the latest DAT files.
DAT files are updated often, and the DAT files included in your VirusScan Enterprise
installation files are not the latest. Pull the latest DAT files from the source repository
before deploying VirusScan Enterprise to your network.
96
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
Your ePolicy Orchestrator server must be able to access the Internet to pull updates
from the McAfee source repository.
ePolicy Orchestrator by default uses your Internet Explorer proxy settings. If you have
not yet done so, configure your LAN connection for Internet Explorer. Be sure to select
the Use proxy for all protocols (both FTP and HTTP) and select Bypass proxy for local addresses
options.
Alternatively, you can manually specify proxy server information using the Configure
proxy settings option. Refer to the ePolicy Orchestrator 3.6 Product Guide for information
on how to do this.
2 In the details pane, select Pull now. The Pull Now wizard appears.
3 Click Next.
5 If you are managing older products, such as VirusScan 4.5.1 for Windows 95 or 98
systems, be sure to select Support legacy product update.
6 Click Finish to accept all defaults on this page and begin the pull task. The Server Task
Log appears.
Now you have checked in VirusScan Enterprise to your master repository and also
updated the master repository with the latest DAT and engine files from the McAfee
source repository. The systems located in the same domain as your ePolicy
Orchestrator server, those systems in your Domain1 site in the Directory in this example,
get VirusScan Enterprise from the master repository.
97
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
But where do other systems get their software and updates? If these systems are
located in different subnets or a WAN-connected location, it may be more efficient to
create a distributed repository that is more easily accessible to these systems.
You can use FTP, HTTP, or UNC to replicate data from the master repository to your
distributed repositories. This guide describes creating a UNC share distributed
repository on one of the systems in the Container1 site.
To do this:
1 From the system on which you plan to host the repository, create a new folder using
Windows Explorer.
98
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
4 Click OK to accept all other defaults and enable sharing for this folder.
Creating a UNC share in this way could be a potential security problem in a production
environment, because it allows everyone on your network access to the share. If
Caution
creating a UNC folder in a production environment, or if you are not sure that your
network test environment is secure, be sure to take extra security precautions as
necessary to control access to the shared folder. Client systems only require read
access to retrieve updates from the UNC repository, but administrator accounts,
including the account used by ePolicy Orchestrator to replicate data, require write
access. See your Microsoft Windows documentation on how to configure security
settings for shared folders.
2 Select Add distributed repository from in the details pane Repository pane.
99
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
4 Type a Name. Note this is the name that appears in the repository list in the ePolicy
Orchestrator console. It does not need to be the same as the name of the shared
folder that actually hosts the repository.
7 Type the path of the shared folder you created. Be sure to type a valid UNC path.
8 Click Next.
10 Type appropriate domain, user name, and password credentials that client systems
should use when downloading updates from this distributed repository.
11 Click Verify to test the credentials. After a few seconds, you should see a
confirmation dialog box confirming that the share is accessible to client systems.
If your site is not verified, check that you typed the UNC path correctly on the
previous wizard page and that you configured sharing correctly for the folder.
12 Click Next.
13 Enter replication credentials by typing a domain, user name and password in the
appropriate text boxes.
The ePolicy Orchestrator server uses these credentials when it copies, or replicates,
files from the master repository to the distributed repository. These credentials
must have administrator rights in the domain where the distributed repository is
located. In our examples, these can be the same credentials used to deploy the
agent. See Deploy agents on page 92.
14 Click Verify to test that your ePolicy Orchestrator server can write to the shared folder
on the remote system. After a few seconds, you should see a confirmation dialog
box confirming that the server can do this.
15 Click Finish to add the repository. Wait a few moments while ePolicy Orchestrator
adds the new distributed repository to its database.
16 Click Close.
100
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
Use the Replicate now feature to manually update your distributed repositories with the
latest contents from your master repository. Later, we’ll schedule a replication task so
this happens automatically.
2 In the details pane, click Replicate now. The Replicate Now wizard appears.
3 Click Next.
4 From the list of available distributed repositories, select the distributed repository
you have created, then click Next.
Because this is a new distributed repository, and this is the first time you are
replicating to it, you could also select Full replication. However, for future replications,
it is recommended to use incremental replication to save time and bandwidth.
If you browse to your ePOShare folder now, you can see that it now contains subfolders
for agents and software.
To simulate this in your test, let’s configure the agent policies for one of the sites to use
only the new distributed repository. In our example network used in this guide, this is
the Container1 site, which is where the system hosting your newly-created distributed
repository resides.
To configure the ePolicy Orchestrator agent policy for the Container1 site to use the
distributed repository for updating:
1 In the console tree, select the site whose systems that you want to use the
distributed repository.
2 In the details pane, select the Policies tab, then open ePO Agent 3.5.0 from the list of
products.
4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box
appears.
101
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
5 Select Duplicate the following policy, then select the policy you created earlier (to display
the agent system tray icon) from the drop-down list.
6 Provide a New policy name for the policy (for example, New Agent Policy--custom
repository), then click OK. The Policy Settings dialog box appears.
9 In the Repository list, deselect all repositories until only your distributed repository is
selected.
11 Click Apply at the end of the Configuration row on the Assign Policies page to assign the
new policy to the site selected in the console tree.
Now, when the systems in this site require updates, they retrieve them from the
distributed repository.
Again, forcing updates from certain repositories is shown here only for the purposes of
simulating distributed repositories in a lab network. This is not something you would do
in a production environment, where you would want to have some repository
redundancy available for fail-over. Due to faster local network connections, client
systems would likely update from a local distributed repository, rather than over a WAN
to the master repository, even if not specifically configured to do this. On the other
hand, if the distributed repository were unavailable for any reason, the client could still
update from other repositories on the network if necessary.
STEP
This could be a potentially useful implementation in your real network, where you may
want to hide the system tray interface on your workstations to prevent end-users from
easily changing policies or disabling features.
To set these policies, we’ll use the Workstations groups created when you made your
Directory. You can change the policy once for each workstation group (within Domain1
and Container1) to have it inherit to all systems within those groups. For servers, we can
leave the default policy, which installs VirusScan Enterprise with the full menu options
available in the system tray.
102
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
3 Select VirusScan Enterprise 8.0.0, then click Edit at the end of the User Interface Policies
row.
4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box
appears.
5 Provide a New policy name for the policy (for example, Workstation UI), then click OK.
The Policy Settings dialog box appears.
6 Select Workstation from the Settings for drop-down list at the top of the page.
The Settings for drop-down list allows you to set separate policies for servers and
workstations without using Directory groups. ePolicy Orchestrator detects the
Note
operating system on the client system and applies the right policy. However, for
testing purposes, it can be useful to create server and workstation groups.
8 Select Show the system tray icon with minimal menu options.
10 Click Apply at the end of the Configuration row on the Assign Policies page to assign the
new policy to the site selected in the console tree.
11 Repeat these steps for any other workstation groups in your Directory.
STEP
Unlike deploying agents, which must be done at the site, group, or system level, you
can deploy VirusScan Enterprise from the Directory level of the console tree to install
it on all the systems in your Directory at once. Note that whatever policies you have set
for specific sites or groups within your Directory, such as the Servers and Workstations
groups in this example, still apply when VirusScan Enterprise is installed to client
systems within those groups. Alternatively, you can deploy VirusScan Enterprise to
sites, groups, or individual systems — the procedure is the same.
2 In the details pane, select the Task tab, then double-click the Deployment task in the
task list. The ePolicy Orchestrator Scheduler appears.
103
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
3 Click the Task tab and deselect Inherit under Schedule Settings.
4 Under Schedule Settings, select Enable (scheduled task runs at specified time).
7 Set the Action for the VirusScan Enterprise 8.0i deployment task to Install.
8 Click OK to save the product deployment options and return to the ePolicy Orchestrator
Scheduler dialog box.
9 On the ePolicy Orchestrator Scheduler dialog box, click the Schedule tab.
In the task list on the Tasks tab of the details pane, the Enabled status for the deployment
task is set to True.
You have now configured your default deployment task to install VirusScan Enterprise
on all client systems in your test site. The deployment occurs the next time the agents
call back to the ePolicy Orchestrator server for updated instructions. You can also
initiate an agent wakeup call to have the deployment occur immediately. See Send an
agent wakeup call to force agents to call back immediately on page 105.
If you have any Windows 95, 98, or ME systems in your test network, you can repeat
the steps in this section to deploy VirusScan 4.5.1 to these systems only. Make sure
you have already checked the VirusScan 4.5.1 deployment package into the repository.
Deploying VirusScan 4.5.1 to several systems is easiest if you have organized your
Windows 95, Windows 98, or Windows ME systems into a group in your Directory, but
you can also run the deployment task for individual systems too.
2 In the details pane, select the Task tab, then double-click the Deployment task in the
task list. The ePolicy Orchestrator Scheduler appears.
104
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
3 Click the Task tab and deselect Inherit under Schedule Settings.
4 Under Schedule Settings, select Enable (scheduled task runs at specified time).
You can send an agent wakeup call to any site, group, or individual system in your
Directory. Since we want to wake up all systems in the Directory, we’ll initiate one
wakeup call for each site, which inherit down to groups and systems within that site.
1 Right-click the target site in the console tree and select Agent Wakeup Call.
3 Click OK to accept all other defaults and send the wakeup call.
105
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
The agents call back immediately, retrieve the new deployment policy changes, and
begin installing VirusScan Enterprise. Wait a few minutes while VirusScan Enterprise
8.0i is deployed and installed.
To verify that the software has successfully installed on client systems check one
of the following:
The MCSHIELD.EXE process is running and visible in the Processes tab of your Windows
Task Manager.
As long as you did not change the policy to hide it, the VShield icon appears in the
system tray next to the agent icon. You may need to reboot to display the system
tray icon. Note that VirusScan is active and running even if the VShield icon has not
yet displayed in the system tray.
STEP
1 In the console tree, select Reporting | ePO Databases | ePO_ePOServer. ePOServer is the
name of the ePolicy Orchestrator database used in this example.
2 If you are prompted to log into the database, type your MSDE user name and
password that you created when installing the console and database.
4 Select No when prompted to set a data filter. Wait a moment while ePolicy
Orchestrator generates the report.
Once the report has generated, the results should show the number of servers and
workstations on which VirusScan 4.5.1 and VirusScan Enterprise 8.0i are currently
installed. If you later deploy other products, such as McAfee Desktop Firewall, they
show up in this report as well.
STEP
106
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
Once VirusScan Enterprise is installed, however, update DAT files frequently. Your
anti-virus software is only as good as its latest DAT files, so it is essential to keep them
up-to-date. In a later section in this guide, you will see how to schedule a regular
automatic client update task to occur regularly, such as daily or weekly. For now, let’s
assume you want to initiate an immediate DAT file update. You will likely be required to
do this at some point; for example, if McAfee releases updated DAT files in response
to a newly-discovered virus and you want your client systems to update without waiting
for their regularly scheduled task.
To do this, create and run a client update task from your ePolicy Orchestrator console.
This forces all your client anti-virus software to perform an update task.
Before you run a client update task, make sure you have first pulled any updated DAT
or engine files into your master and distributed repositories, if you have them. See Set
Note
up master and distributed repositories on page 95.
2 In the Schedule Task dialog box, type a name into the New Task Name field, such as
Update client DATs.
3 In the software list, select ePolicy Orchestrator Agent | Update for the task type.
4 Click OK.
5 Go to the Tasks tab in the details pane, then press F5 to refresh the console and
make the new task appear in the list on the Task tab.
Note that it is scheduled to run daily at the current day and time. Also note that the
Enabled flag is set to False—we now need to set this to True and run it immediately.
6 Right-click the new task in the task list and select Edit Task.
7 Deselect Inherit under the Schedule Settings section of the ePolicy Orchestrator Scheduler
dialog box.
107
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
8 Select Enable.
10 Ensure that This task updates only the following components is selected. This selection
allows you to specify which components you want to update. Specifying these
allows you to save network resources by limiting which updates are distributed in
your environment.
12 Under Patches and Service Packs, select VirusScan Enterprise 8.0, then click OK.
14 Set the Schedule Task option to Run Immediately and click OK.
15 Initiate agent wakeup calls to all sites in your Directory so your agents call in
immediately to pick up the agent update task. See Send an agent wakeup call to
force agents to call back immediately on page 105.
How can I tell that VirusScan Enterprise has actually updated to the latest DATs?
First, check the DAT version that is currently checked into your master repository. These
are the DATs that should now be on your client systems after they updated. To do this:
1 From the console tree, select the ePolicy Orchestrator server, then select the General
tab.
2 Under MyAVERT Security Threats, check which DAT file version is Current in Repository.
This should be a 6-digit number like 4.0.4576.
Next, check the DAT versions used by client software, such as VirusScan Enterprise,
from the ePolicy Orchestrator console. Note that the console does not show the
updated status until the next time the agent calls into the server as part of its regular
agent-to-server communication. To do this:
1 In the console tree, select any system that has recently been updated.
2 In the details pane, select the Properties tab, then select VirusScan Enterprise 8.0i |
General to expand the list of general properties.
3 Check the DAT Version number. It should match the latest DAT version in your master
software repository.
STEP
108
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
The next step is to schedule regular pull and replication tasks to synchronize your
source, master, and distributed repositories so that all your repositories are up-to-date.
Then create a scheduled client update tasks to make sure client software such as
VirusScan Enterprise checks regularly for updated DAT and engine files.
To do this:
2 In the details pane, select Schedule pull tasks to open the Configure Server Tasks page.
4 Type a name into the Name field, such as Daily Repository Pull task.
109
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Installing agent manually on client systems
12 If you have older versions of McAfee products, such as VirusScan 4.5.1, in your test
network, select Support Legacy product update.
The new pull task is added to the Configure Server Tasks page.
But an up-to-date master repository won’t be of any use to those client systems on your
network that get their updates from a distributed repository, such as the systems in the
Container1 site in our sample test network. The next step, therefore, is to make sure the
updates added to your master repository are also automatically replicated to your
distributed repository. To do this, create a replication task and schedule it to occur every
day after the scheduled pull task you already created.
2 In the details pane, select Schedule pull tasks to open the Configure Server Tasks page.
3 Select Create task to open the Configure New Task page. This is the same page that you
used to schedule your automatic pull task.
8 Schedule the day and time for the task to run. Make sure you set the time for the
task to at least five minutes after the pull task is scheduled.
10 Select Incremental replication and click Finish. Wait a moment while the task is created.
The new replication task appears in the Configure Server Tasks table along with your
scheduled pull task.
110
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Use SuperAgents to wake up all agents on the network
You can use the client update task you created earlier after you deployed VirusScan
Enterprise (see Update DAT files with a client update task on page 106). Simply modify
the schedule of this task from Run Immediately to Daily and set the start time to run about
an hour after your replication task begins.
STEP
The global updating feature is useful in a virus outbreak situation. Assume that
McAfee’s AVERT team has posted updated DAT files in response to a newly-discovered
virus. With global updating enabled, you simply initiate a pull task from your ePolicy
Orchestrator console to update your master software repository with the new DAT
files. ePolicy Orchestrator’s global updating feature does the rest—updating the DAT
files for all systems running active, communicating agents on your network within an
hour.
111
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Use SuperAgents to wake up all agents on the network
For example, in the sample test network used in this guide, we would convert one
agent into a SuperAgent in the Domain1 site.
To do this:
1 In the console tree, select a desired system to host the SuperAgent. In a production
environment, you would want to select a system that is likely to be up and running
all the time.
4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box
appears.
5 Select Duplicate the following policy, then select the policy you created earlier (to display
the agent system tray icon) from the drop-down list.
6 Provide a New policy name for the policy (for example, SuperAgent Policy), then click
OK. The Policy Settings dialog box appears.
9 Click Apply at the end of the Configuration row on the Assign Policies page to assign the
new policy to the site selected in the console tree.
You can also create a SuperAgent repository on the system, but they are not
required for global updating and are not covered in this guide. See the ePolicy
Orchestrator 3.6 Product Guide for information on SuperAgent repositories.
11 Right-click the system in the Directory and select Agent Wakeup Call.
You can use these SuperAgents to wake up other agents in the local subnet. This can
save bandwidth, especially in a large network with many remote, WAN-connected
sites. Send out wakeup calls to a few SuperAgents and let them wake up the other
agents in the local LAN.
112
ePolicy Orchestrator® 3.6 Walkthrough Guide Installing and setting up 8
Use SuperAgents to wake up all agents on the network
3 At the bottom of the Server Settings page, set Enable global updating to Yes.
4 For the purposes of this evaluation change the Global updating randomization interval to
1 minute.
Now that you have SuperAgents deployed to subnets your network and global updating
enabled, any time you change the DAT files, engine files, or VirusScan Enterprise 8.0i
files in your master repository, the changes automatically replicate to your repositories.
Once that replication is completed, the ePolicy Orchestrator server sends a SuperAgent
wakeup call to the SuperAgents. The SuperAgents in turn send out a wakeup call to all
agents in the local subnet. Those agents check in with the server and download policy
changes. From checking in the changes to your master repository to your last client
system receiving its update, this process should take no longer than one hour.
STEP
113
9 Advanced Feature Evaluations
This section of the guide demonstrates how you can configure and use two of the
advanced features not covered in the previous section:
You can configure rules in ePolicy Orchestrator to notify you when user-specified threat
and compliance events are received and processed by the ePolicy Orchestrator server.
The ability to set aggregation and throttling controls on a per rule basis allows you to
define when, and when not, notification messages are sent.
Although you can create any number of rules to notify you of almost any threat or
compliance event sent by your security programs, the focus in this guide on this feature
is more narrow, centering on an e-mail notification message in response to a virus
detected event.
1 Configure Notifications.
STEP
1 Configure Notifications
Before setting up any rules, you must define who is going to receive the notification
message, in which format, and what the message communicates:
114
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
ePolicy Orchestrator Notification
1 Click Notifications in the console tree, then select the Configuration | Basic Configuration
tab in the details pane.
2 Under E-mail Server, type the name of a mail server to which the ePolicy Orchestrator
server can route, and the desired e-mail address that you want to appear in the From
line of the message.
When you decide which e-mail address to place here you should consider the number
of administrators who may receive notification messages, and whether you want
Note
these administrators to be able to send reply messages.
3 Click Apply, then click E-mail Contacts at the top of the tab. This page allows you to
specify all of the addresses to include in the address book from which you will select
recipients during rule creation.
There should be one contact in the list already, Administrator. The e-mail address
provided for Administrator is the e-mail address you entered in the Set E-mail Address
panel of the installation wizard. If you did not change the default address in the
wizard, the address is [email protected]. If the address for Administrator is
one that you are not able to view the mail sent to it, then click the address and
change it to one at which you can receive and view e-mail messages.
From the Configuration tab you can also define SNMP servers at which you’d
like to receive SNMP traps and external commands that you want to run
Note
when certain events are received. These tasks are beyond the scope of this
guide. For more information, see the ePolicy Orchestrator 3.6 Product
Guide.
Now that you’ve specified an e-mail server to be used to send the message, and an
address to receive the message, you are ready to create a rule to trigger on a
VirusScan Enterprise event.
115
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
ePolicy Orchestrator Notification
STEP
1 Click the Rules tab, then click Add Rule to begin the Add or Edit Notification Rule wizard.
2 On the Describe Rule page, leave the default (Directory) for the Defined At text box. You
can define rules for the Directory or any site within the Directory.
3 Provide a name for the rule in the Rule Name text box. For example, Virus Detected.
4 Provide a description of the rule in the Description text box. For example, Viruses
detected by VirusScan Enterprise, then click Next.
c Under Categories, select Any category above the list, then click Next.
So far the configurations you’ve made specify the rule to apply to any VirusScan
event occurring on any managed system within the Directory.
116
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
ePolicy Orchestrator Notification
6 Although for this task you will leave the defaults on this page selected, the Set
Thresholds page allows you to limit the number of notification messages you receive
for the rule. For example, you can define any rule to send you messages only when
the number of events or the number of affected systems have reached a specified
number within a specified time frame (Aggregation). You can further limit the number
of messages that are sent by specifying an amount of time to take place before
receiving another message (Throttling). Throttling is almost always recommended by
McAfee to prevent a flood of messages during an outbreak situation.
Leave Send a notification for every event selected, and click Next.
8 Click Administrator in the box on the left of the page, then click To so that Administrator
moves to the Notification Recipient(s) box.
This specifies that the e-mail address you configured (for the Administrator contact)
is sent the notification message you are about to configure.
9 Type a Subject for the e-mail that will be sent to Administrator when this rule is
triggered. For example, Threat detected by VirusScan.
10 Type a Body for the e-mail message that will be sent when this rule is triggered. For
example, VirusScan detected a threat.
11 By inserting multiple variables into the body of the message, you can have
meaningful information from the event files inserted into your notification message.
For the purpose of this section of the guide, select Affected computer names and click
Body. This will place the name of the affected system, if available from the event file,
in the body of the e-mail message. Click Save.
You can create multiple messages in multiple formats to send to multiple recipients,
as well as choosing external commands to run, from the Create Notifications page.
These are beyond the scope of this document. See the ePolicy Orchestrator 3.6
Product Guide for more information.
12 Click Next and verify the configurations you made to the rule you created on the View
Summary page, then click Finish.
117
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
Rogue System Detection
STEP
1 Download EICAR.COM to one of the workstation test systems. Each time you
download this file, you are creating a sample detection, At press time, this file was
available on the EICAR.ORG web site:
http://www.eicar.org/anti_virus_test_file.htm
2 The on-access scanner detects and quarantines the EICAR test virus at the same
time that EICAR.COM is downloaded, and an event file capturing this information is
sent to the ePolicy Orchestrator server.
3 Within minutes a notification message is created and sent to the inbox of the e-mail
message recipient you provided earlier.
The Rogue System Detection system helps you monitor all the systems on your
network—not only the ones ePolicy Orchestrator manages already, but the rogue
systems as well. A rogue system is any system that is not currently managed by an
ePolicy Orchestrator agent but should be. Rogue System Detection integrates with
your ePolicy Orchestrator server to provide real-time detection of rogue systems by
means of a sensor placed on each network broadcast segment. The sensor listens to
network broadcast messages and spots when a new system has connected to the
network.
When the sensor detects a new system on the network, it sends a message to the
Rogue System Detection server. The Rogue System Detection server then checks with
the ePolicy Orchestrator server to determine whether the newly-identified system has
an active agent installed and is managed by ePolicy Orchestrator. If the new system is
unknown to ePolicy Orchestrator, Rogue System Detection allows you to take any
number of remediation steps, including alerting network and anti-virus administrators
or automatically deploying an ePolicy Orchestrator agent to the system.
118
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
Rogue System Detection
STEP
These specific configurations to the sensor policy are only for the purpose of the
evaluation. These are not recommended configurations for a production environment
Note
deployment of the sensor.
The following configuration changes to the sensor policy speed up this process for this
purpose of this guide.
2 In the details pane, select the Policy tab, then select Rogue System Sensor 1.0.0.
4 Select New Policy from the Policy Name drop-down list. The Create new policy dialog box
appears.
5 Provide a New policy name for the policy (for example, Sensor1), then click OK. The
Policy Settings dialog box appears.
6 On the General tab, deselect Inherit, then under Communication Intervals make the
following changes:
a Set Minimum reporting interval for each detected host to 120 seconds.
7 Click Apply All, then click Close. The new policy is created.
8 Click Apply at the end of the Configuration row on the Assign Policies page to assign the
new policy to the site selected in the console tree.
119
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
Rogue System Detection
STEP
For more information about the sensor and how it functions, see Chapter 11: Rogue
System Detection in the ePolicy Orchestrator 3.6 Product Guide.
Depending on how you have your test environment set up, you may have more than
one subnet represented in it. But you do have at least one.
2 In the details pane, select the Subnets tab to display the Subnet List.
3 Select the subnets to which you want to deploy sensors by clicking once in the
checkbox for that subnet, then click Deploy Sensors.
4 When the Sensor Deployment: Set Preferences page appears, ensure Let me select
machines manually is selected.
5 Although we are not setting criteria for ePolicy Orchestrator to use to deploy sensors
automatically, the availability of this criteria allows you to save time when trying to
decide on which systems to install the sensors. This way, ePolicy Orchestrator finds
the best systems on each subnet to install the sensors.
120
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
Rogue System Detection
6 Click Next, then select the checkbox next to the desired system to which you want
to deploy a sensor, click Mark for Deployment, then click Next.The Sensor Deployment:
Review and Approve page appears.
7 Click Finish. The Action Progress page of the Events tab displays, indicating the
progress of each sensor deployment.
8 Remember that you must wait until after one agent-to-server communication and
one policy enforcement interval before the sensor calls into the server and is
functioning. This can be expedited by sending agent wakeup calls:
a In the console tree, right-click the system on which you installed the sensor, then
select Agent Wakeup Call.
9 Once the Action Status is Completed Successfully, the sensor has called back to the
server and is functioning.
10 Select the Machines tab and select Summary to view a summary of detected systems.
Now that the sensor is deployed and installed you are ready to configure a response for
the feature to take on a rogue when one is detected.
STEP
There are many situations where you may not want an automatic response to be taken.
You can also set conditions around types of rogues where no actions are taken, or
where the detected systems are simply marked for action.
For the purposes of this guide, you will configure a response that deploys an agent onto
the rogue system once it has been discovered.
1 Select Rogue System Detection in the console tree, then select the Responses tab in the
details pane.
2 Select the checkbox next to the default Query ePO Agent response, select Disable from
the Checked responses drop-down list, then click Apply.
121
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
Rogue System Detection
This response checks the detected system for an agent of another ePolicy
Orchestrator server.
3 Click Add Automatic Response to display the Add or Edit Automatic Response page.
5 Under Conditions, click Add Condition, then select Rogue Type from the Property list.
7 Under Actions, change the default Send E-mail action to Push ePO Agent as the Method,
and accept the default Parameters.
8 Click OK.
9 Select the checkbox next to the Push Agent automatic response when the Automatic
Responses page reappears. Select Enable from the Checked responses drop-down list,
then click Apply.
Now that the sensor is deployed, and a response has been created and enabled to
handle rogues with no agent, you are ready to introduce such a rogue.
122
ePolicy Orchestrator® 3.6 Walkthrough Guide Advanced Feature Evaluations 9
Rogue System Detection
STEP
1 Add a system that does not have an ePolicy Orchestrator agent to the test network.
2 Go to the Machine tab, then click List. Once the sensor has detected a rogue system,
it reports back to the server and places the system in the Machine List.
3 Once it appears in this list, take a five minute break to provide time for the agent
installation.
4 Once the agent installation completes, the system has a Rogue Type of Managed.
You are not finished yet. You still must place the now managed system into its
appropriate home in the Directory.
5 Once the system’s Rogue Type changes to Managed, it is placed in Directory | Lost&Found
| Rogue Systems of the console tree.
The Lost&Found group is a holding place for systems ePolicy Orchestrator has
discovered, but doesn’t know where to place within the Directory.
6 Click and drag the system to the desired site or group in your ePolicy Orchestrator
Directory.
123