Epo 590 PG 0-00 En-Us - PDF Gda 1490161200 &ext
Epo 590 PG 0-00 En-Us - PDF Gda 1490161200 &ext
Epo 590 PG 0-00 En-Us - PDF Gda 1490161200 &ext
TRADEMARK ATTRIBUTIONS
Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo, McAfee Active
Protection, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, McAfee Evader, Foundscore, Foundstone, Global Threat Intelligence,
McAfee LiveSafe, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee TechMaster, McAfee
Total Protection, TrustedSource, VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries.
Other marks and brands may be claimed as the property of others.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS
FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU
HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR
SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A
FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET
FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF
PURCHASE FOR A FULL REFUND.
Preface 13
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Find product documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1 Product overview 15
What is McAfee ePO? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Key features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
How McAfee ePO works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Initial configuration
3 Planning your McAfee ePO configuration 31
Considerations for scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Example organization size and network components . . . . . . . . . . . . . . . . 32
What affects McAfee ePO performance . . . . . . . . . . . . . . . . . . . . . . 35
Internet protocols in a managed environment . . . . . . . . . . . . . . . . . . . . . . 35
Advanced configuration
5 Dashboards and monitors 79
Using dashboards and monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Manage dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Export and import dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Specify first-time dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Manage dashboard monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Move and resize dashboard monitors . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Set default monitor refresh intervals . . . . . . . . . . . . . . . . . . . . . . . . . . 85
18 Repositories 259
What repositories do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Repository types and what they do . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Repository branches and their purposes . . . . . . . . . . . . . . . . . . . . . . . . 262
Using repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Distributed repository types . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Repository list files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Best practice: Where to place repositories . . . . . . . . . . . . . . . . . . . . 270
20 Maintaining your McAfee ePO server, SQL databases, and bandwidth 323
Maintaining your McAfee ePO server . . . . . . . . . . . . . . . . . . . . . . . . . 323
Best practices: Monitoring server performance . . . . . . . . . . . . . . . . . . 323
Maintaining your SQL database . . . . . . . . . . . . . . . . . . . . . . . . 327
Best practices: Recommended tasks . . . . . . . . . . . . . . . . . . . . . . 328
Managing SQL databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Best practice: Maintaining SQL databases . . . . . . . . . . . . . . . . . . . . 338
Use a remote command to determine the Microsoft SQL database server and name . . . 338
Configure a Snapshot and restore the SQL database . . . . . . . . . . . . . . . . 338
Use Microsoft SQL Server Management Studio to find McAfee ePO server information . . . 340
The Threat Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Bandwidth usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Best practice: Agent deployment and bandwidth . . . . . . . . . . . . . . . . . . 343
Best practices: Bandwidth recommendations for repository distribution . . . . . . . . 345
Index 435
This guide provides the information you need to work with your McAfee product.
Contents
About this guide
Find product documentation
Audience
McAfee documentation is carefully researched and written for the target audience.
The information in this guide is intended primarily for:
Administrators People who implement and enforce the company's security program.
Users People who use the computer where the software is running and can access some or all of
its features.
Conventions
This guide uses these typographical conventions and icons.
Task
1 Go to the ServicePortal at https://support.mcafee.com and click the Knowledge Center tab.
2 In the Knowledge Base pane under Content Source, click Product Documentation.
3 Select a product and version, then click Search to display a list of documents.
McAfee ePolicy Orchestrator (McAfee ePO ) is an extensible platform that enables centralized policy
management and enforcement of your security policies.
McAfee ePO Cloud is a cloud-based instance of McAfee ePO. With McAfee ePO Cloud, you don't need to
configure and maintain the servers where your security management software runs. Software
management and other maintenance are taken care of by our administrators.
Contents
What is McAfee ePO?
Key features
How McAfee ePO works
Update the detection DAT (signature) files, antivirus engines, and other security content required
by your security software to keep your managed systems secure.
Create reports using the query system builder, which displays configurable charts and tables of
your network security data.
With McAfee ePO automation features and end-to-end network visibility, you can:
Reduce response times.
Strengthen protection.
Key features
From the single view of McAfee ePO, many features can be accessed such as, managed clients,
networks, data, and compliance solutions to protect your network.
Whether your network has a hundred clients or 300,000 clients, McAfee ePO can manage the security
of your network using these features.
Feature Description
Fast deployment time When the preconfigured security and risk management solutions are
working together, you can reduce security gaps and complexity. Single
agent deployment and customizable policy enforcement also secure your
environment quickly.
Drag-and-drop These dashboards provide a unified view of your security posture and
dashboards security intelligence across managed systems, data centers, mobile
devices, and networks.
Reduce complexity and Using Guided Configuration, automated work streams, and predefined
streamline processes dashboards you can quickly start protecting your network clients.
Future-proof your Protect your organization from current and future threats. Real-time
security infrastructure threat intelligence proactively guards your infrastructure. The open
platform facilitates rapid adoption of security innovations as new threat
categories emerge.
Advanced network Your IT administrators can unify security management across endpoints,
configuration features networks, data, and compliance solutions from Intel Security and
third-party solutions.
Comprehensive Endpoint McAfee Active Response uses predefined and customizable collectors to
Detection and Response search deeply across all systems. It finds indicators of attack (IoAs) that
(EDR) are present in running processes, lying dormant, or have been deleted.
Scale for enterprise Use additional servers, such as Agent Handlers and distributed
deployments repositories, to quickly connect to remote sites with limited bandwidth and
provide systems with the latest protection software.
Enhanced disaster Protecting your network security, history, and McAfee ePO configuration is
recovery automatic and can be quickly rebuilt if a catastrophic hardware disaster
occurs.
Multiple users You can create many McAfee ePO users to simplify security management
and create reports. You can add users limited to specific groups of
systems, plus additional administrators with full control as backups.
Issue management Automated issue responses can send alerts and events to predefined
users.
Automatic Responses You define how McAfee ePO software directs alerts and security responses
based on the type and criticality of security events in your environment.
You can also create automated workflows between your security and IT
operations systems to quickly remediate outstanding issues.
Native 64-bit support McAfee ePO takes advantage of the latest native 64-bit operating system
with reporting orientation features for increased processing speed.
Policy comparison, With multiple McAfee ePO users, you might have similar policies and
common task orientation tasks. Now, you can compare them side by side to manage them.
Single page deployment Product Deployment is one page where you can deploy, track, and even
delete software on your managed systems.
Feature Description
URL installation of McAfee Smart Installer URL lets you install the McAfee Agent using a
endpoint products browser and your Internet-connected McAfee ePO server.
HTML5 UI support McAfee ePO now supports the latest browsers, including Internet Explorer
11, Edge, Chrome, Firefox, and Safari.
McAfee product software, for example McAfee Endpoint Security, cleans or deletes the malware
file.
McAfee Agent notifies McAfee ePO of the attack.
McAfee ePO displays the notification of the attack on the Number of Threat Events dashboard
and saves the history of the attack in the Threat Event Log.
Collects events, product properties, and system properties from the managed endpoints and sends
them back to McAfee ePO
McAfee ePO server Connects to the McAfee ePO update server to download the latest
security content
Microsoft SQL database Stores all data about your network managed systems, McAfee ePO,
Agent Handlers, and repositories
McAfee Agent installed on clients Provides these features:
Policy enforcement
Product deployments and updates
Connections to send events, product, and system properties to the McAfee ePO server
Agent Handlers are most effective when on the same network segment as the McAfee ePO
database.
LDAP or Ticketing system Connects your McAfee ePO server to your LDAP server or SNMP
ticketing server
Automatic Responses Notifies administrators and task automation when an event occurs
Web Console connection Provides HTTPS connection between the McAfee ePO server and
the web browser using default port 8443.
Distributed Repository connections Repository connections depend on the type of
repository. For example, HTTP, FTP, or UDP connections.
Agent Handler in DMZ Agent Handlers installed in the DMZ require specific port
connections.
Round-trip latency between the Agent Handler and the McAfee ePO database, must be less than
about 10 ms.
Log on to the console to configure McAfee ePO to manage and monitor your network security.
Contents
Log on and log off
Navigating the interface
Working with lists and tables
When you connect to McAfee ePO, the first screen you see is the McAfee ePO logon screen.
Task
1 Type your user name, password, and click Log On.
Once you log off, your session is closed and cannot be opened by other users.
Main menu Click to access menu items and functionality of McAfee ePO. Each section
contains a list of primary feature pages associated with a unique icon. Select a category in the
main menu to view and navigate to the primary pages that make up that feature.
Drag and drop menu items from the main menu into the shortcut bar for easy access in the future.
Drag the menu items off the shortcut bar to delete.
This down-arrow indicates that more features are available in the shortcut bar.
When you place more icons on the shortcut bar than can be viewed, an overflow menu is created on
the right side of the bar. Click the down-arrow to access the hidden menu items not displayed in the
shortcut bar.
The icons displayed in the shortcut bar are stored as user preferences. Each user's customized
shortcut bar is displayed regardless of which console they use to log on to the server.
For descriptions of the categories in a managed product, see your managed product documentation.
Category Description
Password Changes your McAfee ePO logon password.
Queries and Reports Determines whether a warning message appears when you try to drag a
Warning query from one query group to another.
System Tree Warning Determines whether a warning message appears when you try to drag
systems or groups from one System Tree group to another.
Tables Specifies how often auto-refreshed tables are refreshed during your session.
User Session Controls the length of time that your user session remains open after you
stop interacting with the user interface.
Server settings
Adjust server settings to fine-tune McAfee ePO for the needs of your organization. Your customizations
affect all your McAfee ePO users.
For descriptions of the categories provided by managed products, see your managed product
documentation.
Agent Deployment Specifies whether users are allowed to cache agent deployment credentials.
Credentials
Certificate Based Specifies whether Certificate Based Authentication is enabled, and the
Authentication settings and configurations required for the Certificate Authority (CA)
certificate being used.
Dashboards Specifies the default active dashboard that is assigned to new users
accounts at the time of account creation, and the default refresh rate (5
minutes) for dashboard monitors.
Disaster Recovery Enables and sets the keystore encryption passphrase for Disaster Recovery.
Email Server Specifies the email server that McAfee ePO uses to send email messages.
Event Filtering Specifies which events the agent forwards.
Event Notifications Specifies how often McAfee ePO checks your notifications to see if any
trigger Automatic Responses.
Global Updating Specifies whether and how global updating is enabled.
License Key Specifies the license key used to register this McAfee ePO software.
Logon Message Specifies whether a custom message is displayed when users log on to the
McAfee ePO console, and the message content.
Policy and Task Retention Specifies whether the policies and client task data is removed when you
delete the product extension.
Ports Specifies the ports used by the server when it communicates with agents
and the database.
Printing and Exporting Specifies how information is exported to other formats, and the template for
PDF exports. It also specifies the default location where the exported files
are stored.
Product Compatibility List Specifies whether the Product Compatibility List is automatically downloaded
and whether it displays any incompatible product extensions.
Product Improvement Specifies whether McAfee ePO can collect data proactively and periodically
Program from the managed client systems.
Proxy Settings Specifies the type of proxy settings configured for your McAfee ePO server.
Scheduler Tasks Specifies the number of server tasks that run at the same time.
Security Keys Specifies and manages the agent-server secure communication keys and
repository keys.
Server Certificate Specifies the server certificate that your McAfee ePO server uses for HTTPS
communication with browsers.
Server Information Specifies Java, OpenSSL, and Apache server information, such as name, IP
address, and version information.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select User Session from the Setting Categories, then click
Edit.
This screenshot shows the Quick Find search filter for queries.
Filter a list
Use filters to select specific rows in the lists of data in the McAfee ePO interface.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the bar at the top of a list, select the filter that you want to use to filter the list.
2 Select the checkboxes next to the list items that you want to focus on, then select Show selected rows.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Available Properties list, click the properties you want to include in your filter.
4 Once all the properties that you selected are populated with valid and complete values, click Update
Filter.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click Apply.
Only items that contain the terms that you entered in the Quick Find field are displayed.
Click Clear to remove the filter and display all list items.
2 Limit the list to specific queries, for example, "detection." In the Quick Find field, type
detection, then click Apply.
Some lists contain items translated for your location. When communicating with users in other
locales, remember that query names can differ.
This table row selection action does not work in the Audit Log table.
This table lists the actions used to select table row checkboxes.
All rows Click the top checkbox in table Selects every row in the table.
headings.
To use your McAfee ePO server effectively, you must create a comprehensive plan specific to your
environment.
Your McAfee ePO server infrastructure and configuration needs depend on the unique needs of your
network environment. Considering these areas in advance can reduce the time it takes to get started.
Do you have any specific security needs, such as firewalls or do you use Network Address
Translation (NAT) in an external network?
Will you have multiple McAfee ePO users with different permission sets?
Contents
Considerations for scalability
Internet protocols in a managed environment
Vertical scalability Adding and upgrading to bigger, faster hardware to manage larger and
larger deployments. Scaling vertically is accomplished by upgrading your server hardware, and
using multiple McAfee ePO servers throughout your network, each with its own database.
Horizontal scalability Increasing the deployment size that one McAfee ePO server can
manage. Scaling horizontally is accomplished by installing multiple remote Agent Handlers, each
reporting to one database.
This table lists the number of managed systems and the suggested server hardware needed to
manage these systems.
See also
Example organization size and network components on page 32
This figure shows an organization with fewer than 10,000 managed systems.
Figure 3-1 Fewer than 10,000 managed systems McAfee ePO network components
You can use the Microsoft SQL Express database for a small number of managed systems. But,
Microsoft does not allow the SQL Express database to exceed 10 GB, and the memory available for
the SQL Express Database Engine is limited to 1 GB.
Best practice: As your managed systems count approaches 10,000 managed systems, we recommend
that you separate the McAfee ePO server and SQL servers onto their own physical servers.
This diagram shows an organization configured for 25,000 managed systems with the servers on
different hardware.
Figure 3-2 McAfee ePO network components for 10,00025,000 managed systems
If you have the budget for additional hardware resources, exceed this recommendation for
improved performance.
This diagram shows an organization configured for 25,00075,000 managed systems with the servers
on different hardware and a distributed repository.
Figure 3-3 McAfee ePO network components for 25,00075,000 managed systems
Separate Distributed Repositories to store and distribute important security content for your
managed systems
Separate McAfee ePO Agent Handlers to coordinate McAfee Agent requests between themselves
and the McAfee ePO server. Agent Handlers require constant communication back to the SQL
database. They check the McAfee ePO server database work queue about every ten seconds to
find which tasks to perform. Agent Handlers need a relatively high speed, low latency connection
to the database. Agent Handlers reduce the workload on the McAfee ePO server by about 50
percent. We recommend one Agent Handler for each 50,000 managed systems.
Best Practice: For organizations with 75,000 to 150,000+ managed systems, install an Agent
Handler on the same network subnet with the McAfee ePO server, for redundancy. This leaves the
McAfee ePO server to manage agent-server communications if the coonnection to the Agent
Handler fails.
Separate McAfee ePO Distributed Repositories to store and distribute important security content
for your managed client systems.
See also
How Agent Handlers work on page 295
Each of these factors affects your McAfee ePO server performance and must be considered as your
managed network grows and your security needs change.
SQL Server This server is the main workhorse behind the McAfee ePO server and affects the
performance of the McAfee ePO server.
Number of software products installed Each software product you install adds processing
load on the McAfee ePO server and the SQL database.
Number of managed clients and their Agent Handlers These numbers are proportional to
the McAfee ePO server and database performance. Each Agent Handler places these fixed loads on
the database server:
Heartbeat updates (every minute)
Pool of database connections held open to the database (two connections per CPU to the Event
Parser service and four connections per CPU to the Apache service)
The mode in which your McAfee ePO server works depends on your network configuration. For
example, if your network is configured to use only IPv4 addresses, your server works in Only IPv4
mode. Similarly, if your network is configured to use both IPv4 and IPv6 addresses, your server works
in Mixed mode.
Until IPv6 is installed and enabled, your McAfee ePO server listens only to IPv4 addresses. When IPv6
is enabled, it works in the mode in which it is configured.
When the McAfee ePO server communicates with an Agent Handler on IPv6, address-related
properties such as IP address, subnet address, and subnet mask are reported in IPv6 format. When
transmitted between client and McAfee ePO server, or when displayed in the user interface or log file,
IPv6-related properties are displayed in the expanded form and are enclosed in brackets.
When setting an IPv6 address for FTP or HTTP sources, no changes to the address are needed. But,
when setting a Literal IPv6 address for a UNC source, you must use the Microsoft Literal IPv6 format.
See Microsoft documentation for more information.
Get up-and-running quickly by configuring the essential features of your McAfee ePO server.
Contents
Server configuration overview
Use automatic Product Installation Status
Use Guided Configuration
Use a proxy server
Enter your license key
Adding an SSL certificate to trusted collection
Adding systems to manage
Installing the McAfee Agent and licensed software
What the System Tree does
Default configuration and common tasks
Confirming system protection and seeing threats
What to do next
Use a Product Deployment to install the product software on your managed systems.
Use the Update Master Repository Server Task to install the latest product software and DAT file.
Create a Product deployment Client task and assign it to a group of systems in the System Tree.
To learn about the default Policies, Client Tasks, and other features, use the default configuration
and common tasks.
To confirm the initial configuration, run the test virus to confirm system protection.
This table lists the configuration steps to install your licensed product software automatically or
manually.
The Product Installation Status page starts only if you selected Enable Automatic Product Installation option
during the McAfee ePO installation. Use Automatic Product Installation in the first 24 hours after initial
logon. After the initial 24 hours, Automatic Product Installation is no longer available and you must use
one of the other methods.
4 If the failed product installation continues to fail: Schedule a client update task.
Try using the manual product download method. Deploy your security products to your
managed systems.
Call McAfee support.
4 Complete these tasks as needed for your
Continue with the McAfee ePO configuration and
environment:
try to install the product later.
Configure general server settings.
5 Complete these tasks as needed for your
environment: Create user accounts.
Add systems to your System Tree. Configure permission sets.
Configure general server settings. Configure policies.
Create user accounts. Configure advanced server settings and
features.
Configure permission sets.
Set up additional components.
Configure policies.
Configure advanced server settings and
features.
Set up additional components.
Configuration checklist
Use this checklist to make sure that you have completed the configuration steps to configure your
McAfee ePO server
Download and install the McAfee product software using one of these methods:
Use Automatic Product Installation in the first 24 hours after initial logon. After the initial 24 hours,
Automatic Product Installation is no longer available and you must use one of the other methods.
The Product Installation Status page starts only if you selected Enable Automatic Product Installation
option during the McAfee ePO installation.
Use System Tree and manually add the systems from their domains.
Confirm that the default product deployment task keeps your system updated with the latest
software.
Confirm that the default Policies for your McAfee product software include the correct
configurations.
Confirm that the default client tasks send and gather the correct information from your managed
systems.
Confirm the default McAfee ePO server tasks are scheduled and perform the correct tasks on your
server.
Confirm the default dashboards display the best information to help you monitor your managed
environment.
Confirm that a few systems are protected and are returning threat information using the
eicar.com anti-malware test file.
If you have a large or complex network, you might need to configure these additional
features:
Add additional McAfee ePO users.
Reorganize your System Tree into groups and use tags to organize systems.
Add custom policies to ensure that your product features are configured correctly on managed
systems.
Add Agent Handlers or distributed repositories to update software on remote systems.
Create processes to monitor and maintain your McAfee ePO server and SQL database.
Create additional automatic queries and reports to monitor your managed systems.
See also
What's in the Software Manager on page 157
What the System Tree does on page 57
Use automatic Product Installation Status on page 42
The Product Installation Status page is available only for the first 24 hours after you initially log on to
McAfee ePO. After 24 hours, all subsequent user logons, the default dashboard page appears. After 24
hours, Product Installation Status disappears from the Menu | Automation list.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Click the Launch ePolicy Orchestrator icon on your McAfee ePO server desktop, to open the Log On
screen.
The Product Installation Status software automatically starts downloading and installing the
licensed software available to your organization. You can monitor the process using:
Products Displays all licensed software and the latest available version.
You can click Menu | Software | Software Manager at any time to see details of the software installation
process.
You can also use the McAfee ePO user interface to configure other elements while the automatic
software installation process is running.
3 Complete the software installation process using the automatic or manual method.
Create user accounts and configure permission sets User accounts allow users to
access the server, and permission sets grant rights and access to McAfee ePO features.
Configure advanced server settings and features Advanced features and functionality
help you automate the management of your network security.
See also
Server settings on page 23
What's in the Software Manager on page 157
Users on page 141
Permission sets on page 152
Task
For details about product features, usage, and best practices, click ? or Help.
1 Click the Launch icon on your McAfee ePO server desktop, to see the Log On screen.
2 Type your user name, password, and select a language, if needed, then click Log On. McAfee ePO
starts and displays the Dashboard dialog box.
3 Use either automatic Product Installation Status or Software Manager to install your product
software.
4 Select Menu | Reporting | Dashboards, select Guided Configuration from the Dashboard drop-down, then click
Start.
5 Review the Guided Configuration overview and instructions, then click Start.
b In the Software table, select the product that you want to check in. The product description and
all available components are displayed in the table that is diaplayed.
c Click Check In All to check in product extensions to your McAfee ePO server, and product packages
to your Master Repository.
d Click Next at the top of the screen when you're finished checking in software.
b Specify your settings for the McAfee Agent deployment, then click Deploy.
Click Skip Agent Deployment to wait until later to perform this action. But you must deploy agents
before you can deploy your other security software.
c Select the software packages that you want to deploy to your managed systems, then click
Deploy.
11 On the Configuration Summary page, click Finish to close the Guided Configuration.
Create user accounts and configure permission sets User accounts provide a means for
users to access the server, and permission sets grant rights and access to McAfee ePO features.
Configure advanced server settings and features Your McAfee ePO server provides
advanced features and functionality to help you automate the management of your network
security.
See also
What's in the Software Manager on page 157
Use automatic Product Installation Status on page 42
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Proxy Settings from the Setting Categories, then click Edit.
2 Select Configure the proxy settings manually, provide the specific configuration information your proxy
server uses for each set of options, then click Save.
For details about product features, usage, and best practices, click ? or Help.
Task
1 Select Menu | Configuration | Server Settings, select License Key from the Setting Categories, then click Edit.
Add the McAfee ePO server certificate to the browser's collection of trusted certificates.
Add the certificate for every browser that interacts with McAfee ePO. If the browser certificate
changes, add the server certificate again.
(Recommended) Replace the default McAfee ePO server certificate with a valid certificate signed by
a certificate authority (CA) that the browser trusts. You only need to add the certificate once for
web browsers in your environment.
If the server host name changes, replace the server certificate with a new trusted CA certificate.
To replace the McAfee ePO server certificate, you must first obtain the certificate signed by a trusted
CA. You must also obtain the certificates private key and its password (if it has one). Then you can
use all these files to replace the servers certificate.
The McAfee ePO browser expects the linked files to use the following format:
Server certificate P7B or PEM
If the server certificate or private key is not in these formats, convert to one of the supported formats
before replacing the default certificate.
If your organization requires a higher standard of encryption, replace the default SHA-256 certificate
with one that uses SHA-384 or higher.
Task
For details about product features, usage, and best practices, click ? or Help.
b From the Setting Categories list, select Server Certificate, then click Edit.
You can create your own self-signed certificate with Open SSL.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From your browser, open McAfee ePO. The Certificate Error: Navigation Blocked page appears.
2 Click Continue to this website (not recommended) to open the logon page. The address bar is red, indicating
the browser cannot verify the security certificate.
3 To the right of the address bar, click Certificate Error to display the Certificate Invalid warning.
4 At the bottom of the warning, click View certificates to open the Certificate dialog box.
Do not click Install Certificate on the General tab. If you do, the process fails.
5 Select the Certification Path tab, then select Orion_CA_<servername>, and click View Certificate. Another dialog
box opens to the General tab, displaying the certificate information.
b Select Place all certificates in the following store, then click Browse to select a location.
c Select the Trusted Root Certificate Authorities folder from the list, click OK, then click Next.
8 Change the target of the McAfee ePO desktop shortcut to use the NetBIOS name of the McAfee ePO
server instead of "localhost."
Now when you log on to McAfee ePO, you are no longer prompted to accept the certificate.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From your browser, open McAfee ePO. The This Connection is Untrusted page appears.
4 Click Get Certificate. The Certification Status information is populated and the Confirm Security
Exception button is enabled.
5 Make sure that Permanently store this exception is selected, then click Confirm Security Exception.
Now when you log on to McAfee ePO, you are no longer prompted to accept the certificate.
The Smart Installer URL is created by default. The URL method is the easiest method to install
the McAfee Agent. However, the system users must have administrator rights to install software
and until users run the Smart installer, the system is unprotected.
Deploying FramePkg.exe using a logon script works well, but you must know how to create the
script and make it run when the user logs on. Also, until the user logs on, the system is
unprotected.
Adding systems manually from the domain requires organized networks and domains.
Adding systems using Active Directory is the best method for large networks but requires a well
organized Active Directory configuration.
For large networks, you might choose to use one of these methods to add an initial group of system,
confirm the configuration, then use other methods to add additional systems.
See also
Deploying the McAfee Agent using third-party tools on page 53
Best practice: Using Active Directory to synchronize McAfee Agent deployment on page 55
Best practice: Adding the McAfee Agent to your image on page 55
Create and install the McAfee Agent URL or package on page 52
Add systems to the System Tree manually on page 54
The McAfee Agent establishes a secure connection between the client and McAfee ePO.
McAfee ePO downloads the product software to the client over the secure connection.
The McAfee Agent sends client events and other information back to McAfee ePO.
See also
Adding systems to manage on page 49
Pulling all client tasks from the McAfee ePO server and passing them to the appropriate products
Once a McAfee Agent is installed on a system, you can use it to update most products on that client.
You can use the same McAfee Agent for partner products, reducing overhead.
By default, you can find the McAfee Agent executable file here on your McAfee ePO server:
Your custom McAfee Agent executable file has the communication keys for your specific McAfee ePO
server and a Sitelist.xml file. Without these keys the agents cannot talk to your specific McAfee ePO
server. The Sitelist.xml file tells all your agents how to find the McAfee ePO server using the IP
address and DNS name. This file becomes outdated if you rename your McAfee ePO server or give it a
new IP address.
If you have multiple McAfee ePO servers, you will have multiple unique McAfee Agent files designed to
communicate with the server where the McAfee Agent was created.
If you gave this custom McAfee Agent to your desktop team a year ago, it is probably outdated. It
becomes outdated if you have made changes to your McAfee ePO server such as rebuilding it with a
new IP address, or checked in a newer version of the McAfee Agent to your server.
Deploying agents
The McAfee Agent is a 5-MB executable file that you can execute manually per client or deploy on a
larger scale to hundreds or thousands of nodes.
The McAfee Agent can be deployed to your client systems using any of these methods:
An Agent Deployment URL or McAfee Smart installer
A logon script
Manual execution
Third-party tools
See the McAfee Agent Product Guide for details about these deployment methods.
You can install the McAfee Agent on the systems that you want to manage multiple ways. Following
are the most popular methods:
McAfee Agent URL installer
These steps are only an overview of the McAfee Agent installation process. See the McAfee Agent
Product Guide for details.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Depending on the method you used to create the installed file, install the URL installer or package
file.
McAfee Agent URL installer Email the URL to the system users. When the user opens the URL,
they are prompted to download or run the McAfee Agent installer.
McAfee Agent package file Install the package file using one of these methods:
Manual installation on Windows
Command-line options
Once the agents are installed, it takes multiple agent-server communication intervals before the
managed systems appear in the System Tree as Managed.
3 Select Menu | System | System Tree to confirm that the managed systems have successfully installed the
McAfee Agent and reported back to the McAfee ePO server.
Your McAfee ePO server is now providing protection and managing your clients.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems Section | System Tree, then click the Agent Deployment tab.
3 Specify the URL name, the agent version, and whether the URL applies to all Agent Handlers, or
only specific Agent Handlers.
When a user opens the URL, they are prompted to download or run the McAfee Agent installer. The
installation executable can also be saved and then included in a log-on script.
See also
Create and install the McAfee Agent URL or package on page 52
Microsoft SCCM (formerly known as SMS) BMC Client Automation (formerly Marimba)
Novell Zenworks
The process used to deploy the McAfee Agent for the first time using these third-party tools is
straightforward. See the McAfee Agent Product Guide for details.
The McAfee Agent file, named FramePkg.exe, has several installation switches. Configure the McAfee
Agent to install itself, at a minimum. Optionally, you can use the /s switch to hide the installation
graphical user interface from the user. Here is an example of this command:
FramePkg.exe /install=agent /s
Make sure that the client systems are reachable from the McAfee ePO server.
Perform these steps to confirm that a few target systems are accessible from the McAfee ePO server:
Use ping commands to test the ability to successfully connect from the McAfee ePO server to
managed systems.
To confirm the Admin$ share folder on Windows target systems is accessible from the McAfee ePO
server, click Windows Start | Run, then type the path to the target system's Admin$ share, specifying
system name or IP address. For example, type:
\\<System Name>\Admin$
If the systems are properly connected over the network, if your credentials have sufficient rights,
and if the Admin$ share folder is present, a Windows Explorer dialog box appears.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, then click New Systems on the System Tree page.
2 From the New Systems page, click Push agents and add systems to the current group and Browse.
3 From the NT Domain Credentials dialog box, type this information and click OK.
Domain Type the domain name with your target systems.
4 On the Browse for Systems page, select the domain server from the Domain list.
The Systems in Selected Domain table appear in the list of systems installed on that domain server.
5 Select the systems or groups of systems to add to the System Tree, then click OK.
The systems you selected appear in the Target Systems field, separated by commas.
6 In Agent Version, select the Windows or Non-Windows and the version from the list.
8 Use the defaults for the final settings and click OK.
The systems you selected are added to the System Tree and appear as Unmanaged in the Managed
State column. After multiple agent-server communications to install the product software and update
tasks and policies, the Managed State changes to Managed. This process can take several hours to
complete.
You must have the proper credentials, admin$ share enabled, and no local firewall blocking the
NetBIOS ports on the destination client.
The target system must be turned on. Just because the system exists in AD does not mean that it
is turned on and active on your network.
Agent deployment from the McAfee ePO server works as long you have a well maintained AD
structure. If not, you end up with excessive shell systems, or placeholders, in your System Tree. These
shells are systems that have been imported from your AD server but have never received a McAfee
Agent. Shell systems appear in the Managed State column as Unmanaged.
Make sure that your environment is properly covered with agents to avoid these shell systems. These
shell systems cause the following problems:
They leave your System Tree cluttered and unorganized.
They skew your reports and queries because they are only placeholders for systems, not systems
that are actively talking to the McAfee ePO server.
You can filter out these shell systems in your reports, but it is much better to make sure that your
environment is properly covered with a McAfee Agent.
Delete these shell systems using a McAfee ePO server task regularly.
Any required McAfee product and associated policy is pulled from the McAfee ePO server by the
McAfee Agent on your systems.
You have maximum security coverage for all systems in your environment.
You have two options to make the McAfee Agent part of your build process and install it on your
managed systems:
Option 1 Include the McAfee Agent in your Windows image before freezing or finalizing the
image. Make sure that you delete the McAfee Agent GUID before freezing the image
Option 2 Run the McAfee Agent executable after your image is created using a repeatable
script.
You can install all client products on your managed systems by:
Letting the McAfee Agent automatically call into the McAfee ePO server in 10 minutes and receive
whatever policy and products McAfee ePO dictates.
(Recommended) Making the endpoint products part of your build process and include them in the
original image. See the McAfee Agent Product Guide to install the McAfee Agent on a non-persistent
virtual image, or in Virtual Desktop Infrastructure (VDI) mode.
Here are some pointers to help you decide which option to use:
Advantage or Description
disadvantage
Disadvantage If you let the McAfee Agent pull multiple endpoint products, it can use too much
bandwidth. If you have bandwidth constraints, make the products part of your
original image.
Advantage If the endpoint products are part of your imaging process, your build process
can occur on a network where your imaged systems don't have connectivity to
the McAfee ePO server.
Disadvantage Once you install the McAfee Agent on a client it takes several more minutes to
download, install, and update the products using a client task. This lag occurs
even though the first agent-server communication occurs almost immediately.
Advantage If timing is a concern, make the McAfee products part of your image. This
avoids the 1520 minute wait for the products to install, when your systems
might be vulnerable to threats.
Confirm that you deleted the McAfee Agent GUID before freezing the image
Make sure that you delete the McAfee Agent GUID before freezing the image when you make the
McAfee Agent part of your image.
If this registry key is not deleted, all systems with this same image use the same GUID and causes
problems in your environment. See the McAfee Agent Product Guide for details.
Failure to delete the McAfee Agent GUID from the registry before finalizing your image can make it
hard to manage the images in larger environments. You might have several imaging teams involved or
an outsourcing organization might be building the images. Make sure that your imaging teams
understand how to reset the GUIDs if the computers are not displayed in the McAfee ePO directory.
See KnowledgeBase article How to reset the agent GUID if computers are not displayed in the McAfee
ePO directory, KB56086 for details.
Which permissions your administrators have to access to change the groups in the System Tree
If you are creating your System Tree for the first time, these are the primary options available for
organizing your systems dynamically:
Using Active Directory (AD) synchronization
Best practice: Although you can use AD synchronization with dynamic System Tree sorting, pick one or
the other to avoid confusion and conflicts.
See also
Considerations when planning your System Tree on page 111
My Group The default subgroup added during the Getting Started initial software installation.
This group name might have been changed during the initial software installation.
Lost and Found The catch-all subgroup for any systems that have not been or could not be
added to other groups in your System Tree.
See also
Considerations when planning your System Tree on page 111
My Organization group
The My Organization group, the root of your System Tree, contains all systems added to or detected
on your network (manually or automatically).
Until you create your own structure, all systems are added by default to My Group. This group name
might have been changed during the initial software installation.
It can't be deleted.
It can't be renamed.
My Group subgroup
My Group is a subgroup of the My Organization group and is added by default during the Getting
Started initial software installation.
This group name might have been changed during the initial software installation.
When your network computers run the installation URL, they are grouped by default in My Group.
To rename the group, select Menu | Systems | System Tree, in the System Tree groups list click My Group,
then click System Tree Actions | Rename Group.
It can't be deleted.
It can't be renamed.
Its sorting criteria can't be changed from being a catch-all group, although you can provide sorting
criteria for the subgroups that you create within it.
It always appears last in the System Tree list and is not alphabetized among its peers.
Users must be granted permissions to the Lost and Found group to see its contents.
When a system is sorted into Lost and Found, it is placed in a subgroup named for the systems
domain. If no such group exists, one is created.
If you delete systems from the System Tree, make sure that you select Remove McAfee Agent on next
agent-server communication from all systems. If the McAfee Agent is not removed, deleted systems reappear in
the Lost and Found group because the McAfee Agent still communicates with McAfee ePO.
Grouping systems with similar properties or requirements into these units allows you to manage
policies for systems in one place, rather than setting policies for each system individually.
As part of the planning process, consider the best way to organize systems into groups before building
the System Tree.
Inheritance
Inheritance is a property that simplifies policy and task administration. Because of inheritance, child
subgroups in the System Tree hierarchy inherit policies set at their parent groups.
For example:
Policies set at the My Organization level of the System Tree are inherited by all groups below it.
In this example, all policies assigned to the Los Angeles | Server group are inherited by the Windows,
SQL, and Linux child subgroups.
Inheritance is enabled by default for all groups and individual systems that you add to the System
Tree. Default inheritance allows you to set policies and schedule client tasks in fewer places.
To allow for customization, inheritance can be broken by applying a new policy at any location of the
System Tree. You can lock policy assignments to preserve inheritance.
BU Business unit
After you decide on the basic building blocks for groups in the System Tree, you must determine which
building blocks to use and in which order based on these factors:
Policy assignment Will you have many custom product policies to assign to groups based on
chassis or function? Will certain business units require their own custom product policy?
Network topology Do you have sensitive WANs in your organization that can never risk being
saturated by a content update? If you have only major locations, this is not a concern for your
environment.
Client task assignment When you create a client task, such as an on-demand scan, will you
need to do it at a group level, like a business unit, or system type, like a web server?
Content distribution Will you have an agent policy that specifies that certain groups must get
their content from a specific repository?
Operational controls Will you need specific rights delegated to your McAfee ePO administrators
that will allow them to administer specific locations in the tree?
Queries Will you need many options when filtering your queries to return results from a specific
group in the System Tree?
After you choose the basics for your tree structure, create a few sample System Tree models and look
at the pros and cons of each design. There is no right way or wrong way to build your System Tree,
just pluses and minuses depending on what you choose.
Here is a few of the most commonly used System Tree designs users tend to use:
GEO -> CHS -> FUNC
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, then click the Systems tab to show a list of managed systems.
If no systems appear, click This Group and All Subgroups in the Preset list.
2 In the Managed State column for each row of systems, confirm that Managed appears.
If Unmanaged appears in the Managed State column, the system was added to the System Tree but
the McAfee Agent and product software are not installed on the system.
3 To display details about a system on the Systems Information page, double-click the system row.
Policies
Dashboards
Becoming familiar with these features and how they are configured provides an understanding about
how McAfee ePO protects your managed systems.
See also
Benefits of product deployment projects on page 177
Choosing a product deployment method on page 176
Command or Description
action
New Systems Opens the New Systems page where you can add systems to the System Tree.
New Subgroups Creates a subgroup in the System Tree.
Command or Description
action
System Tree Action New Subgroups Creates a subgroup in the System Tree.
Rename Group Renames the selected group.
Delete Group Deletes the selected group or groups.
Export Systems Exports a list of systems from the System Tree to a .txt file for
later use.
Sort Now Sorts selected systems into groups with criteria-based sorting
enabled.
Table Actions Choose Columns Opens the Choose Columns page, where you can select the
columns to display on the System Tree page.
Export Table Allows you to export this table.
Tag Allows you to change the tags in the Tags column.
Agent Specifies the actions that can be taken on agents on the selected
systems.
Directory Management Specifies the actions that you can use to manage systems in
your directory.
See also
Organizing systems with the System Tree on page 111
For example, from the Product list, select McAfee Agent and the Category All.
Policy actions
This table lists the policy changes available on the Policy Catalog page.
Import or Export Imports or exports all policies and categories selected for the product.
New Policy Opens the Create a New Policy dialog box, where you can create a policy of
the selected product and category type.
See also
Assigning policies on page 6
Automatically add and update software as it is added or new versions are installed.
For example, from the Client Task Types list, expand McAfee Agent, select McAfee Agent Statistics, and click
Collect All in the Name column.
Command or Description
action
New Task Opens the Create a New Policy dialog box, where you can create a client task for
the selected product.
Task Catalog Import Opens the Import page, where you can import Client Task objects from
actions an XML file.
Export All Opens the Export page, where you can export an XML file with all
client task objects for the products listed in the Task Type pane.
Client task row View Double-click the client task name to view the configuration.
actions
Delete Deletes the client task.
Duplicate Duplicates the client task so that you can change it.
Assign Opens the Select a group task page, where you can identify a group in
your System Tree to assign this task.
Share or Unshare Click to share or unshare the client task with other McAfee ePO
servers.
See also
Client tasks on page 216
For example, to familiarize yourself with server task configuration, in the Name column, find Download
Software Product List and click View in the Actions column.
Command or Description
action
New Task Starts the Server Task Builder, where you can create and schedule a server task.
Import Tasks Opens the Import Scheduled Task, page where you can select the file to be
imported.
Command or Description
action
Table Actions Choose Columns Opens a dialog box that allows you to select which columns to
after you select display.
a server task
Delete Deletes the server task.
Duplicate Duplicates the server task so that you can change it.
Edit Opens the Server Task Builder page with the settings of the selected
server task loaded, so that you can edit and save the settings.
Enable or Disable Enables or disables the selected tasks. When a task is
disabled, it does not run, even if scheduled.
Export Table Opens the Export page. Use this option to specify the format and
the package of files to be exported. You can save or email the exported file.
Export Tasks Opens the Export page. Use this option to specify the format and
the package of files to be exported. You can save or email the exported file.
Run Immediately runs the server task,
View Allows you to view the server task configuration.
Server task row View Allows you to view the server task configuration.
Actions
Edit Opens the Server Task Builder page with the settings of the selected
server task loaded, so that you can edit and save the settings.
Run Immediately runs the server task.
See also
Server tasks on page 213
Dashboard example
McAfee created several default dashboards and monitors for McAfee ePO systems in an average
environment. To see the default dashboards and monitors and their configuration, select Menu |
Reporting | Dashboards.
The initial dashboard that appears depends on which phase of initial configuration you are in. For the
first 24 hours, after you log on to McAfee ePO, the Getting Started with McAfee ePolicy Orchestrator
dashboard appears. After that time the ePO Summary dashboard is the default.
To familiarize yourself with dashboards configuration, in the Dashboards list, click Executive Dashboard,
Guided Configuration, or any of the dashboards added for your product software.
Dashboard actions
This table lists the actions available on the Dashboards page.
See also
Dashboards and monitors on page 4
To familiarize yourself with queries and how they work, select the Queries tab in the Queries and
Reports page. In the Groups list, click All to expand the list. You can now view queries in the Queries
tab. For example, Agent Communication Summary. In the Agent Communication Summary row Actions column, click
Run.
A pie chart displays the number of managed systems and how many are compliant with the default
McAfee ePO policy.
Command or Description
action
New Query or New Opens the Query Builder page or reports toolbox so that you can start creating
Report your own query or report.
Import Query or Import Imports a previously saved XML file to the selected group.
Report
Group Actions New Group Opens the Edit Group page where you can edit the name and
visibility of the selected group.
Delete Group Deletes all queries or reports in the selected group.
Edit Group Opens the New Group dialog box where you can create a query
group.
See also
Generating queries and reports on page 4
Learn how to trace an event from your managed systems to McAfee ePO.
See how and where the threat events appear in the McAfee ePO user interface.
Tasks
Run a sample threat on a managed system on page 73
You physically log on to a managed system or remotely log on to that system to run an
anti-malware test file.
Choose a system that's not running critical processes. For example, don't run the anti-malware test
file on a server.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, then click the Systems tab to show a list of managed systems.
If no systems appear, click This Group and All Subgroups in the Preset list.
2 Click a system in the System Name column to open the System Information page.
3 Scroll down the list to find the information you need to remotely log on to the test system. For
example, you can use this information:
DNS Name
IP Address
System Description
4 Click the Products tab to see a list of products and versions installed on the test system.
5 Confirm that Endpoint Security Threat Prevention is installed on the test system.
You now have the information to remotely log on to the test system and run the anti-malware test file.
See also
Confirm system management from the System Tree on page 61
Task
For details about product features, usage, and best practices, click ? or Help.
Using a remote connection process, for example Windows Remote Desktop Connection, to log
on.
2 Using a web browser, connect to the EICAR site to download the anti-malware test file from:
http://www.eicar.org/86-0-Intended-use.html
3 Follow the instructions to download and run the 68-Byte eicar.com anti-malware test file.
The anti-malware test file either runs and is deleted or the file is blocked before it can run.
4 In Windows, click Start | All Programs | McAfee | McAfee Endpoint Security, then click Status.
A threat Summary lists the type of threat and the number of threats received.
5 Click Event Log to display the threat events in the Event table.
The bottom pane of the table lists the threat event details.
Task
For details about product features, usage, and best practices, click ? or Help.
2 In the title bar of the Dashboards list, select one of the dashboards described in this table.
3 Click Menu | Reporting | Threat Event Log to see a description the recent threat.
Event Category
4 Click the event in the table to see all details about the threat.
5 At the end of the threat details, click Go to related Systems to see the detailed information about the
affected system.
See also
Run a sample threat on a managed system on page 73
What to do next
After you have performed all initial configuration and made sure that your managed systems are
protected, you might want to consider other configuration steps, depending on your network security
needs.
Simple additional steps to help you manage McAfee ePO include:
Organize your System Tree to reflect the geographic, political, or functional borders.
Run maintenance tasks to optimize and protect your McAfee ePO server data.
Usually, related monitors are grouped on a specific dashboard. For example, the Threat Events
dashboard contains four monitors that display information about threats to your network.
You must have the right permissions to view or modify dashboards and monitors.
Contents
Using dashboards and monitors
Manage dashboards
Export and import dashboards
Specify first-time dashboards
Manage dashboard monitors
Move and resize dashboard monitors
Set default monitor refresh intervals
The McAfee ePO console has a default dashboard that appears the first time you log on. The next time
you log on, the Dashboards page displays the last dashboard you used.
If you have deleted all default dashboards, when you start McAfee ePO, this text appears in the middle
of the dashboards page: No dashboards are configured. Create a new dashboard or import an existing dashboard.
You can switch dashboards by selecting a different dashboard from the drop-down list. There are three
different kinds of dashboards you can choose from.
McAfee Dashboards McAfee dashboards are not editable, and can be viewed by all users. You can
duplicate a McAfee Dashboard as a starting point for your own customized dashboards.
Public Dashboards Public dashboards are user-created dashboards that are shared across users.
Private Dashboards These are the dashboards you have created for your own use. Private
dashboards are not shared across users.
When you create a private or public dashboard, you can drag and drop the monitors you want from
the Monitor Gallery to the new dashboard.
See also
Manage dashboards on page 80
Manage dashboard monitors on page 83
Export and import dashboards on page 81
Manage dashboards
Create, edit, duplicate, delete, and assign permissions to dashboards.
The default dashboards and predefined queries, shipped with ePolicy Orchestrator, cannot be modified
or deleted. To change them, duplicate, rename, and modify the renamed dashboard or query.
Task
For details about product features, usage, and best practices, click ? or Help.
Action Steps
Create a To create a different view on your environment, create a new dashboard.
dashboard
1 Click Dashboard Actions | New.
Edit and assign Dashboards are only visible to users with proper permission. Dashboards are
permissions to assigned permissions identically to queries or reports. They can either be entirely
a dashboard private, entirely public, or shared with one or more permission sets.
1 Click Dashboard Actions | Edit.
2 Select a permission:
Private Do not share this dashboard
Public Share this dashboard with everyone
Shared Share this dashboard with the following permission sets
With this option, you must also choose one or more permission sets.
3 Click OK to change the dashboard.
It is possible to create a dashboard with more expansive permissions than one or
more queries contained on the dashboard. If you do this, users that have access
to the underlying data will see the query when opening the dashboard. Users
that do not have access to the underlying data will receive a message telling
them they do not have permission for that query. If the query is private to the
dashboard creator, only the dashboard creator can modify the query or remove it
from the dashboard.
Action Steps
Duplicate a Sometimes the easiest way to create a new dashboard is to copy an existing one
dashboard that's close to what you want.
1 Click Dashboard Actions | Duplicate.
2 ePolicy Orchestrator names the duplicate by appending " (copy)" to the existing
name. If you want to modify this name, do so now and click OK.
The duplicated dashboard now opens.
The duplicate is an exact copy of the original dashboard including all permissions.
Only the name is changed.
See also
Using dashboards and monitors on page 79
A dashboard exported as an XML file can be imported to the same or a different system.
Task
For details about product features, usage, and best practices, click ? or Help.
Action Steps
Export 1 Click Dashboard Actions | Export.
dashboard
Your browser attempts to download an XML file according to your browser
settings.
2 Save the exported XML file to an appropriate location.
3 Click Save.
The Import Dashboard confirmation dialog box appears. The name of the
dashboard in the file is displayed, as well as how it will be named in the system.
By default, this is the name of the dashboard as exported with (imported)
appended.
4 Click OK. If you do not want to import the dashboard, click Close.
The imported dashboard is displayed. Regardless of their permissions at the time
they were exported, imported dashboards are given private permissions. If you
want them to have different permissions, change them after you import the
dashboard.
See also
Using dashboards and monitors on page 79
Task
For details about product features, usage, and best practices, click ? or Help.
c Click Edit.
2 Next to Default dashboard for specific permission sets, specify the default dashboard that appears for each
permission set. Select a permission set and default dashboard from the menus.
Use and to add or remove permission set and dashboard pairs. You don't have to specify
a default dashboard for every permission set.
The order of the pairs determines which default dashboard appears to users with more than one
assigned permission set.
3 Click Save.
The first time a user logs on, the dashboard you specified for their permission set appears.
Subsequent logons return the user to the page they were on when they logged off.
If you do not have the necessary rights or product licenses to view a monitor, or if the underlying
query for the monitor is no longer available, a message displays in place of the monitor.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Dashboards. Select a dashboard from the Dashboard drop-down list.
Action Steps
Add a 1 Click Add Monitor.
monitor
The Monitor Gallery appears at the top of the screen.
2 Select a monitor category from the View drop-down list.
The available monitors in that category appear in the gallery.
3 Drag a monitor onto the dashboard. As you move the cursor around the dashboard,
the nearest available drop location is highlighted. Drop the monitor into your
wanted location.
The New Monitor dialog appears.
4 Configure the monitor as needed (each monitor has its own set of configuration
options), then click OK.
5 After you have added monitors to this dashboard, click Save Changes to save the
newly configured dashboard.
6 When you have completed your changes, click Close.
If you add a Custom URL Viewer monitor that contains Adobe Flash content or ActiveX
controls to a dashboard, it is possible the content might obscure McAfee ePO menus,
making portions of the menu inaccessible.
Edit a Every monitor type supports different configuration options. For example, a query
monitor monitor allows the query, database, and refresh interval to be changed.
1 Choose a monitor to manage, click the arrow in its top-left corner, and select Edit
Monitor.
The monitor's configuration dialog appears.
2 When you have completed modifying the monitor's settings, click OK. If you decide
to not make changes, click Cancel.
3 If you decide to save the resulting changes to the dashboard, click Save, otherwise
click Discard.
Remove a 1 Choose a monitor to remove, select the arrow in its top-left corner, and select
monitor Remove Monitor.
The monitor's configuration dialog appears.
2 When you are finished modifying the dashboard, click Save Changes. To revert the
dashboard to its prior state, click Discard Changes.
See also
Using dashboards and monitors on page 79
You can change the size of many dashboard monitors. If the monitor has small diagonal lines in its
bottom-right corner, you can resize it. Monitors are moved and resized through drag and drop within
the current dashboard.
Task
For details about product features, usage, and best practices, click ? or Help.
2 When the background outline has shifted to the location you want, drop the monitor.
If you attempt to drop the monitor in an invalid location, it returns to its prior location.
2 When the background outline has changed shape to a size you want, drop the monitor.
If you attempt to resize the monitor to a shape not supported in the monitor's current
location, it returns to its prior size.
2 Click Save Changes. To revert to the prior configuration, click Discard Changes.
Task
For details about product features, usage, and best practices, click ? or Help.
c Click Edit.
2 Next to Default refresh interval for new monitors, enter a value between one minute and 60 hours.
3 Click Save.
New monitors are refreshed according to the interval you specified. Existing monitors retain their
original refresh interval.
Users can always change the refresh interval of an individual monitor in the Edit Monitor window.
McAfee ePO comes with its own querying and reporting capabilities.
Included are the Query Builder and Report Builder, which create and run queries and reports that
result in user-configured data in user-configured charts and tables. The data for these queries and
reports can be obtained from any registered internal or external database in your ePolicy Orchestrator
system.
In addition to the querying and reporting systems, you can use these logs to gather information about
activities on your McAfee ePO server and your network:
Audit Log
Contents
Query and report permissions
About queries
Query Builder
Work with queries
About reports
Structure of a report
Create a report
Edit an existing report
Run a report on a schedule
View report output
Configure the template and location for exported reports
Group reports together
Groups and permission sets control access to queries and reports. All queries and reports must belong
to a group, and access to that query or report is controlled by the permission level of the group. Query
and report groups have one of the following permission levels:
Private The group is only available to the user that created it.
By permission set The group is only available to users assigned the selected permission sets.
Permission sets have four levels of access to queries or reports. These permissions include:
No permissions The Query or Report tab is not available to users with no permissions.
Use public queries Grants permission to use any queries or reports that have been placed in a Public
group.
Use public queries; create and edit personal queries Grants permission to use any queries or reports that
have been placed in a Public group, as well as the ability to use the Query Builder to create and
edit queries or reports in Private groups.
Edit public queries; create and edit personal queries; make personal queries public Grants permission to use and
edit any queries or reports placed in Public groups, create and edit queries or reports in Private
groups, as well as the ability to move queries or reports from Private groups to Public or Shared
groups.
About queries
Queries enable you to poll McAfee ePO data. Information gathered by queries is returned in the form
of charts and tables.
A query can be used to get an answer right now. Query results can be exported to several formats,
any of which can be downloaded or sent as an attachment to an email message. Most queries can also
be used as dashboard monitors, enabling near real-time system monitoring. Queries can also be
combined into reports, giving a more broad and systematic look at your McAfee ePO software system.
The default dashboards and predefined queries shipped with McAfee ePO cannot be modified or
deleted. But you can duplicate them, then rename and modify them as needed.
Exported results
Query results can be exported to four formats. Exported results are historical data and are not
refreshed like other monitors when used as dashboard monitors. Like query results and query-based
monitors displayed in the console, you can drill down into the HTML exports for more detailed
information.
Unlike query results in the console, data in exported reports is not actionable.
CSV Use the data in a spreadsheet application (for example, Microsoft Excel).
Query Builder
McAfee ePO provides an easy, four-step wizard that is used to create and edit custom queries. With
the wizard, you can configure which data is retrieved and displayed, and how it is displayed.
Result types
The first selections you make in the Query Builder are the Schema and result type from a feature
group. This selection identifies from where and what type of data the query retrieves, and determines
the available selections in the rest of the wizard.
Chart types
McAfee ePO provides a number of charts and tables to display the data it retrieves. These charts and
their drill-down tables are highly configurable.
List Table
Table columns
Specify columns for the table. If you select Table as the primary display of the data, this configures that
table. If you select a type of chart as the primary display of data, it configures the drill-down table.
Query results displayed in a table are actionable. For example, if the table is populated with systems,
you can deploy or wake up agents on those systems directly from the table.
Filters
Specify criteria by selecting properties and operators to limit the data retrieved by the query.
Tasks
Manage custom queries on page 90
You can create, duplicate, edit, and delete queries as needed.
Run a query on a schedule on page 92
A server task is used to run a query regularly. Queries can have sub-actions that allow you
to perform various tasks, such as emailing the query results or working with tags.
Create a query group on page 92
Query groups allow you to save queries or reports without allowing other users access to
them.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Queries & Reports page: select Menu | Reporting | Queries & Reports.
Action Steps
Create 1 Click New Query, and the Query Builder appears.
custom
query 2 On the Result Type page, select the Feature Group and Result Type for this query, then
click Next.
3 Select the type of chart or table to display the primary results of the query, then
click Next.
If you select Boolean Pie Chart, configure the criteria to include in the query before
proceeding.
4 Select the columns to be included in the query, then click Next.
If you selected Table on the Chart page, the columns you select here are the
columns of that table. Otherwise, these columns make up the query details table.
5 Select properties to narrow the search results, then click Run.
The Unsaved Query page displays the results of the query, which is actionable. You
can take any available action on items in any table or drill-down table.
Selected properties appear in the content pane with operators that can specify
criteria used to narrow the data that is returned for that property.
If the query didn't return the expected results, click Edit Query to go back to the
Query Builder and edit the details of this query.
If you don't want to save the query, click Close.
If you want to use this query again, click Save and continue to the next step.
6 The Save Query page appears. Type a name for the query, add any notes, and
select one of the following:
New Group Type the new group name and select either:
Private group (My Groups)
Public group (Shared Groups)
Existing Group Select the group from the list of Shared Groups.
7 Click Save.
The new query appears in the Queries list.
Duplicate 1 From the list, select a query to copy, then click Actions | Duplicate.
query
2 In the Duplicate dialog box, type a name for the duplicate and select a group to
receive a copy of the query, then click OK.
The duplicated query appears in the Queries list.
Edit query 1 From the list, select a query to edit, then click Actions | Edit.
Delete 1 From the list, select a query to delete, then click Actions | Delete.
query
2 When the confirmation dialog box appears, click Yes.
The query no longer appears in the Queries list. If any reports or server tasks used
the query, they now appear as invalid until you remove the reference to the deleted
query.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, name and describe the task, then click Next.
4 In the Query field, browse to the query that you want to run.
6 From the Sub-Actions list, select an action to take based on the results. Available sub-actions depend
on the permissions of the user, and the products managed by your McAfee ePO server.
You are not limited to selecting one action for the query results. Click the + button to add actions to
take on the query results. Be careful to place the actions in the order you want them to be taken on
the query results.
7 Click Next.
The task is added to the list on the Server Tasks page. If the task is enabled (which it is by default), it
runs at the next scheduled time. If the task is disabled, it only runs when you click Run next to the
task on the Server Tasks page.
You can also create private query groups while saving a custom query.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then click Group Actions | New Group.
Public group Adds the new group under Shared Groups. Any user with access to public queries and
reports can view queries and reports in the group.
Shared by permission set Adds the new group under Shared Groups. Only users assigned the selected
permission sets can access reports or queries in this group.
Administrators have full access to all Shared by permission set and Public group queries.
4 Click Save.
About reports
Reports package query results into a PDF document, enabling offline analysis.
Generate reports to share information about your network environment with security administrators
and other stakeholders.
Reports are configurable documents that display data from one or more queries, drawing data from
one or more databases. The most recently run result for every report is stored in the system and is
readily available for viewing.
You can restrict access to reports by using groups and permission sets in the same way you restrict
access to queries. Reports and queries can use the same groups, and because reports primarily
consist of queries, this configuration allows for consistent access control.
Structure of a report
Reports contain a number of elements held within a basic format.
While reports are highly customizable, they have a basic structure that contains all varying elements.
Page sizes:
Orientation:
Landscape
Portrait
Page Number
Page elements
Page elements provide the content of the report. They can be combined in any order, and can be
duplicated as needed. Page elements provided with McAfee ePO are:
Page breaks
Create a report
You can create reports and store them in McAfee ePO.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then select the Report tab.
3 Click Name, Description and Group. Name the report, describe it, and select an appropriate group. Click
OK.
4 You can now add, remove, rearrange elements, customize the header and footer, and change the
page layout. At any point, click Run to check your progress.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then select the Report tab.
2 Select a report from the list by selecting the checkbox next to its name.
3 Click Edit.
Tasks
Add elements to a report on page 95
You can add new elements to an existing report.
Configure image report elements on page 95
Upload new images and modify the images used within a report.
Configure text report elements on page 96
You can insert static text within a report to explain its contents.
Configure query table report elements on page 96
Some queries are better displayed as a table when inside a report.
Configure query chart report elements on page 97
Some queries are better displayed as a chart when inside a report.
Customize a report on page 97
Customize a report layout to add, remove, or move the objects that you need.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select an element from the Toolbox and drag and drop it over the Report Layout.
Report elements other than Page Break require configuration. The configuration page for the
element appears.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To configure an image already in a report, select the arrow at the top left corner of the image, then
click Configure.
This displays the Configure Image page. If you are adding an image to the report, the Configure
Image page appears immediately after you drag and drop the Image element onto the report.
3 To use a new image, click Browse and select the image from your computer, then click OK.
4 To specify a specific image width, enter the width in the Image Width field.
By default, the image is displayed in its existing width without resizing unless that width is wider
than the available width on the page. In that case, it is resized to the available width keeping
aspect ratio intact.
5 Select if you want the image aligned left, center, or right, then click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To configure text already in a report, click the arrow at the top left corner of the text element. Click
Configure.
This displays the Configure Text page. If you are adding new text to the report, the Configure Text
page appears immediately after you drop the Text element onto the report.
2 Edit the existing text in the Text edit box, or add new text.
5 Click OK.
The text you entered appears in the text element within the report layout.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To configure a table already in a report, click the arrow at the top left corner of the table. Click
Configure.
This displays the Configure Query Table page. If you are adding query table to the report, the
Configure Query Table page appears immediately after you drop the Query Table element onto the
report.
3 Select the database from the Database drop-down list to run the query against.
5 Click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To configure a chart already in a report, click the arrow at the top left corner of the chart. Click
Configure.
This displays the Configure Query Chart page. If you are adding a query chart to the report, the
Configure Query Chart page appears immediately after you drop the Query Table element onto the
report.
3 Select whether to display only the chart, only the legend, or a combination of the two.
4 If you have chosen to display both the chart and legend, select how the chart and legend are
placed relative to each other.
7 Click OK.
Customize a report
Customize a report layout to add, remove, or move the objects that you need.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select a report and click Actions | Edit, then perform the required actions.
Action Steps
Customize Headers and footers provide information about the report.
report headers
and footers The 6 fixed locations in the header and footer contain different data fields:
Header fields: The header contains 3 fields. One left-aligned logo and 2
right-aligned fields, one above the other. These fields can contain one of the 4
values:
Nothing
Date/Time
Page Number
User name of the user running the report
Footer fields: The footer contains 3 fields. One left-aligned, one centered, and
one right-aligned. These 3 fields can also contain the listed values and custom
text.
To customize the headers and footers, perform these steps:
1 Click Header and Footer.
2 By default, reports use the system setting for headers and footers. If you do
not want this, deselect Use Default Server Setting.
To change the system settings for headers and footers, select Menu | Configuration
| Server Settings, then select Printing and Exporting and click Edit.
3 To change the logo, click Edit Logo.
a If you want the logo to be text, select Text and enter the text in the edit box.
b To upload a new logo, select Image then browse to and select the image on
your computer and click OK.
c To use a previously uploaded logo, select it.
d Click Save.
4 Change the header and footer fields to match the wanted data, then click OK.
Reorder You can change the order in which elements appear in a report.
elements in a
1 To move an element, click the title bar of the element and drag it to a new
report
position.
The element positioning under the dragged element shifts as you move the
cursor around the report. Red bars appear on either side of the report if the
cursor is over an illegal position.
2 When the element is positioned where you want it, drop the element.
3 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Name the task, describe it, and assign a schedule status, then click Next.
If you want the task to be run automatically, set the Schedule status to Enabled.
3 From the Actions drop-down list, select Run Report. Select the report to run and the target language,
then click Next.
4 Choose a schedule type (frequency), dates, and time to run the report, then click Next.
The schedule information is used only if you enable Schedule status.
Whenever a report runs, the prior results are erased and cannot be retrieved. If you are interested in
comparing different runs of the same report, archive the output elsewhere.
Task
For details about product features, usage, and best practices, click ? or Help.
In the report list, you see a Last Run Result column. Each entry in this column is a link to retrieve the
PDF that resulted from the last successful run of that report. Click a link from this column to
retrieve a report.
A PDF opens within your browser, and your browser behaves as you have configured it for that file
type.
Headers and footers, including a custom logo, name, and page numbering.
Task
For option definitions, click ? in the interface.
1 Select Menu | Configuration | Server Settings, then select Printing and Exporting in the Settings list.
3 In the Headers and footers for exported documents section, click Edit Logo to open the Edit Logo page.
a Select Text and type the text you want included in the document header, or do one of the
following:
Select Image and browse to the image file, such as your company logo.
4 From the drop-down lists, select any metadata that you want displayed in the header and footer.
6 Type a new location or except the default location to save exported documents.
7 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then select the Report tab.
4 Select a group from the Report Group drop-down list and click OK.
When you select the chosen group from the Groups list in the left pane of the report window, the report
appears in the report list.
Disaster Recovery helps you quickly recover, or reinstall your McAfee ePO software. Disaster Recovery
uses a Snapshot feature that periodically saves your McAfee ePO configuration, extensions, keys, and
more to Snapshot records in the McAfee ePO database.
Contents
What is Disaster Recovery?
Disaster Recovery components
How Disaster Recovery works
Create Snapshot
Configure Disaster Recovery server settings
New McAfee ePO server hardware with the original server name and IP address Allows you to
upgrade, or restore, your server hardware, and quickly resume managing your network systems.
New McAfee ePO server hardware with a new server name and IP address Allows you to move
your server from one domain to another.
This example can provide a temporary network management solution while you rebuild and reinstall
your McAfee ePO server hardware and software back to its original domain.
Restored or new McAfee ePO server hardware with multiple network interface cards (NICs) You
must confirm that the correct IP address is configured for the McAfee ePO server NIC.
The Snapshot is configured, depending on your SQL database version, to automatically run every day.
If you configure a script to automatically run the SQL Backup and to copy the SQL backup file to your
restore SQL database server, then you can more easily restore your McAfee ePO server. In addition,
you can manually take a Snapshot or run your scripts to quickly save and backup complex or
important McAfee ePO changes.
The Disaster Recovery Snapshot monitor, found on your McAfee ePO dashboard, allows you to manage
and monitor your Snapshots in one place.
Duplicate SQL Server hardware, referred to as your "restore" server, running Microsoft SQL that
matches your primary McAfee ePO server database. Keep the restore server up to date with the
latest primary McAfee ePolicy Orchestrator SQL database server configuration using Snapshot and
Microsoft SQL backup processes.
To avoid backup and restore problems, closely match your primary and restore server hardware and
SQL versions.
If the Snapshot monitor does not appear in your Dashboard, create a dashboard and add the Disaster
Recovery monitor.
Click See details of last run to open the Server Task Log Details page. This page displays information and log
messages about the most recent Snapshot saved.
Confirm the date and time the last Snapshot was saved to the SQL database, next to Last Run At.
Click the Disaster Recovery link to access additional Disaster Recovery information.
The color and title of the Snapshot monitor tells you the status of your latest Snapshot. For example:
Blue, Saving Snapshot to Database Snapshot process is in progress.
Orange, Snapshot Out of Date Changes to the configuration have occurred and a recent
Snapshot has not been saved. Changes that trigger a Snapshot Out of Date status include:
Any extension changed. For example updated, removed, deleted, upgraded, or downgraded.
The Snapshot server task schedule is enabled, by default, for the Microsoft SQL Server database and
disabled, by default, for the Microsoft SQL Server Express database.
Requirement Description
Hardware requirements
Primary McAfee ePO server The server hardware requirements determine the number of systems
hardware managed.
You could have the McAfee ePO server and SQL Server database
installed on the same or separate server hardware. See the McAfee
ePolicy Orchestrator Installation Guide for detailed hardware
requirements.
Restore McAfee ePO server For best results, closely mirror your primary McAfee ePO server
hardware hardware.
Primary McAfee ePO server Run the primary server with a recent Snapshot saved in the SQL
database.
Primary SQL database The primary SQL database, stores the McAfee ePO server configuration,
client information, and Disaster Recovery Snapshot records.
Software requirements
Backup file of primary SQL Using either the Microsoft SQL Server Management Studio or the
database BACKUP (Transact-SQL) command line, you can create a backup file of
the primary database including the Snapshot records.
Restore SQL database Using the Microsoft SQL Server Management Studio or the RESTORE
software (Transact-SQL) command line, you can restore the primary SQL
database including the Snapshot records on the restore SQL database
server.
McAfee ePO software This software, downloaded from the McAfee website, is used to install
and configure the restore McAfee ePO server.
Information requirements
Disaster Recovery This passphrase was added during the initial installation of the McAfee
Keystore encryption ePO software and decrypts sensitive information stored in the Disaster
passphrase Recovery Snapshot.
Requirement Description
Administrator rights You must be able to access both the primary and restore servers and the
SQL database as, for example, DBOwner and DBCreator.
Last known IP address, If you change any one of these items during the McAfee ePO server
DNS name, or NetBIOS restore, ensure that the agents have a way to locate the server. The
name of the primary easiest method is to create a Canonical Name (CNAME) record in DNS
McAfee ePO server that points requests from the old IP address, DNS name, or NetBIOS
name of the primary McAfee ePO server to the restore McAfee ePO
server information.
This is an overview of the Disaster Recovery Snapshot, SQL database backup, and copying processes.
The following diagram is an overview of the McAfee ePO software Disaster Recovery process and the
hardware involved.
In this diagram, the SQL database is installed on the same server hardware as the McAfee ePO server.
The McAfee ePO server and SQL database can be installed on different server hardware.
Figure 7-1 McAfee ePO server Disaster Recovery Snapshot and backup
The Disaster Recovery configuration includes these general steps performed on the primary McAfee
ePO server:
Take a Snapshot of the McAfee ePO server configuration and save it to the primary SQL
database. This step can be done manually or via a default server task.
When the Snapshot is taken, these database files are saved:
Location Description
C:\Program Files\McAfee\ePolicy The default path to McAfee ePO software
Orchestrator\Server\extensions extension information.
C:\Program Files\McAfee\ePolicy The default path to required files used by the
Orchestrator\Server\conf McAfee ePO software extensions.
C:\Program Files\McAfee\ePolicy These keys are specifically for McAfee ePO
Orchestrator\Server\keystore agent-server communication and the repositories.
C:\Program Files\McAfee\ePolicy The default path to the McAfee product
Orchestrator\Server\DB\Keystore installation server certificates.
C:\Program Files\McAfee\ePolicy The default path to the McAfee product
Orchestrator\Server\DB\Software installation files.
The Disaster Recovery Snapshot records saved include the paths you have configured for your
registered executables. The registered executable files are not backed up and you must replace
those executable files when you restore the McAfee ePO server. After you restore the McAfee
ePO server, any registered executables with broken paths are red on the Registered Executables
page.
Test your registered executable paths after you restore your McAfee ePO server. Some registered
executable paths might not appear red, but still fail because of dependency issues related to the
registered executables.
Back up the SQL database using the Microsoft SQL Server Management Studio or the BACKUP
(Transact-SQL) command-line process.
Copy the SQL database backup file to the duplicate restore SQL Server.
The McAfee ePO server Disaster Recovery Snapshot and backup process is complete. You do not need
to continue with the McAfee ePO server recovery installation unless you are reinstalling the McAfee
ePO software.
This topic is an overview of reinstalling the McAfee ePO software on the restore McAfee ePO server. For
details, see the installation guide.
The following diagram is an overview of the McAfee ePO server reinstallation. In this diagram, the SQL
database is installed on the same server hardware as the McAfee ePO server. The McAfee ePO server
and SQL database can be installed on different server hardware.
The McAfee ePO software installation using the Disaster Recovery Snapshot file includes these general
steps performed on the McAfee ePO restore server:
Find the SQL database backup file of the previous section. Use the Microsoft SQL Server
Management Studio or the RESTORE (Transact-SQL) command-line process to restore the
primary SQL Server configuration to the restore SQL Server.
During the McAfee ePO database software installation:
1 On the Software Welcome dialog box, click restore from Snapshot.
2 Select Microsoft SQL Server to link the McAfee ePO software to the restore SQL database that had
the primary McAfee ePO server configuration.
After the McAfee ePO software installation is started, the database records saved during the
Snapshot process are used in the software configuration instead of creating records in the
database.
Ensure that the agents can reconnect to the restore McAfee ePO server by creating a CNAME
record in DNS. This record redirects requests from the old IP address, DNS name, or NetBIOS
name of the primary McAfee ePO server to the new information for the restore McAfee ePO
server.
Now the McAfee ePO restore server is running with the exact same configuration as the primary
server. The clients can connect to the restore server and you can manage them exactly as before the
primary McAfee ePO server was removed.
See also
What is Disaster Recovery? on page 101
Create Snapshot
Creating frequent Disaster Recovery Snapshots of your primary McAfee ePO server is the first step in
quickly restoring a McAfee ePO server.
After you make many configuration changes to McAfee ePO, create a Disaster Recovery Snapshot
manually using any of these tasks.
Best practice: Create a Disaster Recovery Snapshot Server task to automate server snapshots.
Tasks
Create a snapshot from the McAfee ePO on page 107
Use the ePolicy Orchestrator Dashboard to take Disaster Recovery Snapshots of your
primary McAfee ePO server and to monitor the Snapshot process as the Dashboard status
changes.
Create snapshot from Web API on page 107
Use the McAfee ePO Web API to take Disaster Recovery snapshots of your primary McAfee
ePO server. Doing so enables you to use one command string to complete the process.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Dashboards to see the ePO Server Snapshot monitor.
If needed, click Add Monitor, select ePO Server Snapshot from the list, and drag it to the dashboard.
2 Click Take Snapshot to start saving the McAfee ePO server configuration.
During the Snapshot process, the Snapshot Monitor title bar changes to indicate the status of the
process.
The Snapshot process takes from 10 minutes to more than an hour to complete, depending on the
complexity and size of your network. This process does not affect your McAfee ePO server
performance.
3 If needed, click See details of current run to open the Server Task Log Details of the last saved Snapshot.
After the Snapshot process is complete, you click See details of current run to open the Server Task Log
Details of the last saved Snapshot.
The latest Disaster Recovery Snapshot is saved to the McAfee ePO server primary SQL database. The
database is now ready to back up and copy to the restore SQL database server.
You are prompted for the administrator user name and password before the output is displayed.
See the McAfee ePolicy Orchestrator Web API Scripting Guide for detailed Web API use and examples.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Use the following McAfee ePO Web API Help command to determine the parameters for running the
Snapshot:
https://localhost:8443/remote/core.help?command=scheduler.runServerTask
localhost: The name of your McAfee ePO server name.
2 Use the following command to list all server tasks and determine the taskName parameter to run
the Snapshot server task:
https://localhost:8443/remote/scheduler.listAllServerTasks?:output=terse
The previous example command returns a list that looks similar to the following. The exact list
displayed depends on your permissions and the extensions installed.
3 Using the task name, Disaster Recovery Snapshot Server, run the Snapshot server task using
this command:
https://localhost:8443/remote/scheduler.runServerTask?taskName=Disaster%20Recovery
%20Snapshot%20Server
102
The Snapshot process can take from 10 minutes to more than an hour to complete, depending on
the complexity and size of your network. This process normally does not affect your McAfee ePO
server performance.
4 Confirm that the Web API server task Snapshot ran successfully.
a Use this command to find the Disaster Recovery Snapshot Server task log ID:
https://localhost:8443/remote/tasklog.listTaskHistory?taskName=Disaster
%20Recovery%20Snapshot%20Server
This command displays all Disaster Recovery Snapshot Server tasks. Find the most recent task
and note the ID number. For example, ID: 102 in the following:
ID: 102
Name: Disaster Recovery Snapshot Server
Start Date: [date]
End Date: [date]
User Name: admin
Status: Completed
Source: scheduler
Duration: Less than a minute
b Use this command and that Task ID number 102 to display all task log messages.
https://localhost:8443/remote/tasklog.listMessages?taskLogId=102
Using Disaster Recovery to create an McAfee ePO server Snapshot provides you with a quick recovery
method for the McAfee ePO server.
As an administrator, this setting is helpful if you have lost, or forgotten, the Keystore encryption
passphrase configured during McAfee ePO installation. You can change the existing passphrase without
knowing the previously configured passphrase.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Disaster Recovery from the Setting Categories, then click
Edit.
2 From Keystore encryption passphrase, click Change passphrase and type the new passphrase and confirm it.
The Keystore encryption passphrase is used to encrypt and decrypt the sensitive information stored
in the server Snapshot. This passphrase is required during the McAfee ePO server recovery
process. Make note of this passphrase.
The McAfee ePO database must be periodically copied to a restore Microsoft SQL Database server to
create an actual backup database.
You can organize, group, and tag your managed systems using the System Tree and Tags features.
Contents
Organizing systems with the System Tree
Tags
The System Tree is the graphical representation of this structure. You can organize your System Tree
using these methods:
Because every network is different and requires different policies, and possibly different management,
plan your System Tree before adding the systems.
Regardless of the methods you choose to create and populate the System Tree, consider your
environment while planning the System Tree.
Administrator access
When planning your System Tree organization, consider the access requirements of users who must
manage the systems.
For example, you might have decentralized network administration in your organization, where
different administrators have responsibilities over different parts of the network. For security reasons,
you might not have an administrator account that can access every part of your network. In this
scenario, you might not be able to set policies and deploy agents using a single administrator account.
Instead, you might need to organize the System Tree into groups based on these divisions and create
accounts and permission sets.
Who should not have access to the systems and the information about them?
These questions impact both the System Tree organization, and the permission sets you create and
apply to user accounts.
Topological borders
NT domains or Active Directory containers define your network. The better organized your network
environment, the easier it is to create and maintain the System Tree with the synchronization
features.
Geographic borders
Managing security is a constant balance between protection and performance. Organize your System
Tree to make the best use of limited network bandwidth. Consider how the server connects to all parts
of your network, especially remote locations that use slower WAN or VPN connections, instead of
faster LAN connections. You might want to configure updating and agent-server communication
policies differently for remote sites to minimize network traffic over slower connections.
Political borders
Many large networks are divided by individuals or groups responsible for managing different portions
of the network. Sometimes these borders do not coincide with topological or geographic borders. Who
accesses and manages the segments of the System Tree affects how you structure it.
Functional borders
Some networks are divided by the roles of those using the network; for example, Sales and
Engineering. Even if the network is not divided by functional borders, you might need to organize
segments of the System Tree by functionality if different groups require different policies.
A business group might run specific software that requires special security policies. For example,
arranging your email Exchange Servers into a group and setting specific exclusions for on-access
scanning.
Best practice: Consider using sorting criteria based on IP address information to automate System
Tree creation and maintenance. Set IP address subnet masks or IP address range criteria for applicable
groups within the System Tree. These filters automatically populate locations with the appropriate
systems.
If possible, use tag-based sorting criteria to automatically populate groups with the appropriate
systems. Plus, to help sort your systems, you can create tag groups nested up to four levels deep,
with up to 1,000 tag subgroups in each level. For example, if you can organize your systems using
geographic location, chassis type (server, workstation, or laptop), platform (Windows, Macintosh,
Linux, or SQL), and user, you might have the tag groups in this table.
Synchronize with your Active Directory structure, by importing systems, and the Active Directory
subcontainers (as System Tree groups), and keeping them up-to-date with Active Directory. At
each synchronization, both systems and the structure are updated in the System Tree to reflect the
systems and structure of Active Directory.
Import systems as a flat list from the Active Directory container (and its subcontainers) into the
synchronized group.
Use the system description, which is imported from Active Directory with the systems.
Use this process to integrate the System Tree with your Active Directory systems structure:
1 Configure the synchronization settings on each group that is a mapping point in the System Tree.
At the same location, configure whether to:
Deploy agents to discovered systems.
Delete systems from the System Tree when they are deleted from Active Directory.
Allow or disallow duplicate entries of systems that exist elsewhere in the System Tree.
2 Use the Synchronize Now action to import Active Directory systems (and possibly structure) into the
System Tree according to the synchronization settings.
Deploy agents automatically to systems new to ePolicy Orchestrator. You might not want to
configure this setting on the initial synchronization if you are importing many systems and have
limited bandwidth. The agent MSI is about 6 MB in size. However, you might want to deploy agents
automatically to any new systems that are discovered in Active Directory during subsequent
synchronization.
Delete systems from ePolicy Orchestrator (and remove their agents) when they are deleted from
Active Directory.
Prevent adding systems to the group if they exist elsewhere in the System Tree. This setting
ensures that you don't have duplicate systems if you manually move or sort the system to another
location.
Exclude certain Active Directory containers from the synchronization. These containers and their
systems are ignored during synchronization.
If the organization of Active Directory meets your security management needs and you want the
System Tree to continue to look like the mapped Active Directory structure, use this synchronization
type with subsequent synchronization.
Systems only
Use this synchronization type to import systems from an Active Directory container, including those in
non-excluded subcontainers, as a flat list to a mapped System Tree group. You can then move these to
appropriate locations in the System Tree by assigning sorting criteria to groups.
If you choose this synchronization type, make sure to select not to add systems again if they exist
elsewhere in the System Tree. This synchronization type prevents duplicate entries for systems in the
System Tree.
The organizational needs for security management do not coincide with the organization of
containers and systems in Active Directory.
NT domain synchronization
Use your NT domains as a source for populating your System Tree.
When you synchronize a group to an NT domain, all systems from the domain are put in the group as
a flat list. You can manage these systems in the single group, or you can create subgroups for more
granular organizational needs. Use a method, like automatic sorting, to populate these subgroups
automatically.
If you move systems to other groups or subgroups of the System Tree, make sure you select to not
add the systems when they exist elsewhere in the System Tree. This setting prevents duplicate entries
for systems in the System Tree.
Unlike Active Directory synchronization, only the system names are synchronized with NT domain
synchronization; the system description is not synchronized.
Criteria-based sorting
You can use IP address information to automatically sort managed systems into specific groups. You
can also create sorting criteria based on tags, which are like labels assigned to systems. You can use
either or both to ensure that systems are where you want them in the System Tree.
Systems must match only one criterion of a group's sorting criteria to be placed in the group.
After creating groups and setting your sorting criteria, perform a Test Sort action to confirm the
criteria and sorting order.
Once you have added sorting criteria to your groups, you can run the Sort Now action. The action
moves selected systems to the appropriate group automatically. Systems that do not match the
sorting criteria of any group are moved to Lost and Found.
New systems that call into the server for the first time are added automatically to the correct group.
However, if you define sorting criteria after the initial agent-server communication, you must run the
Sort Now action on those systems to move them immediately to the appropriate group, or wait until
the next agent-server communication.
Server settings
The server has three settings:
Disable System Tree sorting Prevents other ePolicy Orchestrator users from mistakenly configuring
sorting criteria on groups and moving systems to undesirable locations in the System Tree.
Sort systems on each agent-server communication Sorts systems again at each agent-server
communication. When you change sorting criteria on groups, systems move to the new group at
their next agent-server communication.
Sort systems once Systems are sorted at the next agent-server communication and not sorted again
as long as this setting is selected. You can still sort a system, however, by selecting it and clicking
Sort Now.
System settings
You can disable or enable System Tree sorting on any system. If disabled on a system, that system
isn't sorted, regardless of how the sorting action is taken. However, performing the Test Sort action sorts
this system. If enabled, systems can be sorted using the manual Sort Now action, and can be sorted at
agent-server communication.
IP address sorting criteria must not overlap between different groups. Each IP address range or subnet
mask in a groups sorting criteria must cover a unique set of IP addresses. If criteria does overlap, the
group where those systems end up depends on the order of the subgroups on the System Tree Group
Details tab. You can check for IP address overlap using the Check IP Integrity action in the Group
Details tab.
Catch-all groups
Catch-all groups are groups whose sorting criteria is set to All others on the group's Sorting Criteria
page.
Only subgroups at the last position of the sort order can be catch-all groups. These groups receive all
systems that were sorted into the parent group, but were not sorted into any of the catch-alls peers.
If a matching system is not found, the server uses an algorithm to sort the systems into the
appropriate groups. Systems can be sorted into any criteria-based group in the System Tree, as long
as each parent group in the path does not have non-matching criteria. Parent groups of a
criteria-based subgroup must have no criteria or matching criteria.
The sorting order assigned to each subgroup (defined in the Group Details tab) determines the order that
the server considers subgroups for sorting.
1 The server searches for a system without a McAfee Agent GUID (the McAfee Agent has never
before called in) with a matching name in a group with the same name as the domain. If found, the
system is placed in that group. This can happen after the first Active Directory or NT domain
synchronization, or when you have manually added systems to the System Tree.
2 If a matching system is still not found, the server searches for a group of the same name as the
domain where the system originates. If such a group is not found, one is created under the Lost
and Found group, and the system is placed there.
4 The server applies all criteria-based tags to the system if the server is configured to run sorting
criteria at each agent-server communication.
5 What happens next depends on whether System Tree sorting is enabled on both the server and the
system.
If System Tree sorting is disabled on either the server or the system, the system is left where it
is.
If System Tree sorting is enabled on the server and system, the system is moved based on the
sorting criteria in the System Tree groups.
Systems that were added using Active Directory or NT Domain synchronization have System Tree
sorting disabled by default. With System Tree sorting disabled, systems are not sorted on the
first agent-server communication
6 The server considers the sorting criteria of all top-level groups according to the sorting order on the
My Organization groups Group Details tab. The system is placed in the first group with matching
criteria or a catch-all group it considers.
Once sorted into a group, each of its subgroups is considered for matching criteria according to
their sorting order on the Group Details tab.
Sorting continues until there is no subgroup with matching criteria for the system, and is placed
in the last group found with matching criteria.
7 If such a top-level group is not found, the subgroups of top-level groups (without sorting criteria)
are considered according to their sorting.
8 If such a second-level criteria-based group is not found, the criteria-based third-level groups of the
second-level unrestricted groups are considered.
Subgroups of groups with criteria that doesn't match are not considered. A group must have
matching criteria or have no criteria for its subgroups to be considered for a system.
9 This process continues down through the System Tree until a system is sorted into a group.
If the server setting for System Tree sorting is configured to sort only on the first agent-server
communication, a flag is set on the system. The flag means that the system can never be sorted
again at agent-server communication unless the server setting is changed to enable sorting on
every agent-server communication.
10 If the server cannot sort the system into any group, it is placed in the Lost and Found group within
a subgroup that is named after its domain.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click Customize to change the information displayed in the three system information monitors:
Summary Displays the results of the McAfee Agent Communication Summary, by default.
Properties Displays information about the systems location in your network and the agent
installed, by default.
Query monitor Displays the system-specific results for the Threat Events in the Last 2 Weeks
query, by default.
3 Click one of these tabs, to view additional details about the selected system:
Option Description
System Properties Displays details about the system. For example, operating system, memory
installed, and connection information.
Products Lists one of these product states:
Installed Product The state of the installed product for which the McAfee
Agent has communicated with the install event.
Uninstalled Product The state of the uninstalled product for which the
McAfee Agent has communicated with the uninstall event.
The status of the deployment task of the same version of the product or an
older version of the same product is ignored.
Applied Policies Displays the name of policies applied to this system and lists them alphabetically.
Applied Client Displays the name of client tasks assigned to this system and lists them
Tasks alphabetically.
Threat Events Lists threat and other events, plus detailed information about those events,
McAfee Agent List configuration information about the McAfee Agent installed on the system.
Click More to display additional McAfee Agent configuration and status information.
Best practice: Drag selected systems to any group in the System Tree to populate groups. Drag and
drop to move groups and subgroups in the System Tree.
There is no single way to organize a System Tree. Because every network is different, your System
Tree organization can be as unique as your network layout. You can use more than one method of
organization.
For example, if you use Active Directory in your network, consider importing your Active Directory
containers rather than your NT domains. If your Active Directory or NT domain organization does not
make sense for security management, you can create your System Tree in a text file and import it. If
you have a smaller network, you can create your System Tree by hand and add each system manually.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select whether to deploy the McAfee Agent to the new systems, and whether the systems are
added to the selected group, or to a group according to sorting criteria.
3 Next to Target systems, type the NetBIOS name for each system in the text box, separated by
commas, spaces, or line breaks. Alternatively, click Browse to select the systems.
5 Click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Repeat as necessary until you are ready to populate the groups with systems. Use one of these
processes to add systems to your System Tree groups:
Typing system names manually.
Importing them from NT domains or Active Directory containers. You can regularly synchronize
a domain or a container to a group for ease of maintenance.
Setting up IP address-based or tag-based sorting criteria on the groups. When agents check in
from systems with matching IP address information or matching tags, they are automatically
placed in the appropriate group.
This task does not remove systems from your System Tree. It creates a .txt file that contains the names
and structure of systems.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select the group or subgroup containing the systems you want to export, then click System Tree
Actions | Export Systems.
All systems in this group and subgroups Exports all systems at and below this level.
4 Click OK.
The Export page opens. You can click the systems link to view the system list, or right-click the link to
save a copy of the ExportSystems.txt file.
For large networks, use network utilities, such as the NETDOM.EXE utility available with the Microsoft
Windows Resource Kit, to generate text files with complete lists of the systems on your network. Once
you have the text file, edit it manually to create groups of systems, and import the whole structure
into the System Tree.
Regardless of how you generate the text file, you must use the correct syntax before importing it.
Task
For details about product features, usage, and best practices, click ? or Help.
1 List each system on its own line. To organize systems into groups, type the group name followed
by a backslash (\), then list the system belonging to that group, each on a separate line.
GroupA\system1
GroupA\system2
GroupA\GroupB\system3
GroupC\GroupD
2 Verify the names of groups and systems, and the syntax of the text file, then save the text file to a
temporary folder on your server.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select Import systems from a text file into the selected group, but do not push agents.
5 Select what to do with systems that already exist elsewhere in the System Tree.
6 Click OK.
The systems are imported to the selected group in the System Tree. If your text file organized the
systems into groups, the server creates the groups and imports the systems.
Tasks
Add sorting criteria to groups on page 122
Sorting criteria for System Tree groups can be based on IP address information or tags.
Enable System Tree sorting on the server on page 123
For systems to be sorted, System Tree sorting must be enabled on both the server and the
systems.
Enable or disable System Tree sorting on systems on page 123
The sorting status of a system determines whether it can be sorted into a criteria-based
group.
Sort systems manually on page 124
Sort selected systems into groups with criteria-based sorting enabled.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click the Group Details tab, then select the group in the System Tree.
2 Next to Sorting criteria click Edit. The Sorting Criteria page for the selected group appears.
3 Select Systems that match any of the criteria below, then the criteria selections appear.
Although you can configure multiple sorting criteria for the group, a system only has to match a
single criterion to be placed in this group.
Tags Click Add Tags and perform these steps in the Add Tags dialog box.
1 Click the tag name, or names, to add and sort the systems in this parent group.
2 Click OK.
The tags selected appear in Tags on the Sorting Criteria page and next to Sorting Criteria on the
Group Details page.
5 Repeat as needed until sorting criteria is reconfigured for the group, then click Save.
If you sort on each agent-server communication, all enabled systems are sorted at each agent-server
communication as long as this option is selected.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, then select System Tree Sorting in the Setting Categories list and
click Edit.
2 Select whether to sort systems only on the first agent-server communication or on each
agent-server communication.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Systems, then select the systems you want.
2 Select Actions | Directory Management | Change Sorting Status, then select whether to enable or disable
System Tree sorting on selected systems.
3 In the Change Sorting Status dialog box, select whether to disable or enable System Tree sorting
on the selected system.
Depending on the setting for System Tree sorting, these systems are sorted on the next
agent-server communication. Otherwise, they can only be sorted with the Sort Now action.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Systems, then select the group that contains the systems.
2 Select the systems then click Actions | Directory Management | Sort Now. The Sort Now dialog box
appears.
If you want to preview the results of the sort before sorting, click Test Sort instead. (However, if you
move systems from within the Test Sort page, all selected systems are sorted, even if they have
System Tree sorting disabled.)
Delete systems from the System Tree when they are deleted from Active Directory.
Prevent duplicate entries of systems in the System Tree when they exist in other groups.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Group Details, then select a group in the System Tree for mapping an
Active Directory container to.
You cannot synchronize the Lost and Found group of the System Tree.
2 Next to Synchronization type, click Edit. The Synchronization Settings page for the selected group
appears.
3 Next to Synchronization type, select Active Directory. The Active Directory synchronization options
appear.
4 Select the type of Active Directory synchronization you want to occur between this group and the
Active Directory container (and its subcontainers):
Systems and container structure Select this option if you want this group to truly reflect the Active
Directory structure. When synchronized, the System Tree structure under this group is changed
to reflect the Active Directory container that it's mapped to. When containers are added or
removed in Active Directory, they are added or removed in the System Tree. When systems are
added, moved, or removed from Active Directory, they are added, moved, or removed from the
System Tree.
Systems only Select this option if you only want the systems from the Active Directory container
(and non-excluded subcontainers) to populate this group, and this group only. No subgroups are
created when mirroring Active Directory.
5 Select whether to create a duplicate entry for systems that exist in another group of the System Tree.
If you are using Active Directory synchronization as a starting point for security management, and
plan to use System Tree management functionality after mapping your systems, do not select this
option.
7 Next to Container, click Add and select a source container in the Select Active Directory Container dialog box,
then click OK.
8 To exclude specific subcontainers, click Add next to Exceptions and select a subcontainer to exclude,
then click OK.
9 Select whether to deploy the McAfee Agent automatically to new systems. If you do, configure the
deployment settings.
Best practice: Because of its size, do not deploy the McAfee Agent during the initial import if the
container is large. Instead, import the container, then deploy the McAfee Agent to groups of systems
at a time, rather than all at once.
10 Select whether to delete systems from the System Tree when they are deleted from the Active
Directory domain. Optionally choose whether to remove agents from the deleted systems.
11 To synchronize the group with Active Directory immediately, click Synchronize Now.
Clicking Synchronize Now saves any changes to the synchronization settings before synchronizing the
group. If you have an Active Directory synchronization notification rule enabled, an event is
generated for each system that is added or removed. These events appear in the Audit Log, and are
queryable. If you deployed agents to added systems, the deployment is initiated to each added
system. When the synchronization completes, the Last Synchronization time is updated, displaying the
time and date when the synchronization finished, not when any agent deployments completed.
Best practice: Schedule an NT Domain/Active Directory synchronization server task for the first
synchronization. This server task is useful if you are deploying agents to new systems on the first
synchronization, when bandwidth is a larger concern.
12 When the synchronization is complete, view the results with the System Tree.
When the systems are imported, distribute agents to them if you did not select to do so automatically.
Best practice: Set up a recurring NT Domain/Active Directory synchronization server task to keep your
System Tree current with any changes to your Active Directory containers.
If the domain is large, you can create subgroups to assist with policy management or organization. To
do this, first import the domain into a group of your System Tree, then manually create logical
subgroups.
To manage the same policies across several domains, import each of the domains into a subgroup under
the same group. The subgroups will inherit the policies set for the top-level group.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Group Details and select or create a group in the System Tree.
2 Next to Synchronization type, click Edit. The Synchronization Settings page for the selected group appears.
3 Next to Synchronization type, select NT Domain. The domain synchronization settings appear.
4 Next to Systems that exist elsewhere in the System Tree, select what to do with systems that exist in another
group of the System Tree.
Best practice: Don't select Add systems to the synchronized group and leave them in their current System Tree location,
especially if you are using the NT domain synchronization only as a starting point for security
management.
5 Next to Domain, click Browse and select the NT domain to map to this group, then click OK.
Alternatively, you can type the name of the domain directly in the text box.
When typing the domain name, do not use the fully-qualified domain name.
6 Select whether to deploy the McAfee Agent automatically to new systems. If you do so, configure
the deployment settings.
Best practice: Because of its size, do not deploy the McAfee Agent during the initial import if the
container is large. Instead, import the container, then deploy the McAfee Agent to groups of systems
at a time, rather than all at once.
7 Select whether to delete systems from the System Tree when they are deleted from the NT domain.
You can optionally choose to remove agents from deleted systems.
8 To synchronize the group with the domain immediately, click Synchronize Now, then wait while the
systems in the domain are added to the group.
Clicking Synchronize Now saves changes to the synchronization settings before synchronizing the
group. If you have an NT domain synchronization notification rule enabled, an event is generated
for each system added or removed. These events appear in the Audit Log, and are queryable. If you
selected to deploy agents to added systems, the deployment is initiated to each added system.
When the synchronization is complete, the Last Synchronization time is updated. The time and date are
when the synchronization finished, not when any agent deployments completed.
9 To synchronize the group with the domain manually, click Compare and Update.
a If you are going to remove any systems from the group with this page, select whether to
remove their agents when the system is removed.
b Select the systems to add to and remove from the group as necessary, then click Update Group to
add the selected systems. The Synchronize Setting page appears.
10 Click Save, then view the results in the System Tree if you clicked Synchronize Now or Update Group.
Once the systems are added to the System Tree, distribute agents to them if you did not select to deploy
agents as part of the synchronization.
Consider setting up a recurring NT Domain/Active Directory synchronization server task to keep this
group current with new systems in the NT domain.
Adds new corresponding groups when new Active Directory containers are created.
Prevents or allows duplicate entries of systems that still exist in the System Tree after you moved
them to other locations.
The McAfee Agent can't be deployed to all operating systems in this manner. You might need to
distribute the McAfee Agent manually to some systems.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, name the task and choose whether it is enabled once it is created, then
click Next.
4 Select whether to synchronize all groups or selected groups. If you are synchronizing only some
groups, click Select Synchronized Groups and select specific ones.
In addition to running the task at the scheduled time, you can run this task immediately: on the
Server Tasks page next to the task, click Run.
Removes systems from your System Tree that are no longer in the domain.
Removes agents from all systems that no longer belong to the specified domain.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Group Details, then select the group that is mapped to the NT
domain.
3 Select NT Domain, then click Compare and Update near the bottom of the page.
4 If you are removing systems from the group, select whether to remove the agents from systems
that are removed.
5 Click Add All or Add to import systems from the network domain to the selected group.
Click Remove All or Remove to delete systems from the selected group.
In addition to the steps below, you can also drag and drop systems from the Systems table to any
group in the System Tree.
Even in a perfectly organized System Tree that's regularly synchronized, you might need to move
systems manually between groups. For example, you might need to periodically move systems from
the Lost and Found group.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Systems, then browse to and select the systems.
2 Click Actions | Directory Management | Move Systems to open the Select New Group page.
3 Select whether to enable or disable System Tree sorting on the selected systems when they are
moved.
4 Select the group to place the systems in, then click OK.
If you move systems between groups, the moved systems inherit the policies assigned to their new
group.
You're upgrading the server hardware and the McAfee ePO software version.
This graphic shows the major processes to transfer systems from one McAfee ePO server to another.
Confirm that you can view the systems in the new server's System Tree.
Confirm that the systems no longer appear in the old server's System Tree.
ERROR: Master agent-server keys must be imported into the remote server before importing the sitelist. Go to Server
Settings to export security keys from this server. Visiting this link now causes you to lose any unsaved changes to this
registered server.
Both keys (1024 and 2048) must be imported for successful registration so the Automatic Sitelist Import
can save without issue.
Tasks
Export security keys from the old server on page 130
Export the 2048-bit and 1024-bit security keys.
Import security keys to the new server on page 131
Import the 2048-bit and 1024-bit security keys from the old server on the new server.
Register the old server to the new server on page 131
Register the new server. For example, register a McAfee ePO 5.x server to a McAfee ePO
4.x server.
Transfer systems between servers on page 132
After you have imported the keys and registered the new server, you can use the old server
to initiate the transfer process.
Check the status of transferred computers on page 132
Verify that your systems now appear on the new server.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Click Security Keys under the Setting Categories column, click Edit.
4 Save the 2048-bit keys listed under the Agent-server secure communication keys list.
a Click the 2048-bit key and click Export.
c Click Save.
d Type or browse to a path where you want to save the security key .zip file.
5 Save the 1024-bit keys listed under the Agent-server secure communication keys list.
a Click the 1024-bit key and click Export.
c Click Save.
d Type or browse to a path where you want to save the security key .zip file.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Click Security Keys from the Setting Categories column, then click Edit.
4 Click Import.
b Click Open.
c Click Next.
d Confirm that you have selected the correct key on the Summary tab, and click Save.
b Click Open.
c Click Next.
d Confirm that you have selected the correct key on the Summary tab, and click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
4 Select ePO from the Server type drop-down list, type a name for this server in the Name section, and
click Next.
5 Type the credentials to the new server and click Test Connection.
6 If the test is successful, select Enable for the Transfer systems entry.
The Manual sitelist import option is also available and can be used if you want to do a manual import by
selecting an existing SiteList.xml file.
You can obtain the SiteList.xml file to use for this process in the following folder on the server
where the agents are being transferred to: <ePO_Installation_Directory>\DB\SiteList.xml
On a McAfee ePO 4.6 server, you can select only version 4.6 or previous versions as the McAfee
ePO version. When you test the connection to the database of the registered server, you see the
following warning:
Database connection successful! Warning Versions mismatch!
You can safely ignore the warning. TheMcAfee ePO version selected (4.6) does not match the
database (5.x) you have tested.
Task
For details about product features, usage, and best practices, click ? or Help.
Ensure that the selected systems are communicating to the old server, before you transfer them.
Two agent-server communication intervals must occur before the system appears in the System Tree
of the new server. The length of time required depends on your configuration. The default
agent-server communication interval is one hour.
Task
For details about product features, usage, and best practices, click ? or Help.
This feature does not follow the inheritance model used when enforcing policies.
Automatic Responses use events that occur on systems in your environment and configured response
rules. These rules are associated with the group that contains the affected systems and each parent
above it. When an event occurs, it is delivered to the server. If the conditions of a rule are met,
designated actions are taken.
This design allows you to configure independent rules at different levels of the System Tree. These
rules can have different:
Recipients for the notification message. An administrator for a particular group might want to
be notified only if a specified number of virus detection events occur in the group. Or, an
administrator wants each group administrator to be notified if a specified number of virus detection
events occur in the whole System Tree.
Tags
Use tags to identify and sort systems. Tags and tag groups allow you to select groups of systems and
simplify the creation of tasks and queries.
Manually on selected systems, regardless of criteria, with the Apply Tag action.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, enter a name and meaningful description, then click Next. The Criteria page
appears.
3 Select and configure the criteria, then click Next. The Evaluation page appears.
4 Select whether systems are evaluated against the tag's criteria only when the Run Tag Criteria action
is taken, or also at each agent-server communication, then click Next. The Preview page appears.
These options are unavailable if criteria was not configured. When systems are evaluated against a
tag's criteria, the tag is applied to systems that match the criteria and have not been excluded from
the tag.
If the tag has criteria, this page displays the number of systems that receive this tag when
evaluated against its criteria.
The tag is added under the selected tag group in the Tag Tree on the Tag Catalog page.
Manage tags
Once tags are created using the New Tag Builder, use the Actions list to edit, delete, and move the
tags.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Tags list, select a tag or multiple tags, click Actions, then select an action.
Action Steps
Edit a tag From the Edit Tag Builder:
1 On the Description page, type a name and meaningful description, then
The number of
affected click Next.
systems is 2 Select and configure the criteria, then click Next.
listed at the top
of the page.
To apply the tag automatically, you must configure criteria for the tag.
3 Select whether systems are evaluated against the tag's criteria only
when the Run Tag Criteria action is taken, or also at each agent-server
communication, then click Next.
If the tag has criteria, this page displays the number of systems that
receive this tag when evaluated against its criteria.
The tag is updated on the Tag Catalog page under the selected tag group in
the Tag Tree.
Action Steps
Export a tag Click Export Table.
Move tags From the Move Tags dialog box, select the tag group where you wan the
tags to appear, then click OK.
You can also drag and drop the tags into the tag groups in the Tag Tree.
Task
For details about product features, usage, and best practices, click ? or Help.
Action Steps
Create a tag 1 In the Tag Tree, select the tag group (or parent tag group) where you want to
subgroup create the tag subgroup.
My Tags is the default top-level tag group added during McAfee ePO installation.
3 In the Name field, enter a descriptive name for the new tag subgroup.
Rename a tag 1 In the Tag Tree, select the tag subgroup that you want to rename.
subgroup
2 Click Tag Tree Actions | Rename Group to open the Rename Subgroup dialog box.
3 In the Name field, enter the new name for the tag subgroup.
Delete a tag 1 In the Tag Tree, select the tag subgroup that you want to delete.
subgroup
2 Click Actions | Delete. An Action: Delete confirmation dialog box appears.
3 If you are sure you want to delete the tag subgroup, click OK and the tag
subgroup is removed.
You can also use a query to collect systems, then exclude the tags from those systems from the query
results.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Systems, then select the group that contains the systems in the
System Tree.
2 Select one or more systems in the Systems table, then click Actions | Tag | Exclude Tag.
3 In the Exclude Tag dialog box, select the tag group, select the tag to exclude, then click OK.
To limit the list to specific tags, type the tag name in the text box under Tags.
4 Verify that the systems have been excluded from the tag:
a Select Menu | Systems | Tag Catalog, then select the tag or tag group from the list of tags.
b Next to Systems with tag, click the link for the number of systems excluded from the criteria-based
tag application. The Systems Excluded from the Tag page appears.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, name and describe the task, then click Next.
4 In the Query field, select one of these queries from the McAfee Groups tab, then click OK.
Inactive Agents
Unmanaged Systems
6 From the Sub-Actions list, select one of these subactions to take based on the results.
Apply Tag Applies a selected tag to the systems returned by the query.
Clear Tag Removes a selected tag on the systems returned by the query. Select Clear All to
remove all tags from the systems in the query results.
Exclude Tag Excludes systems from the query results if they have the selected tag applied to
them.
7 From the Select Tag window, select a tag group from the Tag Group Tree and optionally filter the list of
tags using the Tags text box.
You are not limited to selecting one action for the query results. Click the + button to add additional
actions. Be careful to place the actions in the order that you want them to occur. For example, you
can apply the Server tag, then remove the Workstation tag. You can also add other subactions, such
as assigning a policy to the systems.
8 Click Next.
The task is added to the list on the Server Tasks page. If the task is enabled (default), it runs at the
next scheduled occurrence. If the task is disabled, it only runs by clicking Run next to the task.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Systems, then select the group that contains the systems you
want.
3 In the Apply Tag dialog box, select the tag group, select the tag to apply, then click OK.
To limit the list to specific tags, type the tag name in the text box under Tags.
b Next to Systems with tag in the details pane, click the link for the number of systems tagged
manually. The Systems with Tag Applied Manually page appears.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree | Systems, then select the group that contains the systems you
want.
3 In the Clear Tag dialog box, perform one of these steps, then click OK.
Remove a specific tag Select the tag group, then select the tag.
To limit the list to specific tags, type the tag name in the text box under Tags.
b Next to Systems with tag in the details pane, click the link for the number of systems tagged
manually. The Systems with Tag Applied Manually page appears.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | Tag Catalog, then select a tag or tag group from the Tags list.
3 On the Action pane, select whether to reset manually tagged and excluded systems.
Resetting manually tagged and excluded systems removes the tag from systems that don't match
the criteria, and applies the tag to systems that match criteria but were excluded from receiving the
tag.
4 Click OK.
b Next to Systems with tag in the details pane, click the link for the number of systems with the
tag applied by criteria. The Systems with Tag Applied by Criteria page appears.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, name and describe the task and select whether the task is enabled once it
is created, then click Next. The Actions page appears.
3 Select Run Tag Criteria from the drop-down list, then select a tag from the Tag drop-down list.
Applies the tag to systems that match the criteria but were excluded from receiving the tag
6 Schedule the task for the times you want, then click Next.
The server task is added to the list on the Server Tasks page. If you selected to enable the task in the
Server Task Builder, it runs at the next scheduled time.
Each user account is associated with one or more permission sets, which define what the user is
allowed to do with the software.
Contents
Users
Authenticating with certificates
Permission sets
Users
User accounts allow you to control how people access and use McAfee ePO.
You can create user accounts manually, then assign each account an appropriate permission set. You
can also configure your McAfee ePO server to allow users to log on using Windows authentication, but
this requires configuration and set up of multiple settings and components.
While user accounts and permission sets are closely related, they are created and configured using
separate steps.
Best practice: Disable the logon status of an account instead of deleting it. You can delete the logon
status when you are sure that all valuable information associated with the account has been moved to
other users.
Task
For details about product features, usage, and best practices, click ? or Help.
Task Steps
Create a 1 Click New User.
user
2 Type a user name.
3 Select whether to enable or disable the logon status of this account. If this account
is for someone who is not yet a part of the organization, you might want to disable
it.
4 Select the authentication type that you want the new account to use, then provide
the required credentials, or browse to and select the certificate.
5 [Optional] Provide the user's full name, email address, phone number, and a
description.
6 Make the user an administrator, or select the appropriate permission sets for the
user.
7 Click Save to return to the Users tab.
The new user appears in the Users list.
Edit a user 1 From the Users list, select the user you want to edit, then click Action | Edit.
3 Click Save.
The user changes appear in the Users list.
Delete a 1 From the Users list, select the user you want to delete, then click Action | Delete.
user
2 When prompted, click OK.
The user disappears from the Users list.
User authentication
McAfee ePO users can be authenticated with McAfee ePO password authentication or Windows
authentication. If you use Windows authentication, you can specify whether users authenticate:
Against the domain that your McAfee ePO server is joined to (default).
If you use domain controllers, DNS-style domain names, or a WINS server, configure the Windows
authentication server setting.
The user account used to register the LDAP server with McAfee ePO is trusted through a bidirectional
transitive trust. Otherwise, it must physically exist on the domain that the LDAP server belongs to.
Windows authorization
The server setting for Windows authorization specifies which Active Directory (AD) server McAfee ePO
uses to gather user and group information for a particular domain. You can specify multiple domain
controllers and AD servers. This server setting supports the ability to dynamically assign permission
sets to users that supply Windows credentials at logon.
McAfee ePO can dynamically assign permission sets to Windows Authenticated users even if Active
Directory User Login is not enabled.
Assigning permissions
Assign at least one permission set to an AD group other than a user's Primary Group. Dynamically
assigning permission sets to a user's Primary Group is not supported, and results in application of only
those permissions manually assigned to the individual user. The default Primary Group is "Domain
Users."
An Active Directory server that contains information about this user has been registered with
McAfee ePO.
The user is a member of at least one Domain Local or Domain Global group that maps to a McAfee
ePO permission set.
It supports these features when retrieving group memberships for a Universal Group:
Direct membership lookup in a Universal Group
Indirect membership lookup through Global or Domain Local Groups, if that group resides in the
same domain as the Global Catalog being used to perform the lookup
Finally, it does not support indirect membership when that group resides on a different domain from
the Global Catalog being used to perform the lookup.
The software completes Authorization after you verify the user's credentials. You can apply permission
sets and determine what the user can do within the system. Windows authentication allows you to set
permission for users from different domains. Attach permission sets to groups contained within these
domains.
If the credentials for users are contained in a small set of domains or servers in a single domain
tree, register the root of the tree.
If your user accounts are more spread out, register a number of servers or domains. Determine the
minimum number of domain (or server) subtrees you need and register the roots of those trees.
Try to register them in the order of usage. Placing the most commonly used domains at the top of
the list improves average authentication performance.
Permission structure
For users to be able to log on to a McAfee ePO server using Windows authentication, attach a
permission set to the Active Directory group on the domain their account belongs to. When
determining how permission sets are assigned, consider the following capabilities:
Permission sets can be dynamically assigned only to an entire Active Directory group. They cannot
be assigned to just some users within a group.
If you want to assign special permissions to an individual user, you can do so by creating an Active
Directory group that contains only that user.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the server console, select Start | Settings | Control Panel | Administrative Tools
2 Select Services.
3 In the Services window, right-click McAfee ePolicy Orchestrator Applications Server and select Stop.
When you next open the Server Settings page, a Windows Authentication option appears.
Do you want to use a WINS server to look up which domain your users are authenticating against?
Users can authenticate using Windows credentials for the domain that the McAfee ePO server is joined
to. They can also authenticate to any domain that has a two-way trust relationship with the McAfee
ePO server's domain. If you have users in domains that don't meet that criteria, configure Windows
authentication.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, then select Windows Authentication from the Settings Categories list.
2 Click Edit.
3 Specify whether you want to use one or more domains, one or more domain controllers, or a WINS
server.
Domains must be provided in DNS format. (for example, internaldomain.com) Domain controllers
and WINS servers must have fully-qualified domain names. (for example, dc.internaldomain
.com)
You can specify multiple domains or domain controllers, but only one WINS server. Click + to add
more domains or domain controllers to the list.
If you specify domains or domain controllers, the McAfee ePO server attempts to authenticate users
with servers in the order they are listed. It starts at the first server in the list and continues down the
list until the user authenticates successfully.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Either choose an existing permission set from the Permission Sets list and click Edit in the Name and users
section, or click New Permission Set.
5 In the LDAP browser, navigate through the groups and select the groups to which this permission
set applies.
Selecting an item in the Browse pane displays the members of that item in the Groups pane. You can
select any number of those groups to receive the permission set dynamically. Only members from
one item at a time can be added. To add more, repeat steps 4 and 5 until you are finished.
6 Click Save.
The permission set is applied to all users from the groups you specified by logging on to the server
using Windows authentication.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Login Message from the Settling Categories, then click Edit.
2 Select Display custom login message, then type your message and click Save.
If your network requires more security, you can restrict user sessions to a single IP address. Doing so
forces users to resubmit their credentials every time their IP address changes, such as when they take
their laptop to a different location.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select User Session from the Settings Categories, then click Edit.
3 Click Save.
Any time a user changes IP addresses, they must re-enter their credentials to access the McAfee ePO
console.
Action The name of the action the McAfee ePO user tried.
User Name User name of the logged-on user account that was used to take the action.
Audit Log information appears in the language of the Enterprise Administrator locale.
Audit Log entries can be queried against. You can create queries with the Query Builder that target
this data, or you can use the default queries that target this data. For example, the Failed Logon
Attempts query retrieves a table of all failed logon attempts.
Task
For details about product features, usage, and best practices, click ? or Help.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click Purge.
3 In the Purge dialog box, enter a number, then select a time unit.
4 Click OK.
Any items of the specified age or older are deleted, including items not in the current view. The
number of removed items is displayed in the lower right corner of the page.
Certificates have predefined expiration dates, which force the review of user permissions.
For users configured with valid certificates, certificate-based authentication replaces password
authentication. All other users continue to use passwords to access McAfee ePO.
Before your organization can use certificate-based authentication, install the CA certificate on McAfee
ePO and a signed client certificate on your endpoints.
Task
For details about product features, usage, and best practices, click ? or Help.
b From the Setting Categories list, select Certificate-based Authentication, and click Edit.
3 Next to CA certificate for client certificate, click Browse, navigate to and select the certificate file, then click
OK.
When a file is applied, the prompt changes to Replace current CA certificate.
Replace the certificate when it expires, or if your organization's security requirements change. For
example, your organization might require SHA-256 certificates for authentication.
3 (Optional) Select Enable CRL Distribution Point checks when the McAfee ePO server receives no response from
OCSP.
If the connection to the default OCSP URL fails, McAfee ePO tries to connect to the
certification authority CRL mentioned within the certificate under CRL Distribution Point
Check instead.
4 (Optional) Select Make the default OCSP URL the primary OCSP URL.
If that connection fails, McAfee ePO falls back to the other OCSP responder, if mentioned in
the certificate under Authority Information Access.
To require certificate-based authentication for all remote users,, click Remote users use the certificate to
sign in.
To make the user name the same as the subject Distinguished Name (DN) specified in the
certificate, click Default certificate user name is the subject DN.
For these settings to work, you must have Active Directory user logon enabled and the user
group added to a permission set.
To automatically assign Active Directory users to a permission set, select Automatically assign
permission for user logon with an Active Directory certificate.
To automatically create an McAfee ePO user account for anyone who accesses McAfee ePO
with the valid AD certificate, select Automatically create user for Active Directory certificate owners.
6 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
b From the Setting Categories list, select Certificate-based Authentication, and click Edit.
Once you disable certificate-based authentication, your users can no longer access McAfee ePO with a
certificate, and must log on with their user name and password instead. Your previous configuration
settings are reset.
Restart the server to complete the configuration change.
Task
For details about product features, usage, and best practices, click ? or Help.
b From the Users list, select a user, then click Actions | Edit.
Upload the signed certificate file: click Browse to navigate to and select the certificate file, then
click OK.
This certificate file was uploaded in the procedure, Configure MFS certificate-based
authentication.
User certificates can be in PEM or DER format. The actual certificate format does not matter as long
as the format is X.509 or PKCS12 compliant.
The certificate information is verified. A warning appears if the certificate is invalid. If the certificate is
vaild, the McAfee ePO logon page appears. The user can choose a language and click Log On without
entering a user name and password.
The CRL file is a list of revoked McAfee ePO users and their digital certificate status. The list includes
the revoked certificates, the reasons for revocation, dates of certificate issue, and the issuing entity.
When a user tries to access the McAfee ePO server, the CRL file is checked and it allows or denies
access for that user.
Task
For details about product features, usage, and best practices, click ? or Help.
3 To update the CRL file, next to Certificate revocation list file, click Choose File, navigate to the CRL file, then
click OK.
McAfee ePO checks the updated CRL file to confirm that the client certificate has not been revoked
every time a user tries to access the McAfee ePO.
You can also use the cURL command line to update the CRL file.
To run cURL commands from the command line, install the cURL and grant remote access to the McAfee
ePO server. See the McAfee ePolicy Orchestrator Web API Scripting Guide for cURL download details and
other examples.
In this command:
<admin_cert> Administrator client certificate .PEM file name
Verify that the certificate is signed with the correct certificate authority.
Permission sets
Permission sets control the level of access users have to the features available in the software.
To create a more secure environment, specify and control the access users have to different parts of
the system for even the smallest installations.
Contents
How users, groups, and permission sets fit together
Manage permission sets
A user account grants log on access to the McAfee ePO console and when mapped with a permission
set, it defines what the user is allowed to access. Administrators can create accounts for individual
users and assign permissions, or they can create a permission set that maps to users or groups in
your Active Directory/NT server.
McAfee ePO users fall into two general categories. Either they are administrators, having full rights
throughout the system, or they are regular users. Regular users can be assigned any number of
permission sets to define their access levels in McAfee ePO.
Administrators
Administrators have read and write permissions and rights to all operations. When you install the
server, an administrator account is created automatically. By default, the user name for this account is
admin. If the default value is changed during installation, this account is named accordingly.
You can create additional administrator accounts for people who require administrator rights.
Import events into McAfee ePO databases and limit events that are stored there.
Users
Users can be assigned any number of permission sets to define their access levels in McAfee ePO.
User accounts can be created and managed in several ways. You can:
Create user accounts manually, then assign each account an appropriate permission set.
Configure your McAfee ePO server to allow users to log on using Windows authentication.
Allowing users to log on using their Windows credentials is an advanced feature that requires
configuration and setup of multiple settings and components.
Groups
Queries and reports are assigned to groups. Each group can be private (to that user only), globally
public (or "shared"), or shared to one or more permission sets.
Permission sets
A particular access profile is defined in a permission set. This profile usually involves a combination of
access levels to various parts of McAfee ePO. For example, one permission set might grant the ability
to read the Audit Log, use public and shared dashboards, and create and edit public reports or
queries.
Permission sets can be assigned to individual users, or if you are using Active Directory, to all users
from specific Active Directory servers.
Executive Reviewer Provides view permissions to dashboards, events, contacts, and can view
information that relates to the whole System Tree.
Global Reviewer Provides view access globally across functionality, products, and the System
Tree, except for extensions, multi-server roll up data, registered servers, and software.
Global Admin Provides view and change permissions across McAfee ePO features. Users that are
assigned this permission set each need at least one more permission set that grants access needed
products and groups of the System Tree.
Group Reviewer Provides view permissions across McAfee ePO features. Users that are assigned
this permission set each need at least one more permission set that grants access needed products
and groups of the System Tree.
A user group administrator or the global administrator can edit the canned permission sets as
required.
An edited canned permission set for the product is retained with the default canned permission set.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Permission Sets page: select Menu | User Management | Permission Sets.
Action Steps
Add a 1 Click New Permission Set.
permission set
2 Type a unique name for the new permission set.
3 To immediately assign specific users to this permission set, select their user
names in the Users section.
4 To map any Active Directory groups to this permission set, select the server
from the Server Name list, then click Add.
5 If you added any Active Directory servers that you want to remove, select them
in the Active Directory list box, then click Remove.
6 Click Save to create the permission set.
Edit a 1 Select a permission set to change. Its details appear to the right.
permission set
If you created a permission set, it is already selected for you.
2 Select a category of permissions to change by clicking Edit in that category row.
Copy a 1 From the Permission Sets list, select a permission set to duplicate, then click
permission set Actions | Duplicate.
2 Type a new name for the duplicate permission set. By default, the software
appends (copy) to the existing name.
3 Click OK.
Delete a 1 Select the permission set that you want to delete From the Permission Sets list,
permission set select the permission set that you want to delete. Its details appear to the
right.
2 Click Actions | Delete, then click OK.
Action Steps
Export Click Export All.
permission The McAfee ePO server sends an XML file to your browser. What happens next
sets depends on your browser settings. Most browsers ask you to save the file.
The XML file contains only roles with a defined level of permissions. If, for
example, a Permission Set has no permissions for queries and reports, no entry
appears in the file.
Use the Software Manager to review and acquire McAfee software and software components.
Contents
What's in the Software Manager
Check in, update, and remove software using the Software Manager
Checking product compatibility
Evaluation software is software for which your organization does not currently possess a license. You
can install evaluation software on your server, but functionality might be restricted until you
acquire a product license.
Software updates are a new update for the released software you are using. You can use the Software
Manager to check in new packages and extensions. Available software updates are listed in the
Updates Available category.
Product documentation is new and updated product documentation you can obtain from the Software
Manager. Help extensions can be installed automatically. PDF and HTML documentation such as
Product Guides and Release Notes can also be downloaded from the Software Manager.
DATs and Engines are not available from the Software Manager.
Option Definition
Product Categories This is where you search for or select products to
view or manipulate in the selected product tables.
Selected product tables, separated into three parts:
List of products and their status Select a product in this list and details and
manipulation features appear in the details and
component rows.
Product details row Lists a product description, its status, allows a
language filter, and provides these actions:
Check In All Checks in all new versions and components of the
selected product.
Update All Updates all existing versions and components of the
selected product to the latest version.
Remove All Removes all versions and components of the selected
product.
Component rows Displays all components of the selected product and,
depending on the component, allows you to check in,
update, remove, or download the individual
component.
Software availability, and whether it is in the Licensed or Evaluation category, depends on your license key.
For more information, contact your administrator.
For details about product features, usage, and best practices, click ? or Help.
Task
1 Click Menu | Software | Software Manager.
2 In the Software Manager page Product Categories list, select one of the following categories, or use the
search box to find your software:
Updates Available Lists any available updates to licensed software components already installed
or checked in to the McAfee ePO server.
Checked in Software Displays all software (both Licensed and Evaluation) installed or checked in to
this server.
If you recently added the license for a product and it appears as Evaluation, click Refresh to update
the Licensed count and display the product as Licensed under Checked In Software.
Software Not Checked in Displays any software that is available, but not installed on this server.
Software (by Label) Displays software by function as described by McAfee product suites.
3 When you have located the correct software, select an action that applies to all the components in
the software, or individual components.:
For all the components in the software, click:
Check In All to check in all components of the new product on this server.
Update All to update all components of the existing product on this server.
Remove All to remove all components of the existing product on this server.
4 In the Check In Software Summary page, review and accept the product details and End User License
Agreement (EULA), then click OK to complete the operation.
McAfee ePO performs this check any time the installation and startup of an extension might leave your
server in an undesirable state. The check occurs:
During an upgrade from a previous version of McAfee ePO
An initial list is included in the McAfee ePO software package from the McAfee website. When you run
setup during installation or upgrade, McAfee ePO automatically retrieves the most current list of
compatible extensions from a trusted McAfee source. If the Internet source is unavailable or if the list
can't be verified, McAfee ePO uses the latest version it has available.
The McAfee ePO server updates the Product Compatibility List in the background once per day.
Remediation
When you view the list of incompatible extensions through the installer or the Upgrade Compatibility
Utility, you are notified if a known replacement extension is available.
An extension is disabled, but you must update it after the McAfee ePO upgrade is complete.
When the Software Manager content is refreshed (helpful when your McAfee ePO server does not
have inbound Internet access).
When you re-enable the download setting for the Product Compatibility List (also re-enables
Software Manager automatic updates of the Product Compatibility List).
When using Server Settings | Product Compatibility List to manually upload a Product Compatibility List.
This list takes effect immediately after upload.
Best practice: Disable automatic updating of the list to prevent overwriting the manually
downloaded Product Compatibility List.
Command Description
setup.exe DISABLEPRODCOMPATUPDATE=1 Disables automatic downloading of the
Product Compatibility List from the
McAfee website.
setup.exe Specifies an alternate Product
PRODCOMPATXML=<full_filename_including_path> Compatibility List file.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Product Compatibility List from the Setting Categories, then
click Edit.
A list of disabled incompatible extensions appears.
2 Click Disabled to stop automatic and regular downloads of the Product Compatibility List from
McAfee.
3 Click Browse and navigate to the Upload Product Compatibility List, then click Save.
Automatic downloading of the Product Compatibility List is disabled. Your McAfee server uses the same
list until you upload a new list, or connect your server to the Internet and enable automatic
downloading.
When you want to roll out new products outside of your normally scheduled tasks, you can check them
in manually.
Contents
Bring products under management
Check in packages manually
Delete DAT or engine packages from the Master Repository
Move DAT and engine packages between branches
Check in Engine, DAT, and Extra.DAT update packages manually
Best practice: Automating DAT file testing
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the McAfee ePO console, select Menu | Software | Extensions | Install Extension.
You can only have one task updating the Master Repository at once. If you try to install an
extension at the same time as a Master Repository update is running, the following error appears:
Wait until the Master Repository update is done and try to install your extension again.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select the package type, then browse to and select the package file.
3 Click Next.
Branch Select the branch. If there are requirements in your environment to test new packages
before deploying them throughout the production environment, use the Evaluation branch
whenever checking in packages. Once you finish testing the packages, you can move them to
the Current branch by selecting Menu | Software | Master Repository.
5 Click Save to begin checking in the package, then wait while the package is checked in.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
If you have McAfee NetShield for NetWare in your network, select Support NetShield for NetWare.
5 Click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select the package type, browse to and select a package file, then click Next.
3 Select a branch:
Current Use the packages without testing them first.
Once you finish testing the packages, you can move them to the Current branch by selecting Menu
| Software | Master Repository.
4 Next to Options, select Move the existing package to the Previous branch to archive the existing package.
5 Click Save to begin checking in the package. Wait while the package is checked in.
The compatibility validation processes vary by organization. The process in this section is meant to
automate much of the compatibility validation process and reduce the need for administrator
intervention.
Best practice: To confirm that only compatible DAT files are distributed in your environment, you might
chose move the content manually from the Evaluation branch into the Current branch of the repository.
A server task pulls DAT updates from the McAfee public site to the Evaluation branch of the
Master Repository.
A McAfee Agent policy applies the DAT files from the Evaluation repository branch restricted to a
group of systems in a Test group.
A McAfee Agent update client task installs the DAT on the Test group systems.
If the DAT is not compatible with the test group, an Automatic Response email is sent to the
appropriate administrators. The email tells the administrators to stop distribution of the DAT files
from the Current repository.
Otherwise, after a specified time, a server task copies the files from the Evaluation branch to the
Current branch of the repository. Then those files are automatically sent to the rest of the
managed systems.
Evaluation branch Used to test new DAT and engine updates before deploying to your whole
organization.
Previous branch Used to save and store prior DAT and engine files before adding the new ones to
the Current branch.
You must create two server tasks to automate the DAT file testing.
One task pulls the DAT files hourly to the Evaluation branch to ensure that the latest DAT is in the
Evaluation branch shortly after McAfee releases it to the public.
Best practice: Run the task hourly to get an extra DAT file in case the initial file, released at 11:00
a.m., was replaced later in the day.
One server task waits until a few hours after the test group of systems is scanned. Then, unless
the administrator stops the server task, it automatically copies the DAT files from the Evaluation
branch to the Current branch.
Tasks
Best practices: Configure task to pull DAT to Evaluation branch on page 167
To automate your DAT file testing process, you must create a task to automatically pull DAT
files from the McAfee public site into the Evaluation repository branch.
Best practices: Configure server task to copy files from Evaluation to Current branch on
page 168
To automate your DAT file testing process, create a task to automatically copy DAT files
from the Evaluation branch of the repository to the Current branch.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, then click Actions | New Task to display the Server Task Builder wizard.
2 In the Description tab, type a server task name, for example, DAT pull hourly to Evaluation
repository, and a description to appear on the Server Task page.
From the Source site list, select the McAfee public site you want to use, McAfeeFtp or McAfeeHttp.
5 From the Available Source Site Packages dialog box, select DAT and Engine, then click OK.
We recommend that, at minimum, you pull the DAT and engine files from the McAfee public
website.
If you have multiple distributed repositories, you can chain a replication task to the same pull task
to replicate your Evaluation branch to your distributed repositories.
From Schedule, configure the task to run every hour at 10 minutes past the hour.
7 Click Next, confirm that all settings are correct in the Summary tab, then click Save.
To confirm that the automatic DAT file pull is working, go to Menu | Software | Master Repository and use the
Check-In date information to confirm that the Evaluation branch DAT file was updated within the last
two hours.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, then click Actions | New Task.
2 In the Server Task Builder Descriptions tab, type a task name and notes, then in Schedule status, click
Enabled, then click Next.
Click + to create another action, and from the second Actions list, select Change the Branch for a
Package, select All packages of type 'Engine' in branch 'Evaluation' as the package to change, Copy as the
action, and Current as the target branch.
Change the Schedule settings to configure the task to run at 4:00 or 5:00 p.m.
Historically, McAfee releases DAT files only once a day, at about 3:00 p.m. Eastern Time (19:00
UTC or GMT). In the rare case that a second DAT file is released later in the day, it requires an
administrator to disable the copy task to your Current Branch.
Click Next, confirm that all settings are correct in the Summary tab, then click Save.
To confirm that the DAT file copy from the Evaluation branch to the Current branch is working, go to
Menu | Software | Master Repository and use the Check-In date information to confirm that the Evaluation
branch DAT file was copied to the Current branch at the time configured in the schedule.
See also
Best practices: Configure task to pull DAT to Evaluation branch on page 167
Use 2030 systems for validation for organizations with less than 10,000 nodes. For larger
organizations, include at least 50 types of systems.
You can use VMware images that replicate your operating system builds. Make sure that these
systems are in a "clean" state to ensure that no malware has been introduced.
Use Tags to apply policies and tasks to individual systems that are scattered throughout your
System Tree. Tagging these systems has the same effect as creating an isolated test group, but
allows you to keep your systems in their current groups.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To create a System Tree group, select Menu | Systems Section | System Tree.
2 From the System Tree group list, select where you want to add your new group, then click System
Tree Actions | New Subgroups, and in the New Subgroups dialog box, type a name, for example DAT
Validation, then click OK.
3 To add systems to your test group, you can drag systems from other groups to your newly created
subgroup, add new systems, or add virtual machine systems.
You created a test group as an isolated group of systems. This test group allows you to test new DAT
and engine updates before you deploy the updates to all other systems in your organization.
Task
For details about product features, usage, and best practices, click ? or Help.
1 In the System Tree, select Menu | Systems Section | System Tree, then click the test group that you created.
2 To duplicate the existing policy, click the Assigned Policies tab, select McAfee Agent from the Product list,
then in the Category list in the General policy row, click My Default.
3 On the My Default page, click Duplicate, and in the Duplicate Existing Policy dialog box, type the name, for
example Update from Evaluation, add any notes, then click OK.
This step adds a policy, Update from Evaluation, to the Policy Catalog.
4 Click the Updates tab to change the repository used by this policy.
5 In the Repository branch to use for each update type, click the DAT and Engine list down-arrows,
then change the listed repositories to Evaluation.
6 Click Save.
Now you have created a McAfee Agent policy to use with an update task that automatically copies the
DAT and content files to the systems in your test group from the Evaluation repository.
This configuration assumes that you are not using user systems as your test systems. If you are using
actual user systems, you might need to change some of these scan configurations.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To create a new on-demand scan task, select Menu | Policy | Client Task Catalog, then from the Client Task
Catalog page in the Client Task Types list, expand VirusScan Enterprise and click On Demand Scan.
2 In the Client Task Catalog page, click New Task, and in the New Task dialog box, confirm that On
Demand Scan is selected and click OK.
3 On the Client Task Catalog: New Task page, type a name, for example, Evaluation test group ODS
task, and add a detailed description.
Running Processes
Windows folder
b For the Scan options, select Include subfolders and Scan boot sectors.
c For Heuristics, select Find unknown program threats and Find unknown macro threats.
b For When an unwanted program is found, configure Clean files, then Delete files.
7 Click the Performance tab and configure System utilization as Low and Artemis as Very Low.
b For User account to use when running task, set your credentials and select the test group domain.
9 Click Save.
Now the on-demand scan task is configured to scan for any problems that might occur in your test
group. Next configure a client task to schedule when to launch the task.
See also
Best practice: Create a test group of systems on page 169
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Client Task Catalog page, select VirusScan Enterprise and On Demand Scan in Client Task Types.
3 Find the on-demand scan you created, click Assign in the Actions column, select the test group of
systems that you created to assign the task, then click OK.
4 In the Client task Assignment Builder, configure these settings, then click Next:
a For Product list, select VirusScan Enterprise.
c For Task Name list, select the ODS task you created.
c For Effective period, select today's date as the Start date, then select No end date.
Click Run at that time, and then repeat until, then select 2:00 PM from the time lists.
For During repeat, start task every, select 5 minute(s) from the lists.
e For Task runs according to, click Local time on managed systems.
Your on-demand scan task is now scheduled to run every 5 minutes, from 9:05 a.m. until 2:00 p.m.,
after each agent policy update, from the Evaluation repository to the test group.
See also
Best practice: Create a test group of systems on page 169
Best practice: Configure an on-demand scan of the test group on page 170
Task
For details about product features, usage, and best practices, click ? or Help.
1 To display the Response Builder, select Menu | Automation | Automatic Responses, click New Response, then
configure these settings in the Descriptions tab, then click Next.
a Type a name, for example Malware found in test group, and a detailed description
c For Event Group, select ePO Notification Events from the list.
b In the Required Criteria column and the Defined at row, click ... to select the test group of systems
that you created in the Select System Tree Group dialog box, then click OK.
c In the Threat Category row, select Belongs to from the Comparison list and Malware from the Value
list. Click + to add another category.
d Select Belongs to from the Comparison list and Access Protection from the Value list.
d For Subject, type an email header, for example Malware found in the Test Group!
e For Body, type a message, for example Research this NOW and stop the server task that
pulls content into the Current branch!
f Following the message body, insert these variables to add to the message, and click Insert:
OS Platform
Threat Severity
Threat Type
5 Click Next, confirm that the configuration is correct in the Summary tab, then click Save.
Now you have an Automatic Response configured that sends an email to an administrator any time
malware is detected in the test group running the Evaluation DAT file.
McAfee ePO simplifies the process of deploying security products to the managed systems in your
network by providing a user interface to configure and schedule deployments.
There are two processes you can follow to deploy products using McAfee ePO:
Product Deployment projects, which streamline the deployment process and provide more
functionality.
Contents
Product deployment steps
Choosing a product deployment method
Benefits of product deployment projects
The Product Deployment page
Viewing Product Deployment audit logs
View product deployment
Deploy products using a deployment project
Monitor and edit deployment projects
Deploy new product example
Global updating
Deploy update packages automatically with global updating
Use the Software Manager to automatically review and update McAfee software and software
components.
From the Master Repository, you can manually check in deployment packages then use Product
Deployment or client tasks to deploy them to your managed systems.
The Product Deployment feature offers a simplified workflow and increased functionality to
deploy products to your McAfee ePO managed systems.
Create client tasks to manually assign and schedule product deployments to groups or individual
managed system.
Product deployment is the output process that keeps your security software as current as
possible to protect your managed systems.
See also
Check in, update, and remove software using the Software Manager on page 158
Check in packages manually on page 163
Create client tasks on page 225
Deploy products using a deployment project on page 181
To maintain and use client tasks and objects created outside of a Product Deployment project, use the
client task object library and assignment interfaces. You can maintain existing tasks and object while
using the Product Deployment project interface to create new deployments.
Run a deployment continuously You can configure your deployment project so that when new
systems matching your criteria are added, products are deployed automatically.
Stop a running deployment If you must stop a deployment once it's started, you can. Then
you can resume that deployment when you're ready.
Uninstall a previously deployed product If a deployment project has been completed, and
you want to uninstall the associated product from the systems assigned to your project, select
Uninstall from the Action list.
The following table compares the two processes for deploying products individual client task objects
and product deployment projects.
Deployment summary Lists the product deployments and allows you to filter them by type
and status and quickly view their progress. If you click a deployment, details about the
deployment are displayed in the deployment details area.
Deployment details Lists the details of the selected deployment and includes the following
areas.
Status monitor Displays the progress and status depending on the type of deployment and its
status:
Continuous deployments display a calendar if the deployment is pending, or a bar chart during
the deployment.
Fixed deployments display a calendar if the deployment is pending, a bar chart if Current is
selected, or a histogram if Duration is selected.
You can use Action to change a deployment.
Details Allows you to view deployment configuration details, status, and if needed, click View
Task Details to open the Edit Deployment page.
System name Displays a filterable list of target systems receiving the deployment. The systems
are displayed according to the deployment type and whether the systems were selected
individually, as tags, as System Tree groups, or query output tables.
Clicking System Actions displays the filtered list of systems in a dialog box with more detail and
allows you to perform actions on the systems, such as update and wake-up.
Status Displays a three-section bar indicating the progress of the deployment and its status.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Find the initially created product deployment: select Menu | Product Deployment.
The initially created product deployment uses the name of the System Tree group you configured in
the Getting Started dashboard process and appears in the Deployment summary list with the name
Initial Deployment My Group.
2 To view the product deployment details, select the name of the product deployment assigned to the
initial product deployment URL that you created. The page changes to display details of the product
deployment configuration.
Don't change this default product deployment. This deployment is running daily to update your
managed systems if any products or the McAfee Agent are updated.
Now you know the location and configuration of the initially created product deployment. You can
duplicate this product deployment, for example, to deploy the McAfee Agent to platforms using
different operating systems.
You can also change the initially created client task named, for example Initial Deployment My Group. To
find the client task, select Menu | Client Task Catalog; it is listed in the Client task Types under Product
Deployment.
Expired products appear in the Packages list. You can uninstall them from target systems in Actions.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Type a name and description for this deployment. This name appears on the Product Deployment
page after you save the deployment.
Fixed Uses a fixed (defined) set of systems to receive the deployment. System selection is
done using your System Tree or the output of Managed Systems Queries.
5 To automatically update your products, make sure that the Auto Update checkbox is selected.
If the checkbox is deselected, products are still updated with the latest patches, hotfixes, and
content packages, but major and minor releases are ignored.
During a new deployment, the McAfee Agent checks for new updates, hotfixes, and content
packages of all installed products on the client. See the McAfee Agent documentation for details.
6 To specify which software to deploy or uninstall, select a product from the Package list. Click + or - to
add or remove packages.
Your software must be checked in to the Master Repository before it can be deployed. The Language
and Branch fields are populated automatically, as determined by the location and language specified
in the Master Repository.
8 In the Command line text field, specify any command-line installation options. For information about
command-line options, see the product documentation for the software you're deploying.
Tags Select tag groups or tag subgroups and their associated systems.
Selected Systems Displays the total selections you made in each tab, creating the target systems
for your deployment.
For example, if your System Tree contains Group A, which includes both servers and workstations,
you can target the entire group. You can also target only the servers or only the workstations (if
they are tagged correctly), or a subset of either system type in Group A.
For a fixed deployment, the maximum number of systems that can receive the deployment is 500.
Once or Daily Opens the scheduler so you can configure the start date, time, and
randomization.
11 Click Save at the top of the page. The Product Deployment page opens with your new project added
to the list of deployments.
After you create a deployment project, a client task is automatically created with the deployment
settings.
Task
For details about product features, usage, and best practices, click ? or Help.
Status Filters the deployments that appear by All, Finished, In Progress, Pending, Running, or
Stopped.
3 From the list on the left side of the page, click a deployment to display its details on the right side
of the page.
If a package in this deployment expires, the deployment is invalid. If you mouse-over the
deployment, you see this message: "Package(s) in this deployment have been moved, deleted, or
expired."
Histogram displaying systems and the time to completion for fixed deployments.
Under the status bar, Task Status lists Successful, Failed, and Pending for the number of target
systems in parentheses.
Delete Stop
Duplicate Uninstall
Mark Finished
6 In the details section, click View Task Details to view and modify the settings for the deployment.
7 In the Systems table, select an option in the Filter list to change which systems appear.
For the Uninstall action, the filters include All, Packages Removed, Pending, and Failed.
For all other actions, the filters include All, Install Successful, Pending, and Failed.
Check the tags associated with the target systems in the Tags column.
Click System Actions to perform system-specific actions on the systems you select.
Task
For details about product features, usage, and best practices, click ? or Help.
Option Description
Name and Type a name and description for this deployment.
Description
This name appears on the Deployment page after the deployment is saved.
Select a start time Pick a start time or schedule for your deployment:
Run Immediately Starts the deployment task after the next ASCI.
Once Opens the scheduler so that you can configure the start date, time, and
randomization.
Save When finished, click Save at the top of the page. The Product Deployment page
opens with your new project added to the list of deployments.
After you create a deployment project, a client task is automatically created with the deployment
settings.
3 On the Product Deployment page, confirm that the product deployment project is correctly working
by checking this information.
Option Description
Deployment Click the product deployment project that you created in the previous step. The
summary details appear on the right side of the page.
Global updating
Global updating automates replication to your distributed repositories and keeps your managed
systems current.
Replication and update tasks are not required. Checking contents into your Master Repository initiates
a global update. The entire process finishes within an hour in most environments.
You can also specify which packages and updates initiate a global update. When you specify that
certain content initiates a global update, make sure to create a replication task to distribute content
that was not selected.
Best practice: When using global updating, schedule a regular pull task (to update the Master
Repository) at a time when network traffic is minimal. Although global updating is much faster than
other methods, it increases network traffic during the update.
3 The server issues a SuperAgent wake-up call to all SuperAgent in the environment.
4 The SuperAgent broadcasts a global update message to all agents within the SuperAgent subnet.
5 Upon receipt of the broadcast, the agent is supplied with a minimum catalog version needed for
updating.
6 The agent searches the distributed repositories for a site that has this minimum catalog version.
7 Once a suitable repository is found, the agent runs the update task.
If the agent does not receive the broadcast, the minimum catalog version is supplied at the next
agent-server communication.
If the agent receives notification from a SuperAgent, the agent is supplied with the list of updated
packages. If the agent finds the new catalog version at the next agent-server communication, it is not
supplied with the list of packages to update, and updates all packages available.
Requirements
These requirements must be met to implement global updating:
A SuperAgent must use the same agent-server secure communication (ASSC) key as the agents
that receive its wake-up call.
Distributed repositories are set up and configured throughout your environment. We recommend
SuperAgent repositories, but they are not required. Global updating functions with all types of
distributed repositories.
If using SuperAgent repositories, managed systems must be able to access the repository where its
updates come from. Although a SuperAgent is required on each broadcast segment for systems to
receive the wake-up call, SuperAgent repositories are not required on each broadcast segment.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Click Menu | Configuration | Server Settings, select Global Updating, then click Edit at the bottom of the page.
Global updating initiates an update only if new packages for the components specified here are
checked in to the Master Repository or moved to another branch. Select these components
carefully.
Signatures and engines Select Host Intrusion Prevention Content, if needed.
Selecting a package type determines what initiates a global update (not what is updated during the
global update process). Agents receive a list of updated packages during the global update process.
The agents use this list to install only updates that are needed. For example, agents only update
packages that have changed since the last update and not all packages if they have not changed.
Make sure to run a Pull Now task and schedule a recurring Repository Pull server task, when you are
ready for the automatic updating to begin.
Policies ensure that product features are configured correctly on managed systems.
Contents
About policies
Policy assignment rules
Create and manage policies
Move and share policies between McAfee ePO servers
Create and manage policy assignment rules
Policy management users
Assign policies to managed systems
Copy and paste policy assignments
View policy information
About policies
A policy is a collection of settings that you create and configure, then enforce.
Policies are organized by product, then by categories within each product. For example, the McAfee
Agent product includes categories for General, Repository, and Troubleshooting.
To see policies in a specific policy category, select Menu | Policy | Policy Catalog, then select a product and
category from the drop-down lists. On the Policy Catalog page, users can see only policies for products
they have permissions to.
Each category includes two default policies, McAfee Default and My Default. You can't delete, edit, export,
or rename these policies, but you can copy them and edit the copy.
After policy settings are in effect on the managed system, the McAfee Agent continues to enforce
policy settings according to the policy enforcement interval. By default, the policy enforcement occurs
every 60 minutes. You can adjust this interval on the General tab as well.
Inheritance determines whether the policy settings and client tasks for a group or system are taken
from its parent. By default, inheritance is enabled throughout the System Tree.
When you copy and paste policy assignments, only true assignments are pasted. If the source location
inherited a policy that you selected to copy, it is the inheritance characteristic that was pasted to the
target. The target then inherits the policy (for that particular policy category) from its parent.
The inherited policy might be a different policy than the source policy.
Assignment locking
You can lock the assignment of a policy on any group or system. Assignment locking prevents other
users from inadvertently replacing a policy. Assignment locking is inherited with the policy settings.
Assignment locking is valuable when you want to assign a certain policy at the top of the System Tree
and make sure that no other users move it.
Assignment locking does not prevent the policy owner from changing policy settings. Therefore, if you
intend to lock a policy assignment, make sure that you are the owner of the policy.
Policy ownership
Each policy is assigned an owner the user who created it. You must have the correct permissions to
edit a policy you don't own.
If you want to use a policy owned by a different user, we recommend that you duplicate the policy,
then use the duplicate. Duplicating policies prevents unexpected policy changes from affecting your
network. If you assign a policy that you don't own, and the owner modifies the policy, all systems that
were assigned the policy receive the modifications.
User-based policies Policies that include at least one user-specific criteria. For example, you can
create a policy assignment rule that is enforced for all users in your engineering group. You can
then create another policy assignment rule for members of your IT department. This rule allows
them to log on to any computer in the engineering network with the access rights to troubleshoot
problems on a specific system in that network. User-based policies can also include system-based
criteria.
System-based policies Policies that include only system-based criteria. For example, you can
create a policy assignment rule that is enforced for all servers on your network based on the tags
you have applied, or all systems in a specific location in your System Tree. System-based policies
cannot include user-based criteria.
When multi-slot policies are aggregated, they are aggregated only with multi-slot policies of the same
type. However, multi-slot policies assigned using policy assignment rules are not aggregated with
multi-slot policies assigned in the System Tree. Multi-slot policies assigned using policy assignment
rules override policies assigned in the System Tree. Furthermore, user-based policies take priority over
system-based policies.
When a user logs on to a managed system for the first time, there can be a slight delay while the
McAfee Agent contacts its assigned server for the policy assignments specific to this user. During this
time, the user has access only to that functionality allowed by the default computer policy, which
typically is your most secure policy.
On a managed system, the agent keeps a record of the users who log on to the network. The policy
assignments you create for each user are pushed down to the system they log on to, and are cached
during each agent-server communication. The McAfee ePO server applies the policies that you
assigned to each user.
To use user-based policy assignments, register and configure a registered LDAP server for use with your
McAfee ePO server.
All policy assignment rules require that System Tree location is specified. Tag-based policiy
assignments are useful when you want all systems of a particular type to have the same security
policy, regardless of their System Tree location.
Once the tag is created, you can use the Run Tag Criteria action from the Tag Catalog page to assign the
new policy. As each system with the new tag calls in at its regular interval, it is assigned a new policy
based on your isSuperAgent Policy Assignment Rule.
Tasks
Create a policy from the Policy Catalog page on page 193
Custom policies created using the Policy Catalog are not assigned to any groups or
systems. You can create policies before or after a product is deployed.
Enforcing product policies on page 194
Policy enforcement is enabled by default, and is inherited in the System Tree, but you can
manually enable or disable enforcement on specified systems.
Enforce policies for a product in a System Tree group on page 194
Enable or disable policy enforcement in a group.
Enforce policies for a product on a system on page 194
Enable or disable policy enforcement on a managed system.
Manage policy history on page 195
You can view and compare policy history entries, or revert to a previous version of a policy.
Edit policy history permission sets on page 196
Configure the permission sets for your products so that users can revert policies to
previous versions using the Policy History page.
Compare policies on page 196
Policy Comparison can help you identify differences between similar policies.
Change the owners of a policy on page 196
By default, ownership is assigned to the user who creates the policy. If you have the
required permissions, you can change the ownership of a policy.
Task
For details about product features, usage, and best practices, click ? or Help.
All created policies for the selected category appear in the Details pane.
2 Select the policy you want to duplicate from the Create a policy based on this existing policy drop-down list.
6 Click Save.
Policy Catalog page View policy assignments and enforcement. You can also lock policy
enforcement to prevent changes below the locked node.
If policy enforcement is turned off, systems in the specified group don't receive updated site lists during
an agent-server communication. As a result, managed systems in the group might not function as
expected.
For example, you might configure managed systems to communicate with Agent Handler A. If policy
enforcement is turned off, the managed systems do not receive the new site list with this information
and the systems report to a different Agent Handler listed in an expired site list.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Assigned Policies tab, then select a group in the System Tree.
2 Select the product you want, then click the link next to Enforcement Status.
3 To change the enforcement status, select Break inheritance and assign the policy and settings below.
6 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Systems tab, then select the group under System Tree where the
system belongs.
The list of systems belonging to this group appears in the details pane.
4 If you want to change the enforcement status you must first select Break inheritance and assign the policy
and settings below.
6 Click Save.
Only policies you create in the Policy Catalog have Policy History entries. Make sure that you leave a
comment when you revise a policy. Consistent commenting creates a strong history of your changes.
To record policy revisions, type a comment in the text field next to Duplicate, in the footer of the Policy
Catalog page.
If you have policy users configured to create and edit policies, the Status column options vary
depending on your permissions. For example:
McAfee ePO administrators have full control of all policy history functions.
Policy users can monitor the status of their policies. Status includes Pending Review, Approved, or
Declined.
Task
For details about product features, usage, and best practices, click ? or Help.
No Policy History entries appear for McAfee Default policies. You might need to use the page filter to
select a created or duplicated McAfee Default policy.
2 Use the Product, Category, and Name filters to select Policy History entries.
3 To manage a policy or Policy History entry, click Actions, then select an action.
Choose Columns Opens a dialog box that allows you to select which columns to display.
Compare Policy Opens the Policy Comparison page where you can compare two selected policies.
The current version of a policy has the latest date. To compare the current revision of a policy
and a previous policy revision, select the latest revision and a previous revision to compare.
Export Table Opens the Export page where you can specify the package and format of Policy
History entry files to export, then email the file.
When you revert a policy, you are prompted to add a comment to the Policy History entry.
Task
For details about product features, usage, and best practices, click ? or Help.
2 In the right pane, click Edit in the Permission row for the product associated with the policy. For
example, select EEFF Policy Permission to change McAfee Endpoint Encryption for Files and Folders
policy permissions.
3 Click View and change policy and task settings, then click Save.
Now you can revert existing policies to Policy History entries from the Policy History page.
Compare policies
Policy Comparison can help you identify differences between similar policies.
Many of the values and variables included on the Policy Comparison page are specific to each product.
For option definitions not included in the table, see the documentation for the product that provides
the policy you want to compare.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy Comparison, then select a product, category, and Show settings from the lists.
Best practice: Change the Show setting from All Policy Settings to Policy Differences or Policy Matches to
reduce the data displayed.
These settings populate the policies to compare in the Policy 1 and Policy 2 lists.
2 Select the policies to compare in the Compare policies row from the Policy 1 and Policy 2 column lists.
The top two rows of the table display the number of settings that are different and identical.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select the Product and Category.
All created policies for the selected category appear in the details pane.
2 Locate the policy you want, then click the owner of the policy.
The Policy Ownership page appears.
3 Select the owners of the policy from the list, then click OK.
Tasks
Register servers for policy sharing on page 197
Register servers to share a policy.
Designate policies for sharing on page 197
You can designate a policy for sharing among multiple McAfee ePO servers.
Schedule server tasks to share policies on page 198
The Share Policies server task ensures that any changes you make to shared policies are
pushed to sharing-enabled McAfee ePO servers.
See also
Working with policies on page 64
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Registered Servers, then click New Server. The Registered Server Builder opens to
the Description page.
2 From the Server type menu, select ePO, specify a name and any notes, then click Next. The Details page
appears.
3 Specify any details for your server and click Enable in the Policy sharing field, then click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then click Product menu and select the product whose policy you
want to share.
Shared policies are automatically pushed to McAfee ePO servers with policy sharing enabled. When
you click Share in step 2, the policy is immediately pushed to all registered McAfee ePO servers that
have policy sharing enabled. Changes to shared policies are similarly pushed.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, specify the name of the task and any notes, then click Next.
New server tasks are enabled by default. If you do not want this task to be enabled, in the
Schedule status field, select Disabled.
3 From the Actions drop-down menu, select Share Policies, then click Next.
Tasks
Create policy assignment rules on page 198
Creating policy assignment rules allows you to enforce policies for users or systems based
on configured rule criteria.
Manage policy assignment rules on page 199
Perform common management tasks when working with policy assignment rules.
Task
For details about product features, usage, and best practices, click ? or Help.
The rule type you specify determines which criteria is available on the Selection Criteria page.
By default, the priority for new policy assignment rules is assigned sequentially based on the
number of existing rules. After creating the rule, you can edit the priority by clicking Edit Priority on
the Policy Assignment Rules page.
3 Click Next.
4 Click Add Policy to select the policies that you want to enforce with this policy assignment rule.
5 Click Next.
6 Specify the criteria you want to use in this rule. Your criteria selection determines which systems or
users are assigned this policy.
Task
For details about product features, usage, and best practices, click ? or Help.
Action Steps
Delete a policy Click Delete in the selected assignment row.
assignment rule
Edit a policy Click the selected assignment. The Policy Assignment Builder opens.
assignment rule Work through each page to modify this policy assignment rule.
Export policy Select Actions | Export. The Download Policy Assignment Rules page opens,
assignment rules where you can view or download the PolicyAssignmentRules.xml file.
Import policy Select Actions | Import. The Import Policy Assignment Rules dialog box
assignment rules opens, from which you can browse to a previously downloaded
PolicyAssignmentRules.xml file. You are prompted to choose which
rules included in the file to import. You can select which rules to import
and, if any rules in the file have the same name as those already in your
Policy Assignment Rules list, you can select which to retain.
Edit the priority of a Select Actions | Edit Priority. The Edit Priority page opens, where you change
policy assignment rule the priority of policy assignment rules using the drag and drop handle.
View the summary of a Click > in the selected assignment row.
policy assignment rule
McAfee ePO administrator creates these other two user levels and permissions.
As the McAfee ePO administrator, you can create users with hierarchical levels of policy permissions.
For example, you can create these policy users:
Policy administrator They can approve policies created and modified by other users.
Policy user They can duplicate and create policies that they submit to the policy administrator for
approval before they are used.
2 In Permission Sets, create different permission sets for the policy administrator and policy user.
3 In User Management, create policy administrator and policy user then manually assign them the
different permission sets.
2 In the Policy History, can monitor the approval status by the policy administrator.
The policy administrator can do everything the policy user can do plus, in the Policy History page,
approve or deny the policy changes submitted by policy users.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To change the Policy Administration settings, select Menu | Configuration | Server Settings, then select
Policy Administration and click Edit.
2 From Edit Policy Administration, select one of the following options, and click Save:
Table 13-1 Option definitions
Option Definition
Needs administrator approval Forces the users to request approval from the administrator before
they can save a new or changed policy.
Does not need administrator Allows the user to save a new or changed policy without administrator
approval approval.
3 (Optional) Create policy management permission sets to change policy management for individual
users.
See also
Create policy management permission sets on page 201
To help you manage policy creation, you can create permission sets for users who can create and
modify specific product policies. For example, you can create permission sets that allow one user to
change policies and another user permission to approve or decline those changes.
Policy Administrator (policyAdminPS) permission set Allows the policy administrator permission
to create and modify specific product policies, plus approve or decline the changes created by
policy users.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To create the two permission sets, select Menu | User Management | Permission Sets, then click New
Permission Sets.
2 To create the policy administrator permission set from the New Permission Set page, type the name, for
example policyAdminPS and click Save.
3 With the policyAdminPS permission set selected, scroll down to the Policy Management row and
click Edit.
4 From Edit Permission Sets policyAdminPS: Policy Management page, select Can save policy changes
directly and approve or decline the policy changes submitted by other users, and click Save.
This allows the policy administrator user to approve or decline policy changes for other users
without administrator approval.
5 With the policyAdminPS permission set still selected, scroll down to a setting, for example the
Endpoint Security Common, row and click Edit.
6 From Edit Permission Sets policyAdminPS: Endpoint Security Common page, select View and change
policy and task settings and click Save.
This allows the policy administrator user to make policy changes to Endpoint Security Common
policies.
7 To duplicate the policy administrator permission set and create the policy user permission set, click
Actions | Duplicate.
8 In the Actions: Duplicate pop-up window, type the policy user permission set name, for example
policyUserPS and click OK.
These two steps create a duplicate of the policy administrator permission set. The one following
change creates the policy user (policyUserPS) permission set.
9 From the Permission Sets list, click the policyUserPS permission set created in step 7.
11 From Edit Permission Sets policyUserPS: Policy Management page, select Policy Approval setting No
Permissions, and click Save:
This setting forces the users assigned this permission set to request approval from the
administrator before they can save a new or changed policy.
Now you have created the two permission sets to use when creating the two policy user and policy
administrator users.
See also
Create policy management users on page 202
Policy User (policyUser) The policyUser can create and modify specific product policies, but the
policy changes must be approved by the policy administrator before the policy is saved.
Policy Administrator (policyAdmin) The policyAdmin can create and modify specific product
policies, plus approve or decline the changes created by policy users.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the User Management page: click Menu | User Management | Users.
d Select whether the new account uses McAfee ePO authentication, Windows authentication, or Certificate
Based Authentication and provide the required credentials or browse and select the certificate.
e Optionally, provide the user's full name, email address, phone number, and a description in the
Notes text box.
f Select the policy user permission set you created in Administrator creates user policy
management permission sets. For example, select policyUserPS.
The new policy user appears in the Users list of the User Management page.
d Select whether the new account uses McAfee ePO authentication, Windows authentication, or Certificate
Based Authentication and provide the required credentials or browse and select the certificate.
e Optionally, provide the user's full name, email address, phone number, and a description in the
Notes text box.
f Select the policy user permission set you created in Create policy management permission sets.
For example, select policyAdminPS.
The new policy administrator appears in the Users list of the User Management page.
Now you have two policy users. One policy user can change policies and a policy administrator user
who can approve or decline those changes.
Task
For details about product features, usage, and best practices, click ? or Help.
Policy users only have access to policies and setting configured by the administrator in their
assigned permission set.
2 When you get to the step in the policy process to save the policy, click Submit for Review.
3 To check the status of the policy acceptance, select Menu | Policy | Policy History.
4 Use the Product, Category, and Name filters to select Policy History entries to check.
5 In the Status column, one of these entries appears describing the administrator's action:
Pending review Has not been reviewed.
See also
Create and manage policies on page 192
Create policy management permission sets on page 201
Task
For details about product features, usage, and best practices, click ? or Help.
1 To change the status of the policy submitted for review, select Menu | Policy | Policy History.
2 Use the Product, Category, and Name filters to select Policy History entries to check.
3 In the Policy Status column, select one of these links related to the submitted policy:
Accepted The policy is saved and now ready to use.
Tasks
Assign a policy to a System Tree group on page 205
Assign a policy to a specific group of the System Tree.
Assign a policy to a managed system on page 205
Assign a policy to a specific managed system.
Assign a policy to systems in a System Tree group on page 206
Assign a policy to multiple managed systems within a group.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Assigned Policies tab, then select a product.
Each assigned policy per category appears in the details pane.
2 Locate the policy category you want, then click Edit Assignment.
3 If the policy is inherited, next to Inherited from, select Break inheritance and assign the policy and settings below.
From this location, you can also edit the selected policy's settings, or create a policy.
6 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Systems tab, then select a group under System Tree.
All systems within this group (but not its subgroups) appear in the details pane.
2 Select a system, then click Actions | Agent | Modify Policies on a Single System.
The Policy Assignment page for that system appears.
3 Select a product.
The categories of selected product are listed with the system's assigned policy.
4 Locate the policy category you want, then click Edit Assignments.
5 If the policy is inherited, next to Inherited from, select Break inheritance and assign the policy and settings below.
From this location, you can also edit settings of the selected policy, or create a policy.
8 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Systems tab, then select a group in the System Tree.
All systems in this group (but not its subgroups) appear in the details pane.
2 Select the systems you want, then click Actions | Agent | Set Policy & Inheritance.
The Assign Policy page appears.
3 Select the Product, Category, and Policy from the drop-down lists.
Tasks
Copy policy assignments from a group on page 206
You can use Copy Assignments to copy policy assignments from a group in the System
Tree.
Copy policy assignments from a system on page 207
You can use Copy Assignments to copy policy assignments from a specific system.
Paste policy assignments to a group on page 207
You can paste policy assignments to a group after you copy them from a group or system.
Paste policy assignments to a specific system on page 207
Paste policy assignments to a specific system after copy the policy assignments from a
group or system.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Assigned Policies tab, then select a group in the System Tree.
3 Select the products or features where you want to copy policy assignments, then click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Systems tab, then select a group in the System Tree.
The systems belonging to the selected group appear in the details pane.
2 Select a system, then click Actions | Agent | Modify Policies on a Single System.
3 Click Actions | Copy Assignments, select the products or features where you want to copy policy
assignments, then click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Assigned Policies tab, then select the group you want in the
System Tree.
When pasting policy assignments, the Enforce Policies and Tasks policy appears in the list. This
policy controls the enforcement status of other policies.
3 Select the policy categories you want to replace with the copied policies, then click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Systems tab, then select a group in the System Tree.
All systems belonging to the selected group appear in the details pane.
2 Select the system where you want to paste policy assignments, then click Actions | Agent | Modify
Policies on a Single System.
When pasting policy assignments, the Enforce Policies and Tasks policy appears in the list. This policy
controls the enforcement status of other policies.
Tasks
View groups and systems where a policy is assigned on page 208
The Policy Catalog page lists only the policy assignments not the group, or system that
inherits the policy.
View policy settings on page 209
View details for a policy assigned to a product category or system.
View policy ownership on page 209
View the owners of a policy.
View assignments where policy enforcement is disabled on page 209
View assignments where policy enforcement, per policy category, is disabled.
View policies assigned to a group on page 209
View the policies assigned to a System Tree group, sorted by product.
View policies assigned to a specific system on page 210
View a list of all policies assigned to a system from one central location, the System Tree.
View policy inheritance for a group on page 210
View the policy inheritance of a specific group.
View and reset broken inheritance on page 210
Identify the groups and systems where policy inheritance is broken.
Create policy management queries on page 210
Retrieve the policies assigned to a managed system, or policies broken in the system
hierarchy.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select a product and category.
All created policies for the selected category appear in the details pane.
2 Under Assignments on the row of the policy, click the link that indicates the number of groups or
systems the policy is assigned to (for example, 6 assignments).
On the Assignments page, each group or system where the policy is assigned appears with its node
name and node type.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select a product and category.
All created policies for the selected category appear in the details pane.
You can also view this information when accessing the assigned policies of a specific group. To
access this information, select Menu | Systems | System Tree, click Assigned Policies tab, then click the link
for the selected policy in the Policy column.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select a product and category.
All created policies for the selected category appear in the details pane.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select a product and category.
All created policies for the selected category appear in the details pane.
2 Click the link next to Product enforcement status, which indicates the number of assignments where
enforcement is disabled, if any.
The Enforcement for <policy name> page appears.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click Assigned Policies tab, then select a group in the System Tree.
All assigned policies, organized by product, appear in the details pane.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click the Systems tab, then select a group in the System Tree.
All systems belonging to the group appear in the details pane.
2 Click the name of a system to drill into the System Information page, then click the Applied Policies
tab.
Task
For details about product features, usage, and best practices, click ? or Help.
The policy row, under Inherit from, displays the name of the group from which the policy is inherited.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, then click Assigned Policies tab.
All assigned policies, organized by product, appear in the details pane. The policy row, under Broken
Inheritance, displays the number of groups and systems where this policy's inheritance is broken.
This number is the number of groups or systems where the policy inheritance is broken, not the
number of systems that do not inherit the policy. For example, if only one group does not inherit the
policy, 1 doesn't inherit appears, regardless of the number of systems within the group.
2 Click the link indicating the number of child groups or systems that have broken inheritance.
The View broken inheritance page displays a list of the names of these groups and systems.
3 To reset the inheritance of any of these, select the checkbox next to the name, then click Actions
and select Reset Inheritance.
Broken Inheritance Retrieves information on policies that are broken in the system hierarchy.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then click New Query.
The Query Builder opens.
2 On the Result Type page, select Policy Management from the Feature Group list.
3 Select a Result Type, then click Next to display the Chart page:
Applied Client Tasks
Applied Policies
4 Select the type of chart or table to display the primary results of the query, then click Next.
The Columns page appears.
If you select Boolean Pie Chart, configure the criteria that you want to include in the query.
Selected properties appear in the content pane with operators that can specify criteria, which
narrows the data that is returned for that property.
7 On the Unsaved Query page, take any available action on items in any table or drill-down table.
If the query didn't return the expected results, click Edit Query to go back to the Query Builder
and edit the details of this query.
To use this query again, click Save and continue to the next step.
8 In the Save Query page, enter a name for the query, add any notes, and select one of the
following:
New Group Enter the new group name and select either:
Private group (My Groups)
Existing Group Select the group from the list of Shared Groups.
9 Click Save.
Use server and client tasks to automate McAfee ePO and managed system processes.
McAfee ePO includes preconfigured server tasks and actions. Most of the additional software products
you manage with McAfee ePO also add preconfigured server and client tasks.
Contents
Server tasks
Client tasks
Server tasks
Server tasks are configurable actions that run on McAfee ePO at scheduled times or intervals.
Leverage server tasks to automate repetitive tasks.
McAfee ePO includes preconfigured server tasks and actions. Most of the additional software products
you manage with McAfee ePO also add preconfigured server tasks.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Server Task Log: select Menu | Automation | Server Task Log.
Status Definition
Waiting The server task is waiting for another task to finish.
In Progress The server task has started, but not finished.
Paused A user paused the server task.
Status Definition
Stopped A user stopped the server task.
Failed The server task started, but did not finish successfully.
Completed The server task finished successfully.
Pending Termination A user requested that the server task end.
Ended A user closed the server task manually before it finished.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Give the task an appropriate name, and decide whether the task has a Schedule status, then click
Next.
If you want the task to run automatically, set Schedule status to Enabled.
3 Select and configure the action for the task, then click Next.
4 Choose the schedule type (the frequency), start date, end date, and schedule time to run the task,
then click Next.
Remove outdated server tasks from the Server Task Log: best
practice
Periodically remove old server task entries from the Server Task Log to improve database
performance.
Items removed from the Server Task Log are deleted permanently.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Server Task Log: select Menu | Automation | Server Task Log.
2 Click Purge.
3 In the Purge dialog box, enter a number, then select a time unit.
4 Click OK.
Any items of the specified age or older are deleted, including items not in the current view. The
number of removed items is displayed in the lower right corner of the page.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Enable or disable the schedule for the server task, then click Next.
The server task does not run until it is enabled.
4 From the drop-down list, select a purge action, such as Purge Server Task Log.
5 Next to Purge records older than, enter a number, then select a time unit, then click Next.
The new server task appears on the Server Tasks page. Outdated items are removed from the
specified table or log when the scheduled task runs.
Cron syntax is made up of six or seven fields, separated by a space. Accepted Cron syntax, by field in
descending order, is detailed in the following table. Most Cron syntax is acceptable, but a few cases
are not supported. For example, you cannot specify both the Day of Week and Day of Month values.
Asterisks (*) are used for "every." For example, "*" in the minutes field is "every minute".
Question marks (?) are allowed to specify no specific value in the Day of Week or Day of Month
fields.
The question mark must be used in one of these fields, but cannot be used in both.
Forward slashes (/) identify increments. For example, "5/15" in the minutes field means the task
runs at minutes 5, 20, 35 and 50.
The letter "L" means "last" in the Day of Week or Day of Month fields. For example, "0 15 10 ? *
6L" means the last Friday of every month at 10:15 am.
The letter "W" means "weekday". So, if you created a Day of Month as "15W", this means the
weekday closest to the 15th of the month. Also, you can specify "LW", which means the last
weekday of the month.
The pound character "#" identifies the "Nth" day of the month. For example, using "6#3" in the Day
of Week field is the third Friday of every month, "2#1" is the first Monday, and "4#5" is the fifth
Wednesday.
If the month does not have a fifth Wednesday, the task does not run.
Client tasks
Create and schedule client tasks to automate how you manage systems in your network.
Client tasks are commonly used for these activities.
Product deployment
Product functionality
For information about which client tasks are available and what they can help you do, see the
documentation for your managed products.
Client tasks can be assigned at any level in the System Tree. Groups and systems lower in the tree
inherit client tasks. As with policies and policy assignments, you can break the inheritance for an
assigned client task.
Client task objects can be shared across multiple registered McAfee ePO servers in your environment.
When client task objects are set to be shared, each registered server receives a copy after your Share
Client Task server task runs. Any changes made to the task are updated each time it runs. When a
client task object is shared, only the owner of the object can modify its settings.
Administrators on the target server that receives a shared task is not an owner for that shared task.
None of the users on the target server is owner for any shared task objects the target receives.
Deployment tasks
Deployment tasks are client tasks that are used to deploy managed security products to your
managed systems from the Master Repository.
You can create and manage individual deployment task objects using the Client Task Catalog, then
assign them to run on groups or individual system. Alternatively, you can create Product Deployment
projects to deploy products to your systems. Product Deployment projects automate the process of
creating and scheduling client task objects individually. They also provide additional automated
management functionality.
Important considerations
When deciding how to stage your Product Deployment, consider:
Package size and available bandwidth between the Master Repository and managed systems. In
addition to potentially overwhelming the McAfee ePO server or your network, deploying products to
many systems can make troubleshooting problems more complicated.
A phased rollout to install products to groups of systems at a time. If your network links are fast,
try deploying to several hundred clients at a time. If you have slower or less reliable network
connections, try smaller groups. As you deploy to each group, monitor the deployment, run reports
to confirm successful installations, and troubleshoot any problems with individual systems.
The software uses these .zip files for both detection definition (DAT) and engine update packages.
You can configure product policy settings before or after deployment. We recommend configuring
policy settings before deploying the product to network systems. Configuring policy settings saves
time and ensures that your systems are protected as soon as possible.
These package types can be checked in to the Master Repository with pull tasks, or manually.
You are notified when you check in packages that McAfee has not signed. If you are confident of the
content and validity of the package, continue with the check-in process. These packages are secured
in the same manner previously described, but McAfee ePO signs them when they are checked in.
The McAfee Agent only trusts package files signed by McAfee ePO or McAfee. This feature protects
your network from receiving packages from unsigned or untrusted sources.
1 Check in the update package to the Master Repository with a pull task, or manually.
If you are not using global updating, perform the following tasks.
1 Use a replication task to copy the contents of the Master Repository.
2 Create and schedule an update task for agents to retrieve and install the update on managed
systems.
Deployment tags
When a deployment task is created, a tag with the task name is automatically created and applied to
the systems on which the task is enforced. These tags are only created for a fixed deployment. Does
not apply to continuous deployment.
These tags are added to the Deployment Tags group on the Tag Catalog page every time a deployment
task is created and enforced to systems. This group is a read-only group, and tags in this group can't
be manually applied, changed, deleted, or used in a criteria configuration to filter systems.
Tasks
Configure a deployment task for groups of managed systems on page 220
Configure a product deployment task to deploy products to groups of managed systems in
the System Tree.
Configure a deployment task to install products on a managed system on page 221
Deploy products to a single system using a product deployment task.
Task
1 Open the New Task dialog box.
a Select Menu | Policy | Client Task Catalog.
b Under Client Task Types, select a product, then click New Task.
3 Type a name for the task you are creating and add any notes.
4 Next to Target platforms, select the types of platform to use the deployment.
Set the Action to Install, then select the Language of the package, and the Branch.
To specify command-line installation options, type the options in the Command line text field. See
the product documentation for information on command-line options of the product you are
installing.
You can click + or to add or remove products and components from the list displayed.
6 If you want to automatically update your security products, select Auto Update.
This also deploys the hotfixes and patches for your product automatically.
If you set your security product to update automatically, you cannot set the Action to Remove.
7 (Windows only) Next to Options, select whether you want to run this task for every policy process,
then click Save.
8 Select Menu | Systems Section | System Tree | Assigned Client Tasks, then select the required group in the
System Tree.
Each assigned client task per selected category appears in the details pane.
11 On the Select Task page, select Product as McAfee Agent and Task Type as Product Deployment, then select
the task you created to deploy your product.
12 Next to Tags, select the platforms you are deploying the packages to, then click Next:
Send this task to all computers
Send this task to only computers that have the following criteria Click edit next to the criteria to configure,
select the tag group, select the tags to use in the criteria, then click OK.
To limit the list to specific tags, type the tag name in the text box under Tags.
13 On the Schedule page, select whether the schedule is enabled, and specify the schedule details,
then click Next.
At every scheduled run, the deployment task installs the latest sensor package to systems that meet
the specified criteria.
A different schedule than other systems in the group. For example, if a system is located in a
different time zone than its peers.
Task
For details about product features, usage, and best practices, click ? or Help.
b Under Client Task Types, select a product, then click New Task.
3 Type a name for the task you are creating and add any notes.
4 Next to Target platforms, select the types of platform to use the deployment.
Set the Action to Install, then select the Language and Branch of the package.
To specify command-line installation options, type the command-line options in the Command line
text field. See the product documentation for information on command-line options of the
product you are installing.
You can click + or to add or remove products and components from the list displayed.
6 If you want to automatically update security products that are already deployed, including hotfixes
and patches, select Auto Update.
If you set your security product to update automatically, you cannot set the Action to Remove.
7 Next to Options, select if you want to run this task for every policy enforcement process (Windows
only), then click Save.
8 Select Menu | Systems | System Tree | Systems, select the system on which you want to deploy a
product, then click Actions | Agent | Modify Tasks on a single system.
10 On the Select Task page, select Product as McAfee Agent and Task Type as Product Deployment, then select the
task you created for deploying product.
11 Next to Tags, select the platforms to which you are deploying the packages, then click Next:
Send this task to all computers
Send this task to only computers that have the following criteria Click edit, select the tag group and tags to
use in the criteria, then click OK.
To limit the list to specific tags, type the tag name in the text box under Tags.
12 On the Schedule page, select whether the schedule is enabled, and specify the schedule details,
then click Next.
Updating tasks
If you do not use global updating, determine when agents on managed systems go for updates.
You can create and update client tasks to control when and how managed systems receive update
packages.
If you use global updating, this task is not needed, although you can create a daily task for
redundancy.
Create a daily update client task at the highest level of the System Tree, so that all systems inherit
the task. If your organization is large, you can use randomization intervals to mitigate the
bandwidth impact. For networks with offices in different time zones, balance network load by
running the task at the local system time of the managed system, rather than at the same time for
all systems.
If you are using scheduled replication tasks, schedule the task at least an hour after the scheduled
replication task.
Run update tasks for DAT and Engine files at least once a day. Managed systems might be logged
off from the network and miss the scheduled task. Running the task frequently ensures that these
systems receive the update.
Maximize bandwidth efficiency and create several scheduled client update tasks that update
separate components and run at different times. For example, you can create one task to update
only DAT files, then create another to update both DAT and Engine files weekly or monthly (Engine
packages are released less frequently).
Create and schedule more tasks to update products that do not use the McAfee Agent for Windows.
Create a task to update your main workstation applications, to ensure that they all receive the
update files. Schedule it to run daily or several times a day.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To see the initial product deployment client task, select Menu | Client Task Catalog.
2 Find the initial product deployment client task: from the Client Task Types list, select McAfee Agent |
Product Deployment.
The initially created product deployment client task uses the name of the System Tree group that you
configured in the Agent Deployment URL as InitialDeployment_<groupName>. For example,
"InitialDeployment_AllWindowsSystems." This task appears in the Name column of the McAfee Agent |
Product Deployment table.
3 To open the client task and view its details, click the name of the task configured in the Agent
Deployment URL.
Now you know the location and configuration of the default product deployment client task. You can
duplicate this client task to, for example, deploy the McAfee Agent to platforms using different
operating systems.
Task
For details about product features, usage, and best practices, click ? or Help.
b Under Client Task Types, select a product, then click New Task.
3 Type a name for the task you are creating and add any notes.
4 Next to the Update in Progress dialog box, select if you want the users to be aware an update is in
process, and if you want to allow them to postpone the process.
When configuring individual signatures and engines, if you select Engine and deselect DAT, when the
new engine is updated a new DAT is automatically updated to ensure complete protection.
6 Select Menu | Systems | System Tree, click the Systems tab, then select the system where you want to
deploy the product update, then click Actions | Agent | Modify Tasks on a single system.
Then select the task you created to deploy the product update.
9 Next to Tags, select the platforms where you are deploying the packages, then click Next:
Send this task to all computers.
Send this task to only computers that have the following criteria Click edit next to the criteria to configure,
select the tag group, select the tags to use in the criteria, then click OK.
To limit the list to specific tags, type the tag name in the text box under Tags.
10 On the Schedule page, select whether the schedule is enabled, and specify the schedule details, then
click Next.
The task is added to the list of client tasks for the groups and systems where it is applied. Agents
receive the new update task information the next time they communicate with the server. If the task
is enabled, the update task runs at the next occurrence of the scheduled day and time.
Each system updates from the appropriate repository, depending on how the policies for that client's
agent are configured.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Create a scheduled Repository Pull task that copies update packages in the Evaluation branch of
your Master Repository. Schedule it to run after McAfee releases updated DAT files.
2 Create or select an evaluation group in the System Tree, then create a McAfee Agent policy for the
systems to use only the Evaluation branch.
a Select the Evaluation branch on the Updates tab in theRepository Branch Update Selection section.
The policies take effect the next time the McAfee Agent calls into the server. The next time the
agent updates, it retrieves them from the Evaluation branch.
3 Create a scheduled update client task for the evaluation systems that updates DAT and engine files
from the Evaluation branch of your repository. Schedule it to run one or two hours after your
Repository Pull task is scheduled to begin.
The evaluation update task created at the evaluation group level causes it to run only for that
group.
5 Move the packages from the Evaluation branch to the Current branch of your Master Repository.
Select Menu | Software | Master Repository to open the Master Repository page.
Adding them to the Current branch makes them available to your production environment. The
next time any client task retrieves packages from the Current branch, the new DAT and engine files
are distributed to systems that use the task.
Tasks
Create client tasks on page 225
Use client tasks to automatically perform product updates. The process is similar for all
client tasks.
Edit client tasks on page 225
You can edit any previously configured client task settings or schedule information.
Compare client tasks on page 226
The Client Task Comparison tool determines which client task settings are different and
which are the same.
View client tasks assigned to a specific system on page 226
View a list of all client tasks assigned to a system from one central location, the System
Tree.
Task
For details about product features, usage, and best practices, click ? or Help.
b Under Client Task Types, select a product, then click New Task.
2 Select a task type from the list, then click OK to open the Client Task Builder.
3 Enter a name for the task, add a description, then configure the settings specific to the task type
you are creating.
The task is added to the list of client tasks for the selected client task type.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select the Client Task Type from the navigation tree on the left.
3 Click the client task name to open the Client Task Catalog dialog box.
The managed systems receive the changes you configured the next time the agents communicate with
the server.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Client Task Comparison, then select a product, client task type, and show settings from the
lists.
These settings populate the client tasks to compare in the Client Task 1 and Client Task 2 lists.
2 Select the client tasks to compare in the Compare Client Tasks row from the Client Task 1 and the Client Task
2 column lists.
The top two rows of the table display the number of settings that are different and identical. To
reduce the amount of data, change the Show setting from All Client Task Settings to Client Task Differences or
Client Task Matches.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems | System Tree, click the Systems tab, then select a group in the System Tree.
All systems belonging to the group appear in the details pane.
2 Click the name of a system to drill into the System Information page, then click the Applied Client
Tasks tab.
Take immediate action against threats and outbreaks by automatically starting McAfee ePO processes
when events occur.
McAfee ePO responds when the conditions of an automatic response rule are met. You specify the
actions that make up the response, and the type and number of events that must meet the condition
to trigger the response.
You can also configure external tools installed on the McAfee ePO server to run an external command.
The products that you manage with McAfee ePO determine the types of events you can create an
automatic response rule for.
Here are some typical conditions that might trigger an automatic response:
Outbreak situations. For example, 1,000 virus-detected events are received in five minutes.
High-level compliance of McAfee ePO server events. For example, a repository update or a
replication task failed.
Contents
Using Automatic Responses
Event thresholds
Default automatic response rules
Response planning
Determine how events are forwarded
Archive events
Configure Automatic Responses
Choose a notification interval
Create and edit Automatic Response rules
You can also configure external tools installed on the McAfee ePO server to run an external command.
This feature is designed to create user-configured notifications and actions when the conditions of a
rule are met. These conditions include, but are not limited to:
Outbreak situations. For example, 1000 virus-detected events are received in five minutes.
High-level compliance of McAfee ePO server events. For example, a repository update or a
replication task failed.
Event thresholds
Setting event thresholds lets you tailor the frequency of automatic responses to fit the needs and
realities of your environment.
Aggregation
Use aggregation to set the number of events that occur before triggering an automatic response. For
example, you can configure an automatic response rule to send an email message when either one of
these thresholds is met:
In one hour, the server receives 1,000 or more virus detection events from different systems.
In one hour, the server receives 100 or more virus detection events from one system.
Throttling
Once you have configured the rule to notify you of a possible outbreak, use throttling to ensure that
you do not receive too many notification messages. If you are securing a large network, you might
receive tens of thousands of events in an hour, generating thousands of email messages. Throttling
allows you to limit the number of notification messages you receive based on one rule. For example,
you can specify in a response rule that you dont want to receive more than one notification message
in an hour.
Grouping
Use grouping to combine multiple aggregated events. For example, events with the same severity can
be combined into one group. Grouping provides these benefits:
Make sure that the recipient email address is correct. This address is configured on the Actions
page of the Automatic Response Builder.
Response planning
Before creating automatic response rules, think about the actions you want the McAfee ePO server to
take.
Plan for these items:
Who receives which messages. For example, you might not need to notify all administrators about
a failed product upgrade, but you might want them to know that an infected file was discovered.
The types and levels of thresholds that you want to set for each rule. For example, you might not
want to receive an email message every time an infected file is detected during an outbreak.
Instead, you can choose to send one message for every 1,000 events.
The commands or registered executables you want to run when the conditions of a rule are met.
The server task you want to run when the conditions of a rule are met.
If you choose to send events immediately (as set by default), the McAfee Agent forwards all events
when they are received.
If you choose not to have all events sent immediately, the McAfee Agent forwards immediately only
events that are designated by the issuing product as high priority. Other events are sent only at the
agent-server communication.
Tasks
Determine which events are forwarded immediately on page 230
Determine whether events are forwarded immediately or only during agent-server
communication.
Determine which events are forwarded to the server on page 230
You can determine which events are forwarded to the server using server settings and
event filtering.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select Product as McAfee Agent and Category as General.
6 To regulate traffic size, type the Maximum number of events per upload.
7 Click Save.
These settings affect the bandwidth used in your environment, as well as the results of event-based
queries.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Event Filtering, then click Edit at the bottom of the page.
2 Select the events you want forwarded, either all or individual events.
To forward all available events, select All events to the server.
Select All and Deselect All are disabled when you select All events to the server.
To forward only the events you specified, select Only selected events to the server.
Click Store selected in SIEM Store all selected events in security information and event
management (SIEM) database.
Click Store selected in both Store all selected events in both the McAfee ePO and the SIEM
databases. This is the default setting.
Click Store in both Store event in McAfee ePO and SIEM databases.
If a product extension provides an event storage option for an event type during registration, that
event storage option is saved. If a product extension does not provide an event storage option for
an event type during registration, the default is to save the events in both McAfee ePO and SIEM
databases.
Events that were generated by the sending agentOnly events generated by the McAfee Agent.
5 Click Save.
Changes to these settings take effect after all agents have communicated with the McAfee ePO server.
Archive events
To improve your McAfee ePO performance, you can periodically archive the events stored on your
McAfee ePO server to a SQL Server.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Give the task an appropriate name, decide whether the task has a Schedule status, then click Next.
If you want the task to run automatically, set Schedule status to Enabled.
5 Choose the schedule type (the frequency), start date, end date, and schedule time to run the task.
Click Next.
The new task appears in the Server Tasks list and archives the events in the events SQL database.
See also
Register a database server on page 382
Tasks
Assign permissions to notifications on page 232
Notifications permissions enable users to view, create, and edit registered executables.
Assign permissions to Automatic Responses on page 233
Assign permssions to responses when you need to limit the types of responses users can
create.
Manage SNMP servers on page 234
Configure responses to use your SNMP (Simple Network Management Protocol) server.
Manage registered executables and external commands on page 234
The registered executables you configure are run when the conditions of a rule are met.
Automatic Responses trigger the registered executable commands to run.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | User Management | Permission Sets, then either create a permission set or select an existing
one.
View rules and notifications for entire System Tree (overrides System Tree group access permissions)
4 Click Save.
6 Select a user to assign the new permission set to, then click Edit.
7 Next to Permission sets, select the checkbox for the permission set with the notifications permissions
you want, then click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | User Management | Permission Sets, then create a permission set or select an existing one.
Create, edit, view, and cancel Responses; view Response results in the Server Task Log
4 Click Save.
6 Select a user to assign the new permission set to, then click Edit.
7 Next to Permission sets, select the checkbox for the permission set with the Automatic Response
permissions you want, then click Save.
You can configure responses to send SNMP traps to your SNMP server. You can receive SNMP traps at
the same location where you can use your network management application to view detailed
information about the systems in your environment.
You do not need to make other configurations or start any services to configure this feature.
2 From the list of registered servers, select an SNMP server, then click Actions and a change available
from the Registered Servers page.
Action Description
Edit Edit the server information as needed, then click Save.
Delete Deletes the selected SNMP server. When prompted, click Yes.
2 TVD-MIB.mib
3 EPO-MIB.mib
These files allow your network management program to decode the data in the SNMP traps into
meaningful text. The EPO-MIB.mib file depends on the other two files to define the following traps:
epoThreatEvent This trap is sent when an Automatic Response for an McAfee ePO Threat Event
is triggered. It contains variables that match properties of the Threat event.
epoStatusEvent This trap is sent when an Automatic Response for an McAfee ePO Status Event
is triggered. It contains variables that match the properties of a (Server) Status event.
epoClientStatusEvent This trap is sent when an Automatic Response for an McAfee ePO Client
Status Event is triggered. It contains variables that match the properties of the Client Status event.
epoTestEvent This is a test trap that is sent when you click Send Test Trap in the New SNMP
Server or Edit SNMP Server pages.
For instructions on importing and implementing .mib files, see the product documentation for your
network management program.
Task
For details about product features, usage, and best practices, click ? or Help.
Action Steps
Add a registered 1 Click Actions | Registered Executable.
executable
2 Type a name for the registered executable.
3 Type the path and select the registered executable that you want a rule to
execute when triggered.
4 Modify the user credentials, if needed.
5 Test the executable and confirm that it worked using the Audit Log.
6 Click Save.
The new registered executable appears in the Registered Executables list.
Edit a registered 1 Find the registered executable to edit in the Registered Executable page, then
executable click Edit.
2 Change the information as needed and click Save.
Duplicate a 1 Find the registered executable to duplicate in the Registered Executable page,
registered then click Duplicate.
executable
2 Type a name for the registered executable, then click OK.
The duplicated registered executable appears in the Registered Executables list.
Delete a 1 Find the registered executable to delete in the Registered Executable page, then
registered click Delete.
executable
2 When prompted, click OK.
The deleted registered executable no longer appears in the Registered Executables
list.
Client events Events that occur on managed systems. For example, Product update succeeded.
Threat events Events that indicate possible threats are detected. For example, Virus detected.
Server events Events that occur on the server. For example, Repository pull failed.
An automatic response can be triggered only after the automatic response system receives a
notification. Specify a short interval for sending notifications, and choose an evaluation interval that is
frequent enough to ensure that the automatic response system can respond to an event in a timely
manner, but infrequent enough to avoid excessive bandwidth consumption.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Event Notifications from the Setting Categories, then
click Edit.
2 Specify a value between 1 and 9,999 minutes for the Evaluation Interval (1 minute by default),
then click Save.
Tasks
Define a rule on page 236
When creating a rule, include information that other users might need to understand the
purpose or effect of the rule.
Set filters for the rule on page 236
To limit the events that can trigger the response, set the filters for the response rule on the
Filters page of the Response Builder.
Set Aggregation and grouping criteria for the rule on page 237
Define when events trigger a rule on the Aggregation page of the Response Builder.
Configure the actions for an automatic response rule on page 237
Configure the responses triggered by the rule on the Actions page of the Response Builder.
Define a rule
When creating a rule, include information that other users might need to understand the purpose or
effect of the rule.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Automatic Responses, then click New Response, or click Edit next to an existing
rule.
2 On the Description page, type a unique name and any notes for the rule. A good name gives users a
general idea of what the rule does. Use notes to provide a more detailed description.
3 From the Language menu, select the language that the rule uses.
4 Select the Event group and Event type that trigger this response.
6 Click Next.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the Available Properties list, select a property and specify the value to filter the response result.
Available Properties depend on the event type and event group selected on the Description page.
2 Click Next.
Task
For details about product features, usage, and best practices, click ? or Help.
To trigger the event after multiple events occur, perform these steps.
1 Select Trigger this response if multiple events occur within, then define the amount of time in seconds,
minutes, hours, or days.
For example, you can set the response to occur when an instance of the selected event
property exceeds 300, or when the number of events exceeds 3,000, whichever threshold is
crossed first.
2 Next to Grouping, select whether to group the aggregated events. If you do, specify the property of
the event on which they are grouped.
3 As needed, next to Throttling, select At most, trigger this response once every and define an amount of time
that must pass before this rule can send another notification message.
The amount of time can be defined in minutes, hours, or days.
4 Click Next.
Task
For details about product features, usage, and best practices, click ? or Help.
After configuring the options for an action, click Next if finished, or click + to add another action.
To send an email as part of the response, select Send Email from the drop-down list.
1 Next to Recipients, click ... and select the recipients for the message. This list of available
recipients is taken from Contacts (Menu | User Management | Contacts). Or, you can manually type
email addresses, separated by a comma.
3 Type the Subject of the message or insert any of the available variables directly into the
subject.
4 Type any text that you want to appear in the body of the message or insert any of the
available variables directly into the body.
To send an SNMP trap, select Send SNMP Trap from the drop-down list.
1 Select an SNMP server from the drop-down list.
2 Select the value types that you want to send in the SNMP trap. Some events do not include
all information specified. If a selection you made is not represented, the information was not
available in the event file.
To run an external command, select Run External Command from the drop-down list.
1 Select the Registered Executables and type any arguments for the command.
2 Type a unique name and any notes for the issue or insert any of the available variables
directly into the name and description.
3 Select the State, Priority, Severity, and Resolution for the issue from the respective drop-down list.
To run a scheduled task, select Execute Server Task from the drop-down list.
1 Select the task that you want to run from the Task to execute drop-down list.
Client systems use the McAfee Agent and agent-server communications to communicate with your
McAfee ePO server.
For version-specific information about your agents, see the McAfee Agent Product Guide.
Contents
How agent-server communication works
Best practices: Estimating and adjusting the ASCI
Managing agent-server communication
Update Now page
To estimate the ASCI, your concern is not wasting bandwidth because agent-server communications
are only a few kilobytes per communication. The concern is the strain put on the McAfee ePO server
with every communication from every agent in larger environments. All your agents need at least two
communications a day with the McAfee ePO server. This requires a 180240 minute ASCI in most
organizations.
For organizations with fewer than 10,000 nodes, the default ASCI setting is not a concern at 60
minutes. But for organizations with more than 10,000 nodes, change the default setting of 60 minutes
setting to about 34 hours.
For organizations with more than 60,000 nodes, the ASCI setting is much more important. If your
McAfee ePO server is not having performance issues, you can use the 4-hour ASCI interval. If there
are any performance issues, consider increasing your ASCI to 6 hours; possibly even longer. This
change significantly reduces the number of agents that are simultaneously connecting to the McAfee
ePO server and improves the server performance.
You can determine how many connections are being made to your McAfee ePO server by using the
McAfee ePO Performance Counters.
For details about product features, usage, and best practices, click ? or Help.
Task
1 Select Menu | Policy | Policy Catalog, then select McAfee Agent from the Product list and General from the
Category list.
2 Click the name of the policy you want to change and the General tab.
3 Next to Agent-to-server communication interval, type the number of minutes between updates.
This example shows the interval set to 60 minutes.
4 Click Save.
If you send a policy change or add a client task immediately, you can execute an agent wake-up
call.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Agent Deployment Credentials from the Setting Categories,
then click Edit.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Ports from the Setting Categories, then click Edit.
2 Select whether to enable port 443 for agent-server communications, enter the ports to be used for
agent wake-up calls and broadcasts, then click Save.
You can create queries and tasks to automatically run for improved server performance, easier
maintenance, and to monitor threats.
When you change a policy, configuration, client or server task, automatic response, or report, export
the settings before and after the change.
Contents
Best practice: Find systems with the same GUID
Best practices: Purging events automatically
Best practice: Creating an automatic content pull and replication
Best practices: Filtering 1051 and 1059 events
Best practice: Finding systems that need a new agent
Finding inactive systems: best practice
Measuring malware events best practice
Finding malware events per subnet: best practice
Create an automatic compliance query and report best practice
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks to open the Server Tasks Builder.
2 Click Edit in the Actions column for one of the following preconfigured server tasks.
Duplicate Agent GUID - Clear error count
Duplicate Agent GUID - Remove systems that potentially use the same GUID
Next Schedule the server task to run at a specific time and perform the task.
This clears the error count and removes any systems with the same GUID, and assigns the systems a
new GUID.
You must determine your event data retention rate. The retention rate can be from one month to an
entire year. The retention rate for most organizations is about six months. For example, six months
after your events occur, on schedule, they are deleted from your database.
McAfee ePO does not come with a preconfigured server task to purge task events. This means that
many users never create a task to purge these events and, over time, the McAfee ePO server SQL
database starts growing exponentially and is never cleaned.
See also
Reporting features on page 349
Some organizations have specific event retention policies or reporting requirements. Make sure that
your purge event settings conform to those policies.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To open the Server Task Builder dialog box, select Menu | Automation | Server Tasks, then click Actions |
New Task.
2 Type a name for the task, for example Delete client events, add a description, then click Next.
You can chain the actions all in one task so that you don't have to create multiple tasks.
This example purges SiteAdvisor Enterprise events because they are not included in the normal
events table and require their own purge task. The SiteAdvisor Enterprise events are retained
for only 10 days because they collect all URLs visited by managed systems. These events can
save a large amount of data in environments with more than 10,000 systems. Therefore, this
data is saved for a much shorter time compared to other event types.
4 Click Next and schedule the task to run every day during non-business hours.
5 Click the Summary tab, confirm that the server task settings are correct, then click Save.
There are reasons why you might need to purge data or events based on a query. For example, there
can be many specific events overwhelming your database. In this example, you might not want to wait
for the event to age out if you are keeping your events for six months. Instead you want that specific
event deleted immediately or nightly.
Purging these events can significantly improve the performance of your McAfee ePO server and
database.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, then click Action | New Task to open the Server Task Builder.
2 Type a name for the task, for example Delete 1059 client events, then on the Actions tab, click
Purge Client Events from the Actions list.
3 Click Purge by Query, then select the custom query that you created.
This menu is automatically populated when table queries are created for client events.
4 Schedule the task to run every day during non-business hours, then click Save.
See also
Create custom table queries: best practice on page 357
2 Replicate that content to your distributed repositories. This ensures that multiple copies of the
content are available and remain synchronized. This also allows clients to update their content from
their nearest repository.
The most important content are the DAT files for VirusScan Enterprise, released daily at approximately
3 p.m. Eastern Time (19:00 UTC or GMT).
Optionally, many users with larger environments choose to test their DAT files in their environment
before deployment to all their systems.
Testing your DAT files before deployment requires a predictable pull schedule.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, then click Actions | New task.
2 In the Server Task Builder dialog box, type a task name and click Next.
Best practice: When you create a pull task for content, select only the packages that apply to your
environment instead of selecting All packages. This keeps the size of your Master Repository
manageable. It also reduces the bandwidth used during the pull from the McAfee website and during
replication to your distributed repositories.
4 Click Next.
5 Schedule your pull task to run at least once a day after 3 p.m. Eastern Time, then click Next.
6 Click the Summary tab, confirm that the server task settings are correct, then click Save.
Now you have created a server task that automatically pulls the McAfee DAT files and content from the
public McAfee servers.
These two events can be enabled on the McAfee ePO server. If you never disabled them, you might
find a significant number of these events when you run the Event Summary Query. These two events can,
for some users, make up 80 percent of the events in the database, use a tremendous amount of
space, and impact the performance of the database.
The 1059 events indicate that a file was not scanned, but the user was given access. Disabling the 1059
event means that you lose visibility of a security risk.
So why are these events in there? These events have historic significance and go back several years
and are meant to tell you that a file was not scanned by VirusScan Enterprise. This failure to scan the
file might be due to one of two reasons:
The scan timed out due to the size of the file, which is a 1059 event.
It was inaccessible due to password protection or encryption on the file, which is a 1051 event.
Disable these two events under event filtering, to prevent a flood of these events into your database.
By disabling these events, you are effectively telling the agent to stop sending these events to McAfee
ePO.
VirusScan Enterprise still logs these events in the On-access scanner log file for reference on the local
client.
Optionally, you can disable additional events, but this is not typically needed because most of the
other events are important and are generated in manageable numbers. You can also enable additional
events, as long as you monitor your event summary query to make sure that the new event you
enabled does not overwhelm your database.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, in the Setting Categories list select Event Filtering, then click
Edit.
2 In The agents forwards list on the Edit Event Filtering page, scroll down until you see these events, then
deselect them:
1051: Unable to scan password protected (Medium)
3 Click Save.
Now these two events are no longer saved to the McAfee ePO server database when they are
forwarded from the agents.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To duplicate the Agent Versions Summary query, select Menu | Reporting | Queries & Reports, then find
the Agent Versions Summary query in the list.
2 In the Actions column of the Agent Versions Summary query, click Duplicate. In the Duplicate dialog
box, change the name, select a group to receive the copy of the query, then click OK.
3 Navigate to the duplicate query that you created, then click Edit in the Actions column to display the
preconfigured Query Builder.
4 In the Chart tab, in the Display Results As list, expand List and select Table.
5 To configure the Sort by fields, in the Configure Chart: Table page, select Product Version (Agent) under
Agent Properties in the list, click Value (Descending), then click Next.
6 In the Columns tab, remove all preconfigured columns except System Name, then click Next.
c For the Value column, type the current McAfee Agent version number.
Typing the current agent number means that the query finds only versions "earlier than" that
version number.
Now your new query can run from a product deployment to update the old McAfee Agent versions.
Task
For details about product features, usage, and best practices, click ? or Help.
c Next to Package, select the McAfee Agent that you want installed on the systems. Select the
language and repository branch (Evaluation, Current, or Previous) that you want to deploy from.
d Next to Command line, specify any command-line installation options. See the McAfee Agent
Product Guide for information on command-line options.
e In the Select the systems group, click Select Systems, and from the dialog box, click the Queries tab and
configure these options, then click OK:
Select the Agent Version Summary table query that you created.
f Next to Select a start time, select Run Immediately from the list.
3 Click Save.
The Product Deployment project starts running and allows you to monitor the deployment process and
status.
See also
Monitor and edit deployment projects on page 182
Initial troubleshooting
Initially, when a system is not communicating with the McAfee ePO server, try these steps:
1 From the System Tree, select the system and click Actions | Agents | Wake Up Agents.
2 To delete the device from McAfee ePO, but not remove the agent in the System Tree, select the
system and click Actions | Directory Management | Delete. Do not select Remove agent on next agent-server
communication.
The system appears in the System Tree Lost and Found group.
It's more efficient to either delete or automatically move these inactive systems. Most organizations
choose a deadline of between 1430 days of no communication to delete or move systems. For
example, if a system has not communicated with the McAfee ePO server after that deadline you can:
Move that system to a group in your tree that you can designate as, for example, Inactive Agents.
A preconfigured Inactive Agent Cleanup Task exists, disabled by default, that you can edit and enable
on your server.
The instructions in this task describe how to create a copy of the existing Inactive Agents query to
change the deadline to 2 weeks.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To duplicate the Inactive Agents query, select Menu | Reporting | Queries & Reports, then find the Inactive
Agents query in the list.
3 In the Duplicate dialog box change the name, select a group to receive the copy of the query, then
click OK.
4 Navigate to the duplicate query that you created and, in the Actions column, click Edit to display the
preconfigured Query Builder.
5 To change the Filter tab settings from once a month to every two weeks, set the Last Communications
property, Is not within the last comparison, to 2 Weeks value.
Don't change the and Managed State property, Equals comparison, or the Managed value.
6 Click Save.
Now your new Inactive Agents query is ready to run from a server task to delete systems with an
inactive agent.
Deleting a system from the System Tree deletes only the record for that system from the McAfee ePO
database. If the system physically exists, it continues to perform normally with the last policies it
received from the McAfee ePO server for its applicable products.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To create a duplicate of the Inactive Agent Cleanup Task, select Menu | Automation | Server Tasks, then
find the Inactive Agent Cleanup Task in the server tasks list.
2 Click the preconfigured Inactive Agent Cleanup Task, click Actions | Duplicate.
3 In the Duplicate dialog box, change the server task name, then click OK.
4 In the server task row you created, click Edit to display the Server Task Builder page.
5 From the Descriptions tab, type any needed notes, click Enabled in Schedule status, then click Next.
b For Query, click ... to open the Select a query from the list dialog box.
c Click the group tab where you saved your copy of the Inactive Agents query, select your query,
then click OK.
Do not click Remove agent. This setting causes McAfee ePO to delete the McAfee Agent from the
inactive systems when they are removed from the System Tree. Without the agent installed,
when the removed system reconnects to the network it cannot automatically start
communicating with the McAfee ePO server and reinsert itself back into the System Tree.
(Optional) Instead of using the default subaction Delete Systems, you can select Move Systems to
another Group. This moves the systems found by the query to a designated group, for example,
Inactive Systems in your System Tree.
7 Click Next, schedule when you want this server task to run, then save the server task.
Now any inactive systems are automatically removed from the McAfee ePO server, and your system
compliance reports provide more accurate information.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then click Actions | New.
2 On the Query Wizard Result Types tab for the Feature Group, select Events, then in the Result Types
pane, click Threat Events, then click Next.
3 On the Chart tab, in the Display Results As list, select Single Line Chart.
4 In the Configure Chart: Single Line Chart pane, configure these settings, then click Next:
In Time base is, select Event Generated Time.
5 In the Columns tab, in the Available Columns list select these columns to display, then click Next:
Event Generated time Event Category
6 In the Filter tab, Available Properties list, configure this Required Criteria:
For Event Generated Time, select these settings from the Is within the last list, 3 and Months.
For Event Category, select these settings from the Belongs to list, Malware.
For Action Taken, select these settings from the lists Equals and Deleted.
7 Click Save to display the Save Query page, then configure these settings:
For Query Name, type a query name, for example, Total Infected Systems Cleaned Per
Week.
For Query Group, click New Group, type the query group name, then click Public.
8 Click Save.
When you run this query, it returns the number of infected systems cleaned per week. This
information provides a benchmark of the overall status of your network.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To duplicate the existing Threat Event Descriptions in the Last 24 Hours query, select Menu | Reports | Queries &
Reports, then find and select the Threat Target IP Address query in the list.
2 Click Actions | Duplicate and in the Duplicate dialog box, edit the name, select the group to receive
the copy, then click OK.
3 In the Queries list, find the new query that you created and click Edit.
The duplicated query is displayed in the Query Builder with the Chart tab selected.
5 In the Configure Chart: Table dialog box, select Threat Target IPv4 Address from the sort by list and Value
(Descending), then click Next.
It might help to move the Threat Target IPv4 Address closer to the left of the table, then click Next.
7 Click the Summary tab, confirm that the query settings are correct, then click Save.
8 In the Queries list, find the query that you created, then click Run.
Now you have a query to find malware events and sort them by IP subnet address.
Tasks
Create a server task to run compliance queries best practice on page 255
You must create a server task to run your compliance queries weekly to automate
generating your managed systems' compliance report.
Create a report to include query output best practice on page 256
Once you have the query data saved, you must create a report to contain the information
from the queries you ran before you can send it to the administrator team.
Create a server task to run and deliver a report: best practice on page 257
You must create a server task to automatically run the report and send the compliance
report to your administrators.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, then click Actions | New Task.
c Click Next.
b Click + to create another action, and in the second Actions list, select Run Query and configure
these settings, then Next.
For Query, select Inactive Agents.
d Change the Schedule settings to configure the task to run on Monday at 2:00 AM.
You can set the schedule to run when and as often as you want.
e Confirm that all settings are correct in the Summary tab, then click Save.
That completes creating the server task to automatically run the two compliance queries, then save
the output of the queries to CSV files.
Create a report that contains the data captured from your compliance queries, which is run
automatically using a server task, then emailed to the administrators every Monday morning.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then select the Report tab.
3 Click Name and type a name for the report, click Description and, optionally, type a description, click
Group, and select an appropriate group to receive the report, then click OK.
4 In the Report Layout pane, drag and drop these query input formats from the Toolbox list:
For the VSE: Compliance Over the Last 30 Days chart query, drag the Query Chart tool into the
Report Layout pane, then from the Query Chart list select VSE: Compliance Over the Last 30 Days, then click
OK.
For the Inactive Agents table query, drag the Query Table tool into the Report Layout pane, then from
Query table list, select Inactive Agents, then click OK.
5 Click Save, and the new compliance report is listed in the Reports tab.
6 To confirm that your report is configured correctly, click Run in the Actions column for your report,
then verify that the Last Run Status displays Successful.
7 To see the report, click the link in the Last Run Result column, then open or save the report.
That completes creating the report to display the two compliance queries and save their output to a
PDF file.
Use a server task to email the report to the administrators every Monday morning at 5:00 a.m.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, then click Actions | New Task.
2 In the Server Task Builder, configure these settings, then click Next.
a In the Descriptions tab, type a name and notes.
3 In the Actions tab, select Run Report, configure these settings, then click Next.
a For Select a report to run, select the compliance report you configured.
e For Subject, type the information you want to appear in the subject line of the email.
d Change the Schedule settings to configure the task to run on Monday at 5:00 AM.
You can set the schedule to run when and as often as you want.
e Confirm that all settings are correct in the Summary tab, then click Save.
That completes the final task to create a compliance report that runs automatically and is delivered to
your administrators every Monday morning at 5 a.m.
See also
Create a report to include query output best practice on page 256
Repositories house your security software packages and their updates for distribution to your managed
systems.
Security software is only as effective as the latest installed updates. For example, if your DAT files are
out of date, even the best anti-virus software cannot detect new threats. It is critical that you develop
a strong updating strategy to keep your security software as current as possible.
The McAfee ePO repository architecture offers flexibility to ensure that deploying and updating
software is as easy and automated as your environment allows. Once your repository infrastructure is
in place, create update tasks that determine how, where, and when your software is updated.
Contents
What repositories do
Repository types and what they do
Repository branches and their purposes
Using repositories
Setting up repositories for the first time
Manage source and fallback sites best practice
Verify access to the source site best practice
Configure settings for global updates best practice
Configure agent policies to use a distributed repository best practice
Use SuperAgents as distributed repositories
Create and configure repositories on FTP or HTTP servers and UNC shares
Using UNC shares as distributed repositories
Use local distributed repositories that are not managed
Work with the repository list files
Change credentials on multiple distributed repositories
Pulling tasks
Replication tasks
Repository selection
What repositories do
The agents on your managed systems obtain their security content from repositories on the McAfee
ePO server. This content keeps your environment up to date.
Repository content can include the following:
Patches and any other software needed for client tasks that you create using McAfee ePO
One common misconception is that a repository is created by installing a McAfee ePO server on a
system. Unlike your server, repositories do not manage policies, collect events, or have code installed
on them. A repository is nothing more than a file share located in your environment that your clients
can access.
Master Repository The Master Repository regularly pulls DAT and engine update files from
the source site.
Distributed repositories The Master Repository replicates the packages to distributed
repositories in the network.
Managed systems The managed systems in the network retrieve updates from a distributed
repository.
Fallback site If managed systems cant access the distributed repositories or the Master
Repository, they retrieve updates from the fallback site.
These components give you the flexibility to develop an updating strategy so that your systems are
always current.
Source site
The source site provides all updates for your Master Repository. The default source site is the McAfee
http update site, but you can change the source site or create multiple source sites.
We recommend using the McAfee http or McAfee ftp update sites as your source site.
Source sites are not required. You can download updates manually and check them into your Master
Repository. But, using a source site automates this process.
McAfee posts software updates to these sites regularly. For example, DAT files are posted daily.
Update your Master Repository with updates as they are available.
Use pull tasks to copy source site contents to the Master Repository.
McAfee update sites provide updates to detection definition (DAT) and scanning engine files, and some
language packs. Manually check in all other packages and updates, including service packs and
patches, to the Master Repository.
Master Repository
The Master Repository maintains the latest versions of security software and updates for your
environment. This repository is the source for the rest of your environment.
Distributed repositories
Distributed repositories host copies of your Master Repository. Consider using distributed repositories
and placing them throughout your network. This configuration ensures that managed systems are
updated while network traffic is minimized, especially across slow connections.
As you update your Master Repository, McAfee ePO replicates the contents to the distributed
repositories.
Automatically when specified package types are checked in to the Master Repository, as long as
global updating is enabled.
Do not configure distributed repositories to reference the same directory as your Master Repository. This
locks the files on the Master Repository. This can cause failure for pulls and package check-ins, and can
leave the Master Repository in an unusable state.
A large organization can have multiple locations with limited bandwidth connections between them.
Distributed repositories help reduce updating traffic across low-bandwidth connections, or at remote
sites with many endpoints. If you create a distributed repository in the remote location and configure
the systems in that location to update from this distributed repository, the updates are copied across
the slow connection only once to the distributed repository instead of once to each system in the
remote location.
If global updating is enabled, distributed repositories update managed systems automatically, when
selected updates and packages are checked in to the Master Repository. Update tasks are not needed.
But, if you want automatic updating, create SuperAgents in your environment. Create and configure
repositories and the update tasks.
If distributed repositories are set up to replicate only selected packages, your newly checked-in package
is replicated by default. To avoid replicating a newly checked-in package, deselect it from each
distributed repository or disable the replication task before checking in the package.
Fallback site
The fallback site is a source site enabled as the backup site. Managed systems can retrieve updates
when their usual repositories are inaccessible. For example, when network outages or virus outbreaks
occur, accessing the established location might be hard. Managed systems can remain up-to-date
using a fallback site. The default fallback site is the McAfee http update site. You can enable only one
fallback site.
If managed systems use a proxy server to access the Internet, configure agent policy settings to use
proxy servers when accessing the fallback site.
See also
Avoid replication of selected packages on page 285
Disable replication of selected packages on page 286
Update tasks can retrieve updates from any branch of the repository, but you must select a branch
other than the Current branch when checking in packages to the Master Repository. If a non-Current
branch is not configured, the option to select a branch other than Current does not appear.
To use the Evaluation and Previous branches for packages other than updates, you must configure this
in the Repository Packages server settings.
Current branch
The Current branch is the main repository branch for the latest packages and updates. Product
deployment packages can be added only to the Current branch, unless support for the other branches
has been enabled.
Evaluation branch
You might want to test new DAT and engine updates with a few network segments or systems before
deploying them to your entire organization. Specify the Evaluation branch when checking in new DATs
and engines to the Master Repository, then deploy them to a few test systems. After monitoring the
test systems for several hours, you can add the new DATs to your Current branch and deploy them to
your entire organization.
Previous branch
Use the Previous branch to save and store prior DAT and engine files before adding the new ones to
the Current branch. If you experience an issue with new DAT or engine files in your environment, you
have a copy of a previous version that you can redeploy to your systems if necessary. McAfee ePO
saves only the most immediate previous version of each file type.
You can populate the Previous branch by selecting Move existing packages to Previous branch when you add
new packages to your Master Repository. The option is available when you pull updates from a source
site and, when you manually check in packages to the Current branch.
This flowchart describes when to use these three different branches of the Master Repository.
Using repositories
Distributed repositories work as file shares that store and distribute security content for your managed
endpoints.
Repositories play an important role in your McAfee ePO infrastructure. How you configure repositories
and deploy them depends on your environment.
Your McAfee ePO server does not require configuration to make it the Master Repository. It is the Master
Repository by default.
HTTP repositories
SuperAgents
There is no operating system requirement for the systems that host your repository. As long as
your McAfee ePO server can access the folders you specify to copy its content to, and as long as
the agents can connect to the folder to download their updates, everything works as expected.
Your agent updates and McAfee ePO replication tasks are only as good as your repositories. If you
are already using one of these repositories and your environment works well, do not change the
configuration.
If you are starting with a new installation with no repositories, use a SuperAgent because they are
easy to configure and are reliable.
Unmanaged repositories
If you are unable to use managed systems as distributed repositories, you can create and maintain
unmanaged distributed repositories but a local administrator must keep the distributed files up-to-date
manually.
Once the distributed repository is created, use McAfee ePO to configure managed systems of a specific
System Tree group to update from it.
Manage all distributed repositories through McAfee ePO. This ensures your managed environment is up
to date. Use unmanaged distributed repositories only if your network or organization's policy doesn't
allow managed distributed repositories.
FTP repositories
FTP servers can host a distributed McAfee ePO server repository. You might already have FTP servers
in your environment, and you can store McAfee content there as well.
FTP repositories are:
Fast
Helpful in a DMZ where HTTP might not be optimal and UNC shares can't be used
Using FTP servers, your clients do not need authentication and can use an anonymous log on pull their
content. No authentication reduces the chance that a client fails to pull its content.
You can use an FTP server to host a distributed repository. Use FTP server software, such as Microsoft
Internet Information Services (IIS), to create a folder and site location for the distributed repository.
See your web server documentation for details.
HTTP repositories
HTTP servers can host a distributed McAfee ePO server repository. You might already have HTTP
servers in your environment.
HTTP servers can be fast serving out files to large environments. Your HTTP servers allow clients to
pull their content without authentication, which reduces the chance that a client might fail to pull its
content.
You can use an HTTP server to host a distributed repository. Use HTTP server software, such as
Microsoft IIS, to create a folder and site location for the distributed repository. See your web server
documentation for details.
Because most administrators are familiar with the concept of UNC shares, UNC shares might seem like
the easiest method to choose, but that's not always the case.
If you use UNC shares to host your McAfee ePO server repository, you must correctly configure the
account and shares. See the Recommendations for download credentials when using UNC shares as
software repositories in ePolicy Orchestrator, KB70999, for details.
4 Create two accounts, one with read access and one with write access.
If your IT group has password rules, such as changing a password every 30 days even for service
accounts, changing those passwords in McAfee ePO can be cumbersome. You must change the
password for access to each of the distributed repository shares in the Windows operating system and
in the configuration settings for each of the UNC Distributed Repositories in McAfee ePO. Access the
McAfee ePO UNC Distributed Repositories settings using Menu | Software | Distributed Repositories.
All these tasks increase the chance of failure because these processes must be completed manually.
Your agents might not properly update if your agents cannot authenticate to your UNC share because
they are not part of the domain or the credentials are incorrect.
A SuperAgent also broadcasts wake-up calls to other agents using that SuperAgent repository. When
the SuperAgent receives a wake-up call from the McAfee ePO server, it wakes up the agents using its
repository connection.
This is an alternative to sending ordinary wake-up calls to each agent in the network or sending an
agent wake-up task to each computer.
For detailed information about SuperAgents and how to configure them, see the McAfee Agent Product
Guide.
SuperAgent repositories
Use systems hosting SuperAgents as distributed repositories. SuperAgent repositories have several
advantages over other types of distributed repositories:
Folder locations are created automatically on the host system before adding the repository to the
repository list.
SuperAgent considerations
When you configure systems as SuperAgents, follow these guidelines.
Use existing file repositories in your environment, for example Microsoft System Center
Configuration Manager (SCCM).
Turn off Global Updating to prevent unwanted updates of new engines or patches from the Master
Repository.
You use the Repository policy to create the SuperAgent hierarchy. We recommend that you have a
three-level hierarchy of SuperAgents in your network.
See McAfee Agent Product Guide for details about creating a hierarchy of SuperAgents, SuperAgent
caching (lazy caching), and communication interruptions.
Create a SuperAgent
Creating a SuperAgent requires these tasks.
1 Create a new SuperAgents policy.
2 Create a new group in the System Tree, for example named SuperAgents
Once you have created the new SuperAgents group, you can drag any system into that group and it
becomes a SuperAgent the next time it communicates with the McAfee ePO server.
See also
Best practice: Global Updating restrictions on page 275
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog to open the Policy Catalog page.
2 To duplicate the My Default policy from the Product drop-down list, select McAfee Agent, and from the
Category drop-down list, select General.
4 In the Duplicate Existing Policy dialog box, change the policy name, add any notes for reference, and
click OK.
5 From the Policy Catalog page, click SuperAgents tab, select Convert agents to SuperAgents to convert the
agent to a SuperAgent and update its repository with the latest content.
6 Select Use systems running SuperAgents as distributed repositories to use the systems that host SuperAgents
as update repositories for the systems in its broadcast segment, then provide the Repository path.
7 Select Enable Lazy caching to allow the SuperAgents to cache content when it is received from the
McAfee ePO server.
8 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Systems Section | System Tree, click System Tree Actions | New Subgroups, and give it a distinctive
name, for example SuperAgents.
2 Click OK. The new group appears in the System Tree list.
Best practice: Assign the new SuperAgents policy to the new SuperAgent group
Assigning the SuperAgent policy to the new group completes the configuration of the SuperAgent
group.
Task
For details about product features, usage, and best practices, click ? or Help.
1 In the System Tree, select the SuperAgent group that you created, select the Assigned Policies tab, then
select McAfee Agent from the Product list.
2 From the Actions column for the General category, click Edit Assignment.
3 From the McAfee Agent: General page, click Break inheritance and assign the policy and settings below. Select the
SuperAgent policy that you created from the Assigned Policy list, then click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 In the System Tree, click the Systems tab and find the system that you want to change to a SuperAgent
repository.
2 Drag that row with the system name and drop it into the new SuperAgent group you created in the
System Tree.
Once the system communicates with the McAfee ePO server, it changes to a SuperAgent repository.
3 To confirm that the system is now a SuperAgent repository, select Menu | Software | Distributed
Repositories and select SuperAgent from the Filter list. The new SuperAgent repository appears in the
list.
Before the system appears as a SuperAgent in the group, two agent-server communications must
occur. First, the system must receive the policy change and second, the agent must respond back to
the McAfee ePO server that is now a SuperAgent. This conversion might take some time depending
on your ASCI settings.
If needed, you can export the repository list to external files (SiteList.xml or SiteMgr.xml). The
two files have different uses:
SiteList.xml file
SiteMgr.xml file
Back up and restore your distributed repositories and source sites if you have to reinstall the
server.
Import the distributed repositories and source sites from a previous installation of the McAfee ePO
software.
How many nodes do you manage with the McAfee ePO server?
Remember, the purpose of a repository is to allow clients to download the large amount of data in
software updates locally instead of connecting to the McAfee ePO server and downloading the updates
across the slower WAN links. At a minimum, your repository is used to update your signature, or DAT
files for VirusScan Enterprise daily. In addition, your repository is used by your agents to download
new software, product patches, and other content, for example Host Intrusion Prevention content.
Typically you can create a repository for each large geographic location, but there are several caveats.
Plus, you must avoid the most common mistakes of having too many or too few repositories and
overloading your network bandwidth.
Repositories have no hard technical limit to how many nodes they can handle. With a properly crafted
update task for your clients, repositories can update a significant number of nodes.
The following table is an estimate of the updates a repository can handle and the hardware needed.
Many factors can influence these specifications, for example how you update content, products, and
patches.
Disk space needed for a repository is rarely a concern with todays storage standards. Even if you
checked in several McAfee endpoint products, for example McAfee Endpoint Encryption, SiteAdvisor
Enterprise, and Policy Auditor, your repository disk space is in the 1-GB range.
To find the exact size of the product installation files in Windows Explorer, right-click the Install folder
and click Properties. The product files are at this default path:
These examples provide three common organization sizes and their repository size.
Uses VirusScan Enterprise, Host Intrusion Prevention, McAfee Endpoint Encryption, and Host Data
Loss Prevention.
Has a small data center in the same building where the devices reside, so there are no WAN links
and all clients are on a 100 MB LAN.
In this example, you can use the primary McAfee ePO server to act as the only repository. The McAfee
ePO server is always the Master Repository by default. For 3,000 clients, the McAfee ePO server can
handle:
Policy deployment
Event collection
Has one data center in New York where all traffic destined for the Internet is routed.
Four offices in the U.S. located in New York, San Francisco, Dallas, and Orlando.
Each office has approximately 3,0004,000 nodes and a T1 connection (1.544 Mb/s) back to the
New York office.
The McAfee ePO server, located in New York, manages all 20,000 nodes for policies and events for
McAfee Endpoint Encryption, VirusScan Enterprise, Host Intrusion Prevention, and Application Control.
A dedicated SuperAgent repository is placed in each of the three major offices that connect to the data
center. These repositories are dedicated SuperAgent repositories that connect to the New York data
center with medium hardware class servers, for example a single processor 3 GHz CPU and 4 GB of
RAM. The SuperAgents only job is to serve out files to the McAfee Agent at each office. When you
have multiple repositories, you can specify the order in which agents access repositories. In this
example, you would order the repositories so that the dedicated SuperAgent repositories that connect
to the New York data center are accessed first. You can even disable access to other repositories you
don't want the agents to use.
Three major regions of the U.S. offices, with one data center in New York and three additional
offices across the country.
The one McAfee ePO server in the New York data center runs VirusScan Enterprise, Host Intrusion
Prevention, and SiteAdvisor Enterprise.
The largest office in the U.S., other than the New York Data Center, has an Agent Handler installed.
The Europe, Middle East, and Africa (EMEA) offices have another data center in the UK with several
other offices across EMEA. These other offices range from 200 nodes 3,000 nodes.
Put one server class client, for example dual processor 3 GHz and 8 GB of RAM, at each site in the
U.S.
Use the Systems Management Server (SMS) and install the SuperAgents at each office in the EMEA
because they are smaller sites. Your repository does not have to be dedicated to McAfee as long as it's
not serving files to several thousand agents.
The small offices in the APAC region use slow WAN links back to the McAfee ePO server in the New
York. Plus these WAN links are already saturated with traffic. These links mean replication from the
McAfee ePO server to an APAC repository is not feasible unless it is done during off hours. This option
is reasonable if you want to put SuperAgents in APAC.
Fortunately, the APAC offices each have their own fast dedicated connections out to the Internet and
do not have to route Internet traffic back to the data center in New York. That provides two potential
solutions:
You can adjust the client tasks in APAC to have them go to the next nearest repository, which
might be in California.
You must completely randomize the agents updating schedule so you spread their updates
throughout the day.
You can put a SuperAgent in the DMZ (publicly accessible on the Internet) at one of the data
centers. Then adjust the APAC client tasks forcing them to only update from this SuperAgent in the
DMZ. Because the SuperAgent is local to the data center, replication from McAfee ePO is fast.
Because the agents dont have to use a WAN link and can go straight to the Internet and your slow
WAN bandwidth concerns are solved.
In large environments, the McAfee ePO server is already busy distributing policies and collecting
events. You can improve performance by changing your McAfee Agent policy so that agents do not pull
content from the McAfee ePO server directly. Instead of pulling content from the Master Repository,
agents access dedicated repositories that are created for local access. This change forces the agents
to use only the repositories you created manually. You can specify which repositories agents access
when selecting a repository within a policy.
In smaller environments, where fewer nodes are managed, there is no need for this change. The server
can handle all these tasks without impacting performance.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Product list, select McAfee Agent, then from the Category list, select Repository, and click the
policy name to modify.
4 In the Repository list, click Disable in the Actions column for the McAfee ePO server.
This diagram shows the McAfee ePO server disabled.
5 Click Save.
Now you have improved the McAfee ePO server performance because the agents are no longer
accessing it for updates.
Global Updating is disabled by default when you install McAfee ePO software.
To confirm the Global Updating setting, select Menu | Configuration | Server Settings and select Global Updating
from the Setting Categories list. Confirm that the status is disabled. If not, click Edit and change the
status.
If you are a user with a large environment and where bandwidth is critical, you can saturate your WAN
links if you have Global Updating enabled. You might think having Global Updating enabled makes you
receive their DATs quickly. But eventually, McAfee, for example releases an update to its McAfee
Endpoint Security engine that can be several megabytes, compared to the 400-KB DAT files. This
engine update typically occurs twice a year. When that release occurs the McAfee ePO server pulls the
engine from McAfee, starts replicating it to the distributed repositories, and starts waking up agents to
receive the new engine immediately. This engine update can saturate your WAN links and roll out an
engine that you might prefer to upgrade in a staged release.
If you have a large environment, you can still use Global Updating, but you must disable it when a new
engine or product patch is released or the updates could saturate your WAN links.
2 The McAfee ePO server performs an incremental replication to all distributed repositories.
3 The McAfee ePO server issues a wake-up call to all SuperAgents in the environment.
4 The SuperAgent broadcasts a global update message to all agents in the SuperAgent subnet.
5 Upon receipt of the broadcast, the agent is supplied with a minimum catalog version needed.
6 The agent searches the distributed repositories for a site that has this minimum catalog version.
7 Once a suitable repository is found, the agent runs the update task.
You must be an administrator or have appropriate permissions to define, change, or delete source or
fallback sites.
Use the default source and fallback sites. If you require different sites for this purpose, you can create
new ones.
Tasks
Create source sites on page 276
Create a source site from Server Settings.
Switch source and fallback sites best practice on page 277
Use Server Settings to change source and fallback sites.
Edit source and fallback sites best practice on page 278
Use Server Settings to edit the settings of source or fallback sites, such as URL address,
port number, and download authentication credentials.
Delete source sites or disabling fallback sites best practice on page 278
If a source or fallback site is no longer in use, delete or disable the site.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click Add Source Site. The Source Site Builder wizard appears.
3 On the Description page, type a unique repository name and select HTTP, UNC, or FTP, then click
Next.
4 On the Server page, provide the web address and port information of the site, then click Next.
From the URL drop-down list, select DNS Name, IPv4, or IPv6 as the type of server address, then
enter the address.
Option Definition
DNS Name Specifies the DNS name of the server.
IPv4 Specifies the IPv4 address of the server.
IPv6 Specifies the IPv6 address of the server.
Enter the port number of the server: FTP default is 21; HTTP default is 80.
5 On the Credentials page, provide the Download Credentials used by managed systems to connect to
this repository.
Use credentials with read-only permissions to the HTTP server, FTP server, or UNC share that hosts
the repository.
HTTP or FTP server type:
Select FTP or HTTP authentication (if the server requires authentication), then enter the user account
information.
6 Click Test Credentials. After a few seconds, a confirmation message appears that the site is accessible
to systems using the authentication information. If credentials are incorrect, check the:
User name and password.
7 Click Next.
8 Review the Summary page, then click Save to add the site to the list.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select Source Sites, then click Edit. The Edit Source Sites page appears.
3 From the list, locate the site that you want to set as fallback, then click Enable Fallback.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Locate the site in the list, then click the name of the site.
4 From the Source Site Builder, edit the settings on the builder pages as needed, then click Save.
Task
1 Select Menu | Configuration | Server Settings.
2 Select Source Sites, then click Edit. The Edit Source Sites page appears.
3 Click Delete next to the required source site. The Delete Source Site dialog box appears.
4 Click OK.
Tasks
Configure proxy settings on page 278
To update your repositories, configure proxy settings to pull DATs.
Configure proxy settings for the McAfee Agent on page 279
Configure the proxy settings the McAfee Agent uses to connect to the download site.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the list of setting categories, select Proxy Settings, then click Edit.
If you are using the default source and fallback sites, or if you configure another HTTP source
site and FTP fallback site, configure both HTTP and FTP proxy authentication information here.
b Next to Proxy authentication, configure the settings according to whether you pull updates from
HTTP repositories, FTP repositories, or both.
c Next to Exclusions, select Bypass Local Addresses, then specify distributed repositories that the
server can connect to directly by typing the IP addresses or the fully-qualified domain name of
those systems, separated by semicolons.
d Next to Exclusions, select Bypass Local Addresses, then specify distributed repositories that the
server can connect to directly by typing the IP addresses or the fully-qualified domain name of
those systems, separated by semicolons.
4 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then from the Product list click McAfee Agent, and from the Category
list, select Repository.
A list of agents configured for the McAfee ePO server appears.
4 Select Use Internet Explorer settings (Windows only) for Windows systems, and select Allow user to configure proxy
settings, if appropriate.
There are multiple methods to configuring Internet Explorer for use with proxies. McAfee provides
instructions for configuring and using McAfee products, but does not provide instructions for
non-McAfee products. For information on configuring proxy settings, see Internet Explorer Help and
http://support.microsoft.com/kb/226473.
5 Select Configure the proxy settings manually to configure the proxy settings for the agent manually.
6 Type the IP address or fully-qualified domain name and the port number of the HTTP or FTP source
where the agent pulls updates. Select Use these settings for all proxy types to make these settings the
default settings for all proxy types.
7 Select Specify exceptions to designate systems that do not require access to the proxy. Use a
semicolon to separate the exceptions.
8 Select Use HTTP proxy authentication or Use FTP proxy authentication, then provide a user name and
credentials.
9 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Global Updating from the Setting Categories, then click
Edit.
2 Set the status to Enabled and specify a Randomization interval between 0 and 32,767 minutes.
Selected packages Select this option to limit the signatures and engines, and patches and Service
Packs included in the global update.
When using global updating, schedule a regular pull task (to update the Master Repository) at a time
when network traffic is minimal. Although global updating is much faster than other methods, it
increases network traffic during the update.
See also
Product and update deployment on page 219
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Policy | Policy Catalog, then select the Product as McAfee Agent and Category as Repository.
3 From Repository list selection, select either Use this repository list or Use other repository list.
Subnet distance Compares the IP addresses of endpoints and all repositories and sorts
repositories based on how closely the bits match. The more closely the IP addresses resemble
each other, the higher in the list the repository is placed.
User order in repository list Selects repositories based on their order in the list.
Click Move to Top or Move to Bottom to specify the order in which you want endpoints to select
distributed repositories.
Tasks
Create SuperAgent distributed repositories on page 281
To create a SuperAgent repository, the SuperAgent system must have a McAfee Agent
installed and running. We recommend using SuperAgent repositories with global updating.
Replicate packages to SuperAgent repositories on page 282
Select which repository-specific packages are replicated to distributed repositories.
Delete SuperAgent distributed repositories on page 282
Remove SuperAgent distributed repositories from the host system and the repository list
(SiteList.xml). New configurations take effect during the next agent-server communication.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the McAfee ePO console, select Menu | Policy | Policy Catalog, then from the Product list click McAfee
Agent, and from the Category list, select General.
A list of available general category policies available for use on your McAfee ePO server appears.
2 Create a policy, duplicate an existing one, or open one thats already applied to systems that hosts
a SuperAgent where you want to host SuperAgent repositories.
3 Select the General tab, then ensure Convert agents to SuperAgents (Windows only) is selected.
4 Select Use systems running SuperAgents as distributed repositories, then type a folder path location for the
repository. This location is where the Master Repository copies updates during replication. You can
use a standard Windows path, such as C:\SuperAgent\Repo.
All requested files from the agent system are served from this location using the agent's built-in
HTTP webserver.
5 Click Save.
6 Assign this policy to each system that you want to host a SuperAgent repository.
The next time the agent calls into the server, the new policy is retrieved. If you do not want to wait for
the next agent-server communication interval, you can send an agent wake-up call to the systems.
When the distributed repository is created, the folder you specified is created on the system if it did
not exist.
In addition, the network location is added to the repository list of the SiteList.xml file. This network
location makes the site available for updating by systems throughout your managed environment.
Task
For details about product features, usage, and best practices, click ? or Help.
Ensure that all packages required by any managed system using this repository are selected.
Managed systems go to one repository for all packages the task fails for systems that are
expecting to find a package type that is not present. This feature ensures packages that are used
only by a few systems are not replicated throughout your entire environment.
4 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the McAfee ePO console, click Menu | Policy | Policy Catalog, then click the name of the
SuperAgent policy you want to modify.
2 On the General tab, deselect Use systems running SuperAgents as distributed repositories, then click Save.
To delete a limited number of your existing SuperAgent distributed repositories, duplicate the
McAfee policy assigned to these systems and deselect Use systems running SuperAgents as distributed
repositories before saving it. Assign this new policy as-needed.
The SuperAgent repository is deleted and removed from the repository list. However, the agent still
functions as a SuperAgent as long as you leave the Convert agents to SuperAgents option selected.
Agents that have not received a new site list after the policy change continue to update from the
SuperAgent that was removed.
Tasks
Create a folder location on page 284
Create the folder that hosts repository contents on the distributed repository system.
Different processes are used for UNC share repositories and FTP or HTTP repositories.
Add the distributed repository to McAfee ePO on page 284
Add an entry to the repository list and specify the folder the new distributed repository
uses.
Avoid replication of selected packages on page 285
If distributed repositories are set up to replicate only selected packages, your newly
checked-in package is replicated by default. Depending on your requirements for testing
and validating, you might want to avoid replicating some packages to your distributed
repositories.
Disable replication of selected packages on page 286
If distributed repositories are set up to replicate only selected packages, your newly
checked-in package is replicated by default. To disable the impending replication of a
package, disable the replication task before checking in the package.
Enable folder sharing for UNC and HTTP repositories on page 286
On an HTTP or UNC distributed repository, you must enable the folder for sharing across
the network, so that your McAfee ePO server can copy files to the repository.
Edit distributed repositories on page 286
Edit a distributed repository configuration, authentication, and package selection options as
needed.
Delete distributed repositories on page 287
Delete HTTP, FTP, or UNC distributed repositories. Doing so also deletes the contents of the
distributed repositories.
For FTP or HTTP repositories, use your existing FTP or HTTP server software, such as Microsoft
Internet Information Services (IIS), to create a folder and site location. See your web server
documentation for details.
Do not configure distributed repositories to reference the same directory as your Master Repository.
Doing so locks files on the Master Repository, causing pulls and package check-ins to fail and leaving
the Master Repository in an unusable state.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Software | Distributed Repositories, then click Actions | New Repository. The Distributed
Repository Builder opens.
2 On the Description page, type a unique name and select HTTP, UNC, or FTP, then click Next. The name
of the repository does not need to be the name of the system hosting the repository.
Option Definition
DNS Name Specifies the DNS name of the server.
IPv4 Specifies the IPv4 address of the server.
IPv6 Specifies the IPv6 address of the server.
Enter the port number of the server: HTTP default is 80. FTP default is 21.
For HTTP server types, specify the Replication UNC path for your HTTP folder.
4 Click Next.
Select FTP or HTTP authentication (if the server requires authentication), then enter the user
account information.
Select Enter the download credentials, then enter domain and user account information.
b Click Test Credentials. After a few seconds, a confirmation message appears, stating that the site is
accessible to systems using the authentication information. If credentials are incorrect, check
the following:
User name and password
Click Test Credentials. After a few seconds, a confirmation message appears that the site is
accessible to systems using the authentication information. If credentials are incorrect, check
the following:
User name and password
8 Select whether to replicate all packages or selected packages to this distributed repository, then
click Next.
If you choose the Selected packages option, manually select the Signatures and engines and Products,
patches, service packs, etc. you want to replicate.
Ensure all packages required by managed systems using this repository are not deselected.
Managed systems go to one repository for all packages if a needed package type is not present in
the repository, the task fails. This feature ensures packages that only a few systems use are not
replicated throughout your whole environment.
9 Review the Summary page, then click Save to add the repository. The McAfee ePO software adds the
new distributed repository to its database.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Software | Distributed Repositories, then click a repository. The Distributed Repository
Builder wizard opens.
2 On the Package Types page, deselect the package that you want to avoid being replicated.
3 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Click Menu | Automation | Server Tasks, then select Edit next to a replication server task.
The Server Task Builder opens.
2 On the Description page, select the Schedule status as Disabled, then click Save.
Task
1 On the managed system, locate the folder you created using Windows Explorer.
5 Click OK.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Click Menu | Software | Distributed Repositories, then click Delete next to a repository.
Deleting the repository does not delete the packages on the system hosting the repository.
Do not use a share on your Domain Controller Create a share off your domain controller. A
local user on a domain controller is a domain user.
Secure the account you use to read from the UNC share
Follow these guidelines to make sure the account used to access the UNC share is secure.
Grant your UNC share account read-only rights for everyone except the McAfee ePO
server master repository When you set up your share, make sure that the account you
created has read-only rights to the directory and to the share permissions. Do not grant remote
writing to the share (even for administrators or other accounts). The only account allowed access is
the account you recently created.
The McAfee ePO server Master Repository must be able to write files to the UNC share account.
Create the account locally Create the account on the file share, not on the domain. Accounts
created locally do not grant rights to systems in the domain.
Use a specific account Create an account specifically for sharing repository data. Do not share
this account with multiple functions.
Make the account low privilege Do not add this account to any groups it does not need,
which includes "Administrators" and "Users" groups.
Disable extraneous privileges This account does not need to log on to a server. It is a
placeholder to get to the files. Examine this account's permissions and disable any unnecessary
privileges.
Use a strong password Use a password with 812 characters, using multiple character
attributes (lowercase and uppercase letters, symbols, and numbers). We recommend using a
random password generator so that your password is complex.
Enable File Auditing Always enable security audit logs to track access to your network shares.
These logs display who accesses the share, and when and what they did.
Change your passwords Change your password often. Make sure that the new password is
strong, and remember to update your McAfee ePO configuration with the new password.
Disable the account and share if it's no longer used If you switch to a different repository
type other than UNC, remember to disable or delete the account, and close and remove the share.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Copy all files and subdirectories in the Master Repository folder from the server.
For example, using a Windows 2008 R2 Server, this path is the default path on your server: C:
\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Software
2 Paste the copied files and subfolders in your repository folder on the distributed repository system.
3 Configure an agent policy for managed systems to use the new unmanaged distributed repository:
a Select Menu | Policy | Policy Catalog, then select the Product as McAfee Agent and Category as Repository.
Policy inheritance cannot be broken at the level of option tabs that constitute a policy. Therefore,
when you apply this policy to systems, ensure that only the correct systems receive and inherit
the policy to use the unmanaged distributed repository.
f Under Configuration, type the location of the repository using appropriate syntax for the repository
type.
k Click Save.
Any system where this policy is applied receives the new policy at the next agent-server
communication.
SiteMgr.xml Used when reinstalling the McAfee ePO server, or for importing into other McAfee
ePO servers that use the same distributed repositories or source sites.
Tasks
Export the repository list SiteList.xml file on page 289
Export the repository list (SiteList.xml) file for manual delivery to systems, or for import
during the installation of supported products.
Export the repository list for backup or use by other servers on page 290
Use the exported SiteMgr.xml file to restore distributed repositories and source sites.
Restore when you reinstall the McAfee ePO server, or when you want to share distributed
repositories or source sites with another McAfee ePO server.
Import distributed repositories from the repository list on page 290
Import distributed repositories from the SiteMgr.xml file after reinstalling a server, or
when you want one server to use the same distributed repositories as another server.
Import source sites from the SiteMgr.xml file on page 290
After reinstalling a server, and when you want two servers to use the same distributed
repositories, import source sites from a repository list file.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Software | Master Repository, then click Actions | Export Sitelist.
The File Download dialog box appears.
2 Click Save, browse to the location to save the SiteList.xml file, then click Save.
Once you have exported this file, you can import it during the installation of supported products. For
instructions, see the installation guide for that product.
You can also distribute the repository list to managed systems, then apply the repository list to the
agent.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Software | Distributed Repositories (or Source Sites), then click Actions | Export Repositories (or
Export Source Sites).
The File Download dialog box appears.
2 Click Save, browse to the location to save the file, then click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Software | Distributed Repositories, then click Actions | Import Repositories.
The Import Repositories page appears.
2 Browse to select the exported SiteMgr.xml file, then click OK. The distributed repository is
imported into the server.
3 Click OK.
The selected repositories are added to the list of repositories on this server.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, then from the Setting Categories list select Source Sites and click
Edit.
2 Click Import.
3 Browse to and select the exported SiteMgr.xml file, then click OK.
4 Select the source sites to import into this server, then click OK.
The selected source sites are added to the list of repositories on this server.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Select the type of distributed repository for which you want to change credentials, then click Next.
Pulling tasks
Use pull tasks to update your Master Repository with DAT and Engine update packages from the
source site.
DAT and Engine files must be updated often. McAfee releases new DAT files daily, and Engine files less
frequently. Deploy these packages to managed systems as soon as possible to protect them against
the latest threats.
You can specify which packages are copied from the source site to the Master Repository.
Extra.DAT files must be checked in to the Master Repository manually. They are available from the
McAfee website.
A scheduled repository pull server task runs automatically and regularly at the times and days you
specify. For example, you can schedule a weekly repository pull task at 5:00 a.m. every Thursday.
You can also use the Pull Now task to check updates into the Master Repository immediately. For
example, when McAfee alerts you to a fast-spreading virus and releases a new DAT file to protect
against it.
If a pull task fails, you must check the packages into the Master Repository manually.
Once you have updated your Master Repository, you can distribute these updates to your systems
automatically with global updating or with replication tasks.
Bandwidth and network usage If you are using global updating, as recommended, schedule a
pull task to run when bandwidth usage by other resources is low. With global updating, the update
files are distributed automatically after the pull task finishes.
Frequency of the task DAT files are released daily, but you might not want to use your
resources daily for updating.
Replication and update tasks Schedule replication tasks and client update tasks to ensure
that the update files are distributed throughout your environment.
Replication tasks
Use replication tasks to copy the contents of the Master Repository to distributed repositories.
Unless you have replicated Master Repository contents to all your distributed repositories, some
systems do not receive them. Make sure that all your distributed repositories are up-to-date.
If you are using global updating for all your updates, replication tasks might not be necessary for your
environment, although they are recommended for redundancy. However, if you are not using global
updating for any of your updates, you must schedule a Repository Replication server task or run a
Replicate Now task.
Scheduling regular Repository Replication server tasks is the best way to ensure that your distributed
repositories are up-to-date. Scheduling daily replication tasks ensures that managed systems stay
up-to-date. Using Repository Replication tasks automates replication to your distributed repositories.
Occasionally, you might check in files to your Master Repository that you want to replicate to
distributed repositories immediately, rather than wait for the next scheduled replication. Run a
Replicate Now task to update your distributed repositories manually.
Schedule a daily incremental replication task. Schedule a weekly full replication task if it is possible for
files to be deleted from the distributed repository outside of the replication functionality of the McAfee
ePO software.
Repository selection
New distributed repositories are added to the repository list file containing all available distributed
repositories. The agent of a managed system updates this file each time it communicates with the
McAfee ePO server. The agent performs repository selection each time the agent (McAfee Framework
Service) service starts, and when the repository list changes.
Selective replication provides more control over the updating of individual repositories. When
scheduling replication tasks, you can choose:
Specific distributed repositories to which the task applies. Replicating to different distributed
repositories at different times lessens the impact on bandwidth resources. These repositories can
be specified when you create or edit the replication task.
Specific files and signatures that are replicated to the distributed repositories. Selecting only those
types of files that are necessary to each system that checks in to the distributed repository lessens
the impact on bandwidth resources. When you define or edit your distributed repositories, you can
choose which packages you want to replicate to the distributed repository.
This functionality is intended for updating only products that are installed on several systems in your
environment, like VirusScan Enterprise. The functionality allows you to distribute these updates only to
the distributed repositories these systems use.
You can also tightly control which distributed repositories agents use for updating by enabling or
disabling distributed repositories in the agent policy settings. Do not disable repositories in the policy
settings. Allowing agents to update from any distributed repository ensures that they receive the
updates.
Agent Handlers route communication between agents and your McAfee ePO server.
Each McAfee ePO server contains a master Agent Handler. Additional Agent Handlers can be installed
on systems throughout your network.
Helps manage an increased number of products and systems managed by a single, logical McAfee
ePO server in situations where the CPU on the database server is not overloaded.
Provides fault tolerant and load-balanced communication with many agents, including
geographically distributed agents.
Contents
How Agent Handlers work
Agent Handler details
Agent Handler functionality
Best Practices: Agent Handler installation and configuration
Best Practices: Adding an Agent Handler in the DMZ
Connect an Agent Handler in the DMZ to a McAfee ePO server in a domain
Handler groups and priority
Assign McAfee agents to Agent Handlers
Manage Agent Handler assignments
Create Agent Handler groups
Manage Agent Handler groups
Move agents between handlers
Frequently asked questions
If the handler doesn't have the updates needed when an agent checks in, the handler retrieves them
from the assigned repository and caches them, while passing the update through to the agent.
This diagram shows some of the typical connections between Agent Handlers, the McAfee ePO server,
and the McAfee ePO SQL Server.
A low-latency high-speed link's round-trip latency must be less than about 10 ms. Use the Windows
tracert command to confirm the round-trip time (RTT) from the Agent Handler to the McAfee ePO SQL
Server.
Boston The Agent Handler for Boston is configured with failover support to the Agent Handler
for Philadelphia.
Washington DC The Agent Handler uses specific ports to connect to the McAfee ePO server
from behind a firewall.
The Agent Handler must be able to authenticate domain credentials. Or the Agent Handler uses SQL
authentication to authenticate to the database. For more information about Windows and SQL
authentication, see the Microsoft SQL Server documentation.
For more information about changing authentication modes, see the Microsoft SQL Server
documentation. If you do, you must also update the SQL Server connection information.
Run the query Systems per Agent Handler to display all Agent Handlers installed and the number of
agents managed by each Agent Handler.
When an Agent Handler is uninstalled, it is not displayed in this chart. If an Agent Handler assignment
rule exclusively assigns agents to an Agent Handler and if that Agent Handler is uninstalled, it is
displayed in the chart with Uninstalled Agent Handler and the number of agents still trying to contact
this Agent Handler.
If the Agent Handlers are not installed correctly, then the Uninstalled Agent Handler message is
displayed which indicates that the handler cannot communicate with particular agents. Click the list to
view the agents that cannot communicate with the handler.
Scalability As your network grows, Agent Handlers can be added to reduce the load on your
McAfee ePO server.
Connect no more than five Agent Handlers to one McAfee ePO server with a maximum of 50,000
nodes connected to each Agent Handler.
Network topology Agent Handlers can manage your agent requests behind a firewall or in an
external network.
Failover Agents can failover between Agent Handlers using a configured fallback priority list.
Load Balancing Multiple Agent Handlers can load balance the McAfee Agent requests in a large
remote network.
Through a slow or irregular connection Agent Handlers require a relatively high speed, low
latency connection to the database to deliver events sent by the agents.
To save bandwidth Agent Handlers do not save bandwidth. They actually increase bandwidth
use over the WAN connection that connects the clients to the Agent Handler. Use distributed
repositories to save bandwidth.
Agent Handlers check the server work queue every 10 seconds and perform the requested action.
Typical actions include wake-up calls, requests for product deployment, and data channel messages.
These frequent communications to the database require relatively high speed, low latency connection
between the Agent Handler and the McAfee ePO database.
An Agent Handler installation includes only the Apache Server and Event Parser services. You can
deploy Agent Handlers on separate hardware, or virtual machines, that coexist in one logical McAfee
ePO infrastructure.
This diagram shows two different network configurations and their Agent Handlers.
Simple network The primary Agent Handler is installed as a part of the McAfee ePO server. This
is sufficient for many small McAfee ePO installations; typically additional Agent Handlers are not
required.
Complex network Multiple remote Agent Handlers are installed on separate servers connected
to the McAfee ePO server. Once installed, the additional Agent Handlers are automatically
configured to work with the McAfee ePO server to distribute the incoming agent requests. The
McAfee ePO console is also used to configure Agent Handler Assignment rules to support more
complex scenarios. For example, an Agent Handler behind the DMZ, firewall, or using network
address translation (NAT).
Administrators can override the Agent Handler default behavior by creating rules specific to their
environment.
See also
Configure Agent Handlers priority on page 309
Multiple McAfee ePO servers cause management, database duplication, and maintenance problems.
Ensure that agents continue to connect and receive policy, task, and product updates even if the
McAfee ePO server is unavailable.
Expand McAfee ePO management into disconnected network segments with high-bandwidth links to
the McAfee ePO database.
Usually, it is more efficient and less expensive to add an Agent Handler rather than a McAfee ePO
server.
Use a separate McAfee ePO server for separate IT infrastructures, separate administrative groups, or
test environments.
Providing scalability
Agent Handlers can provide scalability for McAfee ePO managed networks as the number of clients and
managed products grow.
One McAfee ePO server can easily manage up to 200,000 systems with only the VirusScan Enterprise
product installed. But, as the systems managed and the number of products integrated with your
McAfee ePO server increase the attempts to receive policies or send events to your server increase.
This load increase also decreases the maximum number of systems manageable with the same McAfee
ePO server hardware. The McAfee Security Innovation Alliance (SIA) program (http://
Agent Handlers allow you to scale your McAfee ePO infrastructure to manage more clients and
products. You do this by adding Agent Handlers to manage an equivalent or larger number of agents
with one logical McAfee ePO deployment. By default, when you install the Agent Handlers software on
a server, all Agent Handlers are used at the same order level unless custom assignment rules are
created.
The configuration file shared with the McAfee Agent contains a configurable fallback list of Agent
Handlers. If needed, the McAfee Agent tries to connect through the list of Agent Handlers until the list
ends or it can contact a valid, enabled Agent Handler.
Agents failover between all Agent Handlers in a group before failing through to the next Agent Handler
in the assignment list. Using Agent Handler groups results in both load balancing and failover benefits.
This Agent Handler connection requires access to both the SQL database and the McAfee ePO server.
Some firewall rules are necessary for this configuration.
This diagram shows an Agent Handler with managed systems behind the DMZ and these connections:
Data Channel connection to the McAfee ePO server
This table lists all ports used by the McAfee ePO server and the other network components.
The ports connecting the Agent Handler to the McAfee ePO server and SQL database must be open to
connect to the Agent Handler through a firewall.
This diagram shows how Agent Handlers cache product update content if the configured remote
repository is unavailable to remote systems.
Systems 1 and 2 attempt to pull content or product updates from their configured remote
repository and the attempt fails.
For System 1, the McAfee Agent is configured, by default, to use Primary Agent Handler 1 that is
part of the McAfee ePO server. If the connection to the remote repository fails, System 1
requests the content or product updates directly from the Master Repository on the McAfee ePO
server.
For System 2, the McAfee Agent is configured to use Secondary Agent Handler 2, if the
connection to the remote repository fails.
Secondary Agent Handler 2 requests the content or product updates from the Master Repository.
Secondary Agent Handler 2 caches those updates, for any subsequent requests, and delivers
them to System 2.
Whenever you change a policy, configuration, client or server task, automatic response, or report,
export the settings before and after the change.
Deployment considerations
Before you deploy Agent Handlers in your extended network, consider the health of your existing
McAfee ePO server and database hardware. If this hardware is already overloaded, adding Agent
Handlers actually decreases McAfee ePO performance.
A fully configured Agent Handler has about the same hardware and database requirements as a
McAfee ePO server. When determining how many Agent Handlers you need, first examine the
database usage. If the database serving your McAfee ePO server is under a heavy load, adding Agent
Handlers does not improve your performance. Upgrade your SQL Server hardware to take advantage
of multiple Agent Handlers. If the database is currently running at a moderate to low load, then
additional Agent Handlers can help you expand your logical McAfee ePO infrastructure.
McAfee testing shows that adding Agent Handlers improves performance until your McAfee ePO
database CPU load exceeds 70 percent. Since each Agent Handler adds some overhead, for example
database connections and management queries to the database, adding Agent Handlers beyond 70
percent database CPU load does not help performance.
The McAfee ePolicy Orchestrator Installation Guide provides instructions for installing remote Agent
Handler software
Handler Status Provides the number of installed Agent Handlers and if they are active.
New Assignment Opens the Agent Handler Assignment page to create an Agent Handler assignment.
Edit Priority Opens the Edit Priority page to change priority of the Agent Handler assignments.
Systems per Agent Handler Specifies the number of agents assigned to each Agent Handler.
To see a detailed list of the agents assigned to an Agent Handler, click the Agent Handler name in
the list or the color associated with the Agent Handler segment in the pie chart.
Handler Groups Specifies the number of Agent Handler groups that the McAfee ePO server
manages.
Handler Assignment Rules Displays the list of Agent Handler assignments in your environment, their
priority, and details about rule settings.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click the Agent Handlers number in the Handler Status of the dashboard, to see a list of your Agent
Handlers and their detailed information.
3 Click the setting in the Actions column, to disable, enable, and delete Agent Handlers.
4 Click the Agent Handler name in the Handler DNS Name column to configure Agent Handler Settings.
Published IP Address
6 Click Save
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Agent Handlers and, in the Handler Group dashboard, click New Group to create
Agent Handler groups.
2 From the Agent Handlers Add/Edit Group page, configure these group settings:
Group Name Type a name for the Agent Handler group.
Click Use custom handler list and use + and to add and remove additional Agent Handlers. Use
the drag-and-drop handle to change the priority of Agent Handlers.
3 Click Save
Reduces the McAfee ePO Server load so that it can perform other tasks like displaying the McAfee
ePO console user interface and running reports and server tasks
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Agent Handlers, then click Edit Priority to create Agent Handler groups.
2 Click and drag the Agent Handlers to create the priority list you need for your network.
This screenshot shows the McAfee ePO Server, shown as "ePO 1," configured as priority 2 and
"Agent Handler 1" configured as priority 1.
3 Click Save.
When assigning systems to Agent Handlers, consider geographic proximity to reduce unnecessary
network traffic.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Agent Handlers, then click New Assignment to change the assignments for
Agent Handlers.
Agent Criteria Choose one of these methods to assign agents to Agent Handlers:
System Tree location Click System Tree, select the System Tree Group from the dialog box, then
click OK.
Agent Subnet Type the IPv4/IPv6 address, IPv4/IPv6 address ranges, subnet masks, or
subnet masks range.
Handler Priority To configure the priority used by the McAfee Agent, select:
Use all agent handlers Agents randomly select which handler to communicate with.
Use custom handler list Use + and to add more or remove Agent Handlers. Use the
drag-and-drop handle to change the priority of handlers.
3 Click Save.
These are the major steps to configure an Agent Handlers in the DMZ.
1 Install the Windows Server hardware and software in the DMZ between your networks that are
internal and external to McAfee ePO.
2 Configure all ports on your firewall between your McAfee ePO server and SQL database and the
Agent Handler.
3 Install the McAfee ePO remote Agent Handler software using the information in the McAfee ePolicy
Orchestrator Installation Guide.
4 If needed, create a subgroup of systems to communicate with the McAfee ePO server through the
Agent Handler.
6 Configure the Agent Handlers priority list and enable the Agent Handler in the DMZ.
See also
Using Agent Handlers behind a DMZ, firewall, or in NAT networks: best practices on page 303
Task
1 Build the Agent Handler server hardware with the Microsoft Windows Server operating system.
2 Install the server in the DMZ behind the firewall in the protected network.
3 Configure your Domain Name System (DNS) server to add the Agent Handler server behind the
firewall in the protected network.
4 Configure these ports on the internal-facing firewall to communicate between the McAfee ePO
server and the Agent Handler in DMZ:
Port 80 Bidirectional
5 Optional If your SQL database is installed on a different server than your McAfee ePO server,
configure these two ports on the internal-facing firewall for that connection to the Agent Handler:
Port 1433 TCP Bidirectional
6 Configure these ports on the public-facing firewall to communicate between the McAfee ePO server
and the Agent Handler in the DMZ:
You must have access to the McAfee ePO executable files located in the downloaded
McAfee ePO installation files.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Install the McAfee ePO remote Agent Handler software. See the McAfee ePolicy Orchestrator
Installation Guide.
2 Use one of these methods to communicate through the Agent Handler to the McAfee ePO server:
Create a subgroup of systems. This task uses a subgroup, NAT Systems, in the System Tree behind
the DMZ.
In Agent Subnet, type IP addresses, IP address ranges, or subnet masks, separated by commas,
spaces, or new lines.
3 To start the Agent Handler configuration on the McAfee ePO server, select Menu | Configuration | Agent
Handlers.
b Next to Agent Criteria, click Add Tree Locations and the "..." to select a System Tree group (for
example, NAT Systems) and click OK.
For example, select the NAT Systems group.
c Next to Handler Priority, click Use custom handler list and Add Handlers.
d From the list, select the Agent Handler to handle these selected systems.
e Click Save.
6 To configure the Agent Handler as the highest priority for the systems behind the DMZ, click Edit
Priority and configure these settings, from the Agent Handler Configuration page:
a Move the Agent Handler to the top of the priority list by moving the Agent Handler names.
b Click Save.
7 From the Agent Handler configuration page, in the Handler Status dashboard, click the number of the
Agent Handler to open the Agent Handlers List page.
8 From the Agent Handler Settings page, configure these settings and click Save:
Option Description
Published DNS Name Type the configured name for the Agent Handler.
Published IP Address Type the configured IP address for the Agent Handler.
9 From the Handlers List page, in the row for the Agent Handler in the DMZ, click Enable in the Actions
column.
The systems designated to use the Agent Handler begin getting their changes during the next few
agent-server communications.
10 Confirm that the Agent Handler in the DMZ is managing the systems behind the DMZ:
a From the Agent Handlers Configuration page, in the Systems per Agent Handler dashboard, click the
Agent Handler name in the list or its corresponding color in the pie chart.
b From the Agents for Agent Handler page, confirm that the correct systems appear in the list.
It might take multiple instances of the agent-server communication before all systems appear in
the list.
With the Agent Handlers in the DMZ and configured with the McAfee ePO server, you can now directly
manage systems with a McAfee Agent installed behind the DMZ.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Change the system administrator account to connect to the McAfee ePO database.
a Open a web browser and go to https://localhost:8443/core/config-auth.
8443 is the console communication port. If you use a different port to access the McAfee ePO
console, include that port number in the address instead.
c Delete the entry in the User Domain field, then type sa.
d Provide a password for the system administrator account, then click Test Connection.
If the test is unsuccessful, re-enter your password, then click Test Connection again.
The Agent Handler uses the system administrator credentials to communicate with the McAfee ePO
database.
Handler groups
With multiple Agent Handlers in your network, you can create handler groups. You can also apply
priority to handlers in a group. Handler priority tells the agents which handler to communicate with
first. If the handler with the highest priority is unavailable, the agent falls back to the next handler in
the list. This priority information is contained in the repository list (sitelist.xml file) in each agent.
When you change handler assignments, this file is updated as part of the agent-server communication
process. Once the assignments are received, the agent waits until the next regularly scheduled
communication to implement them. You can perform an immediate agent wake-up call to update the
agent immediately.
Grouping handlers and assigning priority is customizable, so you can meet the needs of your specific
environment. Two common scenarios for grouping handlers are:
In addition to assigning handler priority within a group of handlers, you can also set handler
assignment priority across several groups of handlers. This adds redundancy to your environment to
further ensure that your agents can always receive the information they need.
Sitelist files
The agent uses the sitelist.xml and sitelist.info files to decide which handler to communicate with.
Each time handler assignments and priorities are updated, these files are updated on the managed
system. Once these files are updated, the agent implements the new assignment or priority on the
next scheduled agent-server communication.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Agent Handlers, then click Actions | New Assignment.
3 Specify the agents for this assignment using one or both of the following Agent Criteria options:
Browse to a System Tree location.
Type the IP address, IP range, or subnet mask of managed systems in the Agent Subnet field.
Use custom handler list When using a custom handler list, select the handler or handler group
from the drop-down menu.
When using a custom handler list, use + and - to add or remove more Agent Handlers (an Agent
Handler can be included in more than one group). Use the drag-and-drop handle to change the
priority of handlers. Priority determines which handler the agents try to communicate with first.
To do this... Do this...
Delete a handler Click Delete in the selected assignment row.
assignment
Edit a handler Click Edit for the selected assignment. The Agent Handler Assignment page
assignment opens, where you can specify:
Assignment name The unique name that identifies this handler assignment.
Agent criteria The systems that are included in this assignment. You can add
and remove System Tree groups, or modify the list of systems in the text
box.
Handler priority Choose whether to use all Agent Handlers or a custom
handler list. Agents randomly select which handler to communicate with
when Use all Agent Handlers is selected.
Export handler Click Export. The Download Agent Handler Assignments page opens, where you
assignments can view or download the AgentHandlerAssignments.xml file.
Import handler Click Import. The Import Agent Handler Assignments dialog box opens, where
assignments you can browse to a previously downloaded AgentHandlerAssignments.xml
file.
Edit the priority of Click Edit Priority. The Agent Handler Assignment | Edit Priority page opens,
handler assignments where you change the priority of handler assignments using the drag-and-drop
handle.
View the summary Click > in the selected assignment row.
of handler
assignments details
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Agent Handlers, then in Handler Groups, click New Group.
The Add/Edit Group page appears.
Click Use custom handler list to specify which Agent Handlers are included in this group.
When using a custom handler list, select the handlers from the Included Handlers drop-down list.
Use + and - to add and remove additional Agent Handlers to the list (an Agent Handler can be
included in more than one group). Use the drag-and-drop handle to change the priority of
handlers. Priority determines which handler the agents try to communicate with first.
3 Click Save.
Action Steps
Delete a handler Click Delete in the selected group row.
group
Edit a handler Click the handler group. The Agent Handler Group Settings page opens, where
group you can specify:
Virtual DNS Name The unique name that identifies this handler group.
Virtual IP address The IP address associated with this group.
Included handlers Choose whether to use a third-party load balancer or a
custom handler list.
Use a custom handler list to specify which handlers, and in what order, agents
assigned to this group communicate with.
Tasks
Group agents using Agent Handler assignments on page 319
Create Agent Handler assignments to group McAfee Agents together.
Group agents by assignment priority on page 319
Group agents together and assign them to an Agent Handler that is using assignment
priority.
Group agents using the System Tree on page 320
Group agents together and assign them to an Agent Handler using the System Tree.
When assigning agents to Agent Handlers, consider geographic proximity to reduce unnecessary
network traffic.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Agent Handlers, then click the required Handler Assignment Rule.
The Agent Handler Assignment page appears.
If the Default Assignment Rules is the only assignment in the list, you must create an assignment.
3 You can configure Agent Criteria by System Tree locations, by agent subnet, or individually using the
following:
System Tree Locations Select the group from the System Tree location.
You can browse to select other groups from the Select System Tree Group dialog box and use +
and - to add and remove System Tree groups that are displayed.
Agent Subnet In the text field, type IP addresses, IP address ranges, or subnet masks in the
text box.
Individually In the text field, type the IPv4/IPv6 address for a specific system.
4 You can configure Handler Priority to Use all Agent Handlers or Use custom handler list. Click Use custom handler
list, then change the handler in one of these ways:
Change the associated handler by adding another handler to the list and deleting the previously
associated handler.
Add additional handlers to the list and set the priority that the agent uses to communicate with
the handlers.
When using a custom handler list, use + and - to add and remove additional Agent Handlers
from the list (an Agent Handler can be included in more than one group). Use the drag and drop
handle to change the priority of handlers. Priority determines which handler the agents try to
communicate with first.
5 Click Save.
When assigning systems to Agent Handlers, consider geographic proximity to reduce unnecessary
network traffic.
Task
For details about product features, usage, and best practices, click ? or Help.
If Default Assignment Rules is the only assignment in the list, you must create a new assignment.
2 Edit assignments using the steps in the task Grouping agents by assignment rules.
3 As needed, modify the priority or hierarchy of the assignments by clicking Actions | Edit Priority.
Moving one assignment to a priority lower than another assignment creates a hierarchy where the
lower assignment is actually part of the higher assignment.
4 To change the priority of an assignment, which is shown in the Priority column on the left, do one of
the following:
Use drag and drop Use the drag-and-drop handle to drag the assignment row up or down to
another position in the Priority column.
Click Move to Top In Quick Actions, click Move to Top to automatically move the selected assignment
to the top priority.
When assigning systems to Agent Handlers, consider geographic proximity to reduce unnecessary
network traffic.
Task
For details about product features, usage, and best practices, click ? or Help.
2 In the System Tree column, navigate to the system or group you want to move.
3 Use the drag-and-drop handle to move systems from the currently configured system group to the
target system group.
4 Click OK.
What data is sent to the McAfee ePO server and what is sent to the database?
A data channel is a mechanism for McAfee products to exchange messages between their
endpoint plug-ins and their management extensions. The data channel provides most data sent
from the Agent Handler to the application server. It is used internally by the McAfee ePO server
for agent deployment and wake-up progress messaging. Other functions such as agent
properties, tagging, and policy comparisons are performed directly against the McAfee ePO
database.
If the McAfee ePO server is not defined in my repository list, does replication still occur?
Yes, if the agent contacts the Agent Handler for software packages, the Agent Handler retrieves
them from the McAfee ePO server Master Repository.
How much bandwidth is used for communication between the database and the Agent
Handler?
Bandwidth between the Agent Handler and the database varies based on the number of agents
connecting to that Agent Handler. But, each Agent Handler places a fixed load on the database
server for:
Heartbeat (updated every minute)
Database connections held open to the database (two connections per CPU for EventParser
plus four connections per CPU for Apache)
Non-server Operating System versions have severe (~10) limits set on the number of incoming
network connections.
See also
Using Agent Handlers behind a DMZ, firewall, or in NAT networks: best practices on page 303
Repository cache and how it works on page 304
Once your McAfee ePO server is configured and protecting your systems there are some tasks to
perform to keep your server running at peak efficiency.
Contents
Maintaining your McAfee ePO server
Managing SQL databases
Bandwidth usage
The SQL database used by the McAfee ePO server requires regular maintenance and back ups to ensure
that McAfee ePO functions correctly.
See How to use and troubleshoot issues with Windows Task Manager (http://
support.microsoft.com/kb/323527), for details.
You must use the 32-bit version of the Reliability and Performance Monitor found at C:\Windows
\SysWOW64\perfmon.exe. The default 64-bit version of Reliability and Performance Monitor does not
have the custom McAfee ePO counters added.
Figure 20-1 Windows Performance Monitor showing the ePolicy Orchestrator Server counters
To find the 32-bit version of the Windows Performance Monitor, use Windows Explorer and
navigate to C:\Windows\SysWOW64, then find and double-click perfmon.exe.
To confirm that you opened the 32-bit version of Performance Monitor, click Monitoring Tools |
Performance Monitor, Add Counters, then click the + sign to open the Add Counters dialog box.
To find the McAfee ePO server counters, scroll down the list of counters, find ePolicy Orchestrator
Server, and expand the list.
Now you can start using the counters to test and create benchmarks for your McAfee ePO server
performance.
Task
1 Start the Windows Performance Monitor.
2 In the Add Counters list, browse or scroll down to the ePolicy Orchestrator Server counters selection, then
click + to expand the list of counters.
3 To view the output as a report, click the Change Graph Type icon and select Report from the list.
For example, the Open ePO Agent Connections counter tells you how many agents are communicating
with the McAfee ePO server simultaneously. A healthy McAfee ePO server keeps this number fairly
low, usually under 20. For a McAfee ePO server that is struggling, this number is over 200 (the
maximum is 250) and stays high, and rarely drops below 20.
4 Click Add to move the selected counter into the Added counters list, then click OK.
5 To determine the stress on your McAfee ePO server and how quickly it can process events from all
your agents, add the following counters, then click OK.
Completed Agent Requests/sec
Processor Events/sec
The tests listed here are just a few that you can perform with the McAfee ePO server using the
Windows Performance Monitor. For additional Windows Performance Monitor information, see these
Microsoft websites:
Configure the Performance Monitor Display (http://technet.microsoft.com/en-us/library/
cc722300.aspx)
Task
1 Using Windows Explorer, navigate to this folder:
C:\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Events
At any time, this folder might display a few dozen or a few hundred events.
In larger environments, this folder is constantly processing thousands of events per minute.
2 Click the Refresh icon multiple times, then look at the status bar to see the number of files in this
folder changing quickly.
If there are thousands of files in this folder and McAfee ePO is unable to process them, the server is
probably struggling to process the events at a reasonable rate.
It is normal for this Events folder to fluctuate depending on the time of day. But, if there are
thousands of files in this folder and it is constantly increasing then that probably indicates a
performance issue.
3 Confirm that the events are not occurring faster than the event parser can process them. This
causes this folder to grow quickly. Use these steps to confirm the event parser is running.
a To open the Windows Services Manager and confirm that the event parser is running, click Start,
Run, type services.msc and click OK.
b In the Services Manager list, find McAfee ePolicy Orchestrator 5.9.0 Event Parser and confirm it is Started.
4 Check the event parser log file for any errors, using these steps.
a Go to the log file folder at this path:
C:\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Logs
5 Use these steps if the events are still occurring faster than the event parser can process them.
a Open the Services Managers list again and temporarily stop all three of these McAfee ePO
services:
McAfee ePolicy Orchestrator 5.9.0 Application Server
Back up your SQL database regularly, in case your SQL database or your McAfee ePO server
environment fails. If the McAfee ePO server must be rebuilt or restored, current back ups ensure that
a safe copy is available. In addition, if you are using the information in the Microsoft website, Full
Database Backups (SQL Server) (https://msdn.microsoft.com/en-us/library/ms186289.aspx),
your transaction log can continue to grow indefinitely until a full backup is performed.
This fragmented index is different from the index of the telephone book that stores its data in sorted
order. A typical query for the name "Jones" might span multiple consecutive pages, but they are
always in a sorted order.
For of a database, you start with the data looking like a telephone book and, over time, end up with
the data looking more like a large book index. You must occasionally resort the data to re-create the
phone book order. This is where reindexing and rebuilding your McAfee ePO SQL database is critical.
Over time your database becomes more fragmented, especially if it manages a larger environment
where thousands of events are written to it daily.
Setting up a maintenance task to automatically reindex and rebuild your McAfee ePO SQL database
takes only a few minutes and is essential to maintain proper performance on the McAfee ePO server.
You can include the reindexing as part of your regular backup schedule to combine everything in one
task.
Do not shrink your database. Data file shrink causes serious index fragmentation. Shrinking the
database is a common mistake that many administrators make when building their maintenance task.
Learn more
For details about creating your maintenance task, see KnowledgeBase article Recommended
maintenance plan for McAfee ePO database using SQL Server Management Studio, KB67184.
To learn more about database fragmentation and how to determine the fragmentation of your
database, use the DBCC command found in the Understanding SQL Server's DBCC SHOWCONTIG
(http://www.sql-server-performance.com/2002/dt-dbcc-showcontig/).
To learn more about maintaining and optimizing your SQL database, see these documents:
Improving McAfee ePO Performance by Optimizing SQL (https://community.mcafee.com/docs/
DOC-2926)
If you are troubleshooting McAfee ePO database connection problems, you might see this error in the
orion.log file:
Login failed for user ''. The user is not associated with a trusted SQL Server connection
Task
For details about product features, usage, and best practices, click ? or Help.
2 Double-click the file you created to display the Data Link Properties user interface.
3 Click the Provider tab, select Microsoft OLE DB Provider for SQL Server from the OLE DB Provider(s) list, then
click Next.
Enter information to log on to the server Type the SQL database credentials.
The Microsoft Data Link dialog box should display Test connection succeeded.
These are suggested best practices and do not guarantee 100-percent protection against security risks.
Once you learn the processes, they don't take too long to perform.
Before you make any major changes to policies or tasks, McAfee recommends that you back up the
database or create a snapshot of the records in the McAfee ePO database.
Each of the recommended daily tasks is described in more detail in the following table.
Where indicated, some of these tasks can be automated. Those instructions are included in this guide.
Examine product specific Examine reports for any events that might indicate a new vulnerability in
reports, such as the environment. Create a server task to schedule queries and send the
VirusScan Enterprise, results to you. Using this data, you might create policies or edit existing
Endpoint Security, policies.
Access Protection, or
McAfee Host IPS, for
threat events
React to alerts. If new alerts are found, follow your companys internal procedure for
handling malware. Collect and send samples to McAfee and work toward
cleaning up the environment. Ensure that signature files are updated and
run on-demand scans as needed. See Troubleshooting procedure for
finding possible infected files, KB53094.
Run queries or review dashboards periodically to check for alerts collected
from your managed devices. Also watch for these threat signs:
High CPU usage on undetermined processes
Unusually high increases in network traffic
Services added or deleted by someone other than you
Inability to access network or administrative shares
Applications or files that stop functioning
Unknown registry keys added to start an application
Any browser home page that changed outside your control
Examine the VSE: Trending Data Dashboard and look at the VSE: DAT
Deployment information to determine whether your signature files are
up to date.
Files being created or changed on an endpoint (review Access Protection
Rules).
Review the McAfee To access the McAfee Labs Threat site, select Menu | Reporting | Dashboards.
Global Threat Select the ePO Summary dashboard and in McAfee Links, click Global Threat
Intelligence (GTI) at Intelligence.
McAfee Labs Threat site
at least once a day.
Examine Top 10 reports McAfee ePO provides preconfigured Top 10 reports that display statistics
for infections at the site, on infections in your environment. Determine which users, systems, and
group, system, and user parts of the network have the most infections or vulnerability. These
level. reports might reveal weakness in the network, where policies must be
adjusted.
Daily security maintenance tasks
Check compliance In Queries & Reports, find the compliance queries that identify systems
queries and reports. that have not updated a managed product version with an engine, hotfix,
or patch.
Create a process to make sure that systems are up to date. For example,
run an update or deployment task to ensure compliance.
Review the inactive In Server Tasks, run the Inactive Agent Cleanup Task. This task identifies
agents log to determine systems that have not connected to the McAfee ePO server for a specific
which systems are not number of days, weeks, or months. You can use this task to move inactive
reporting to McAfee ePO. systems to a new group in the System Tree, tag the systems, delete the
systems, or email a report.
If the systems are on the network but having difficulty checking into the
McAfee ePO server, you might perform one of these actions:
Use a Ping Agent or Agent Wake-Up Call to check if a system is online and able
to perform an agent-server communication with the McAfee ePO server.
Reinstall the McAfee Agent to ensure that the system is communicating
with the McAfee ePO server.
Ensure that Active Active Directory or NT Domain synchronization pulls in a list of new
Directory or NT systems and containers that must be managed by McAfee ePO. If they are
Synchronization is used, confirm that the Sync task can be configured to run at least once a
working. day and is working.
Confirm that a Memory Using the Threats Dashboard, confirm that the results of these scans don't
Process Scan occurs at indicate an increase in threats.
least daily.
Run memory process scans frequently, because they are quick and
unobtrusive.
Check Rogue System Rogue System Detection tells you which devices are attached to the
Detection network. It reports unmanaged systems, so they can be quickly found and
removed from the network.
See also
Disaster Recovery components on page 102
Each of the recommended weekly tasks is described in more detail in the following table.
Where indicated, some of these tasks can be automated. Those instructions are included in this guide.
Run a full replication to Distributed repositories can become corrupt because of an incomplete
all distributed replication task. Remove corrupt files in the repositories by running a full
repositories. replication to all distributed repositories once a week. Full replication tasks
delete the existing repository contents and replace them with new files.
Incremental replication tasks only copy new or non-existent files and can't
fix any corrupt files.
Run Distributed Select Menu | Reports | Queries and Reports. Locate and Run the Distributed
Repository Status. Repository Status report to determine whether there have been any failures to
update distributed repositories. If there are failures, run the replication
again and ensure that it does not fail again.
Schedule an Schedule an on-demand scan of all systems in your environment that runs
On-Demand Scan of all during off-hours.
systems in your See these documents for additional information:
environment.
Best Practices for On-Demand Scans in VirusScan Enterprise 8.8,
KB74059
Best Practices for On-Demand Scans in VirusScan Enterprise 8.8,
TU30280 Tutorial.
VirusScan Enterprise 8.8 Product Guide for details about configuring
on-demand scans
How to create a McAfee ePO validation report for the event '1203,
KB69428.
You can use the McAfee ePO Disaster Recovery feature to create a
snapshot of the records in the McAfee ePO database to quickly recover, or
reinstall your software, if needed.
See also
What's in the Software Manager on page 157
Replication tasks on page 292
Disaster Recovery components on page 102
Each of the recommended monthly tasks is described in more detail in the following table.
Where indicated, some of these tasks can be automated. Those instructions are included in this guide.
Review Audit Logs. Review the McAfee ePO Audit Logs to ensure that individuals with
administrative rights are making only approved changes to
system configurations, tasks, and policies.
Validate McAfee ePO Confirm that only employees authorized to have administrative
Administrator and Reviewer IDs access have properly configured IDs, with the proper permission
sets in the McAfee ePO system.
SQL database tasks
Run your McAfee ePO SQL Set up and run your SQL Monthly Maintenance Plan. See
database Maintenance Plan. Recommended maintenance plan for McAfee ePO database using
SQL Server Management Studio, KB67184.
Monthly Windows Server operating system tasks
Confirm that the Microsoft Review and implement all Microsoft patches to eliminate
Operating System and other vulnerabilities and mitigate risk.
vendor patch levels on the
McAfee ePO server are current. Other vendor patches might also be released and need updating
to reduce vulnerabilities in the environment.
See also
Best practices: Purging events automatically on page 244
Purge events by query on page 245
Best practice: Find systems with the same GUID on page 243
The Audit Log on page 147
Create a periodic maintenance log to document dates that maintenance was conducted, by whom, and
any maintenance-related comments about the task conducted.
Task Description
Assess your environment, policies, Organizational needs can change. Periodically review both
and policy assignments periodically existing policies and policy assignments to ensure that they still
to confirm that they are still make sense in the environment. Fewer policies simplify server
applicable. administration.
Review existing client tasks and Client tasks run scans, deploy product updates, product patches
task assignments periodically to and hotfixes, and more to systems managed by McAfee ePO.
confirm that they are still needed. Clean out unused tasks to reduce system complexity which can
ultimately affect database size.
Task Description
Review existing tags and tag Use tags as an alternative to System Tree groups to combine,
criteria to ensure that they are still or select a group of systems to operate on. For example, to
relevant to your environment. send updates, deploy McAfee managed products, or run scans.
Tagging is useful, but you must monitor tags to ensure that
they are useful and have the impact needed.
Review product exclusions (for You must keep exclusions as specific as possible in your
example, VirusScan Enterprise) and environment.
includes/excludes (for example, Products changes can affect the exclusions that you have
Access Protection rules) periodically configured. Periodically review exclusions to ensure that they
to validate relevancy. still accomplish what is needed. Plus, you can use High and Low
Risk OnAccess scanning configurations to augment exclusions.
Structure the System Tree, or use tags as another method to
control exclusions.
Make any hardware changes or As your network and organization changes, you might find that
remove any repositories that you changing the location and type of repositories you use provides
want to decommission. more efficient and effective coverage.
Validate that you have the required Always use the most current version of McAfee managed
software, such as the latest version products to ensure that you have technical support for those
of the McAfee Agent. products. Plus, you have the latest features and fixes available.
Remove any unsupported software Keeps disk space to a minimum and removes clutter from the
or software for products you aren't McAfee ePO server and distributed repositories. Only keep
using from the master and those products currently in use in your environment in the
distributed repositories. Master Repository.
Validate your System Tree and Keep the System Tree organized and delete systems that are no
remove any agents that have not longer in use, or reporting to McAfee ePO. A clean System Tree
communicated with the McAfee ePO ensures that reports do not contain extraneous information. Set
server in 30 days or that are up a server task to delete inactive systems.
de-commissioned.
Remove server tasks that are no Keep only those server tasks that you intend to use in the task
longer used. listing. You can always disable an unused task that you want to
keep, but don't use regularly. Keeping a minimum list of tasks
that you use regularly reduces McAfee ePO complexity.
Remove Automated Responses that Automated responses are configured to alert individuals,
are no longer relevant. particularly system administrators; when malware event
threats, client treats, or compliance issues must be resolved.
Delete shell systems using a Delete systems with incomplete or missing system and product
McAfee ePO server task. properties from the System Tree. Those systems skew reports and
queries, and waste space in the McAfee ePO database.
Monitor database size Check the size of the McAfee ePO database and determine
whether, and how often, to purge events reported to McAfee
ePO. See How to identify why the ePolicy Orchestrator database
is large, KB76720.
To purge events from the database, see How to remove old
events and shrink the ePolicy Orchestrator database, KB68961
and how to purge the Audit Log, Server Task Log, and Threat
Event Log.
Depending on your deployment of the McAfee ePO software, plan on spending a few hours each week
on regular database backups and maintenance. Perform these tasks regularly, either weekly or daily.
But, these tasks are not the only maintenance tasks available. See your SQL documentation for details
about what else you can do to maintain your database.
Task
For details about product features, usage, and best practices, click ? or Help.
In this command:
<localhost> Is the name of your McAfee ePO server.
:8443 Is the default McAfee ePO server port number. Your server might be configured to use
a different port number.
2 Save the following information that appears in the Configure Database Settings page:
Host name or IP address
Database name
Tasks
Configure Disaster Recovery Server Task on page 339
Use the Disaster Recovery Snapshot Server Task to modify the scheduled automatic
Snapshots of your McAfee ePO server configuration saved to the SQL database.
Use Microsoft SQL to back up and restore the database on page 339
To save the Disaster Recovery Snapshot with the McAfee ePO server configuration
information, use Microsoft SQL Server procedures.
You can only run one Disaster Recovery Snapshot at a time. If you run multiple Snapshots, only the
last Snapshot creates any output and the previous Snapshots are overwritten.
You can modify the default Disaster Recovery Server Task as needed.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Automation | Server Tasks, select Disaster Recovery Snapshot Server from the Server Tasks list,
and click Edit.
2 From the Disaster Recovery Server Task builder Descriptions tab Schedule status, click Enabled or
Disabled as needed.
Start Date and End Date Set the start and end dates the Snapshots are saved, or click No End Date
to have the task run continuously.
Schedule Set the time when the Snapshot is saved. By default, the Snapshot task runs at 1:59
a.m. daily.
Best practice: un the Disaster Recovery Server Task during off hours to minimize the changes
to the database during the Snapshot creation process.
4 From the Summary tab, confirm that the server task is configured correctly and click Save.
After you create a Snapshot of the McAfee ePO server configuration, you must:
Task
1 Create a Microsoft SQL Server backup of the database using:
Microsoft SQL Server Management Studio
Microsoft Transact-SQL
See your Microsoft SQL Server documentation for details to complete these processes.
3 Restore the backup of the primary SQL database that includes the Disaster Recovery Snapshot
records using:
Microsoft SQL Server Management Studio
Microsoft Transact-SQL
See your Microsoft SQL Server documentation for details to complete these processes.
This creates a duplicate SQL Server ready for restoration, if needed, by connecting it to a new McAfee
ePO installation using the Restore option.
Task
1 Use a Remote Desktop Connection to log on to the Microsoft SQL database server with host name
or IP address.
2 Open the Microsoft SQL Server Management Studio and connect to the SQL Server.
3 From the Object Explorer list, click <Database Server Name> | Databases | <Database name> | Tables.
4 Scroll down to find the EPOServerInfo table, right-click the table name, and select Edit top 200 Rows from
the list.
Make sure that you have this information in case you ever have to restore your McAfee ePO
software.
Depending on which products you are managing, you can also take certain actions on the events.
Actions are available in the Actions menu at the bottom of the page.
Action Taken Action that the product took in response to the threat.
Agent GUID Unique identifier of the agent that forwarded the event.
DAT Version DAT version on the system that sent the event.
Detecting Product Host Name Name of the system hosting the detecting product.
Detecting Product IPv4 Address IPv4 address of the system hosting the detecting product (if
applicable).
Detecting Product IPv6 Address IPv6 address of the system hosting the detecting product (if
applicable).
Detecting Product MAC Address MAC address of the system hosting the detecting product.
Engine Version Version number of the detecting products engine (if applicable).
Event Category Category of the event. Possible categories depend on the product.
Event Generated Time (UTC) Time in Coordinated Universal Time that the event was detected.
Event Received Time (UTC) Time in Coordinated Universal Time that McAfee ePO received the event.
File Path File path of the system which sent the event.
IPv4 Address IPv4 address of the system which sent the event.
IPv6 Address IPv6 address of the system which sent the event.
MAC Address MAC address of the system which sent the event.
Threat Source Host Name System name from which the threat originated.
Threat Source IPv4 Address IPv4 address of the system from which the threat originated.
Threat Source IPv6 Address IPv6 address of the system from which the threat originated.
Threat Source MAC Address MAC address of the system from which the threat originated.
Threat Source User Name User name from which the threat originated.
Task
For details about product features, usage, and best practices, click ? or Help.
Action Steps
View Threat 1 Click any of the column titles to sort the events. You can also select Actions | Choose
Event Log. Columns and the Select Columns to Display page appears.
2 From the Available Columns list, select different table columns that meet your
needs, then click Save.
3 Select events in the table, then click Actions and select Show Related Systems to see
the details of the systems that sent the selected events.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Name and describe the task. Next to Schedule Status, select Enabled, then click Next.
4 Select whether to purge by age or from a queries result. If you purge by query, pick a query that
results in a table of events.
5 Click Next.
Bandwidth usage
The McAfee ePO server uses your LAN and WAN bandwidth to receive events from your managed
clients and download software to your managed clients. It's important to understand these
requirements to configure your McAfee ePO server to use the bandwidth efficiently.
McAfee Agent deployment traffic occurs directly between the McAfee ePO server and the client
systems where the agent is deployed.
This table shows the total bandwidth used on an McAfee Agent server, client system, and McAfee
Agent SQL database server for McAfee Agent 4.8 deployment.
Table 20-4 McAfee Agent bandwidth usage
Agent deployment Total (MB) Transmit (MB) Receive (MB)
McAfee ePO server 5.04 4.83 0.21
SQL database server 4.64 0.04 4.60
Client system 0.42 0.18 0.24
Actual deployment
The first and most extensive use of bandwidth occurs when the McAfee Agent installation package is
deployed to client systems. You can deploy the McAfee Agent installation package from the McAfee
ePO server console to sites, groups, or selected systems in the System Tree. Regardless of the method
you use, deploying the agent installation package over the network generates traffic to each system.
The bandwidth available between the McAfee ePO server and those systems
To individual sites or groups This is important if you have more bandwidth-limiting factors
such as slower connections between geographic locations.
At a minimum, each of your clients must download, on average, 400 KB a day for DAT files. The
following examples show how to calculate the bandwidth used for the client updates using this
formula:
The following examples use this formula to calculate the amount of data pulled a day and describe if
creating a local repository reduces the bandwidth.
(400 KB) x (200 nodes) = about 80 MB of data randomly pulled a day to India
In the small office in India, you can add a repository, but you must replicate the DAT file from the
McAfee ePO server to the repository. This file replication uses about 70 MB of bandwidth a day over a
slow WAN link that can negatively affect the WAN link to India because it occurs all at once.
Instead, have the agents connect across the WAN link to the next closest repository to download their
DAT file updates. The next repository might be in a larger office, for example Tokyo. The agents can
randomly pull their DAT files throughout the day, and their total bandwidth use is only 80 MB.
(400 KB) x (4,000 nodes) = about 1.6 GB of data randomly pulled a day to Tokyo
The large office in Tokyo, with 4,000 nodes, uses 1.6 GB of bandwidth a day just to update the DAT
files alone. Because replication of the DAT file to Tokyo only uses 70 MB of bandwidth a day, it is much
more efficient to have a repository in the Tokyo office. Now all DATs are pulled across the LAN instead
of across the slower WAN link.
(23 MB) x (1,000 nodes) = about 23 GB of data pulled to the New York City office
This 23-MB patch is larger than the 400-KB daily DAT files. You probably have a repository in New York
depending on the speed of the WAN link to New York and how quickly the patch must be pushed out.
You might find a balance if you carefully craft your client tasks to pull updates and patches at a
gradual pace instead of deploying the patch to all nodes in one day.
Conclusions
Some McAfee ePO users put a repository at geographic sites that have only a few dozen nodes. If your
site does not have at least 200300 nodes, it cannot benefit from the bandwidth saved using a
repository. If there is no local repository, the agents go to the next nearest repository for their
updates. This repository might be connecting to the server across a WAN link, but it still uses less
bandwidth because you dont have to replicate the whole repository across the WAN.
The exception to this rule is if you are deploying a larger software package. For example, the
VirusScan Enterprise client software is 56 MB. In this case, it is more efficient to place a repository
temporarily at a smaller site so that the client's software can download the 56-MB file locally. Then
disable this repository once the client is rolled out.
When the managed systems pull the updates from the distributed repository
These tasks need randomization intervals configured to avoid network bandwidth saturation.
Use these steps in this information to automate repository replication in your network.
1 Create an incremental replication task for each distributed repository in each LAN.
2 According to WAN bandwidth in Mbps, set each task to run sequentially at the minimum of the
minutes of the corresponding randomization interval, to avoid overlap.
3 Create an agent update task with a randomization interval set according to these tables.
Table 20-8 Recommended interval (minutes) for network bandwidth of 100 Mbps
Systems in LAN Distributed repositories in LAN
1 2 3 4 5
Recommended randomization interval (minutes)
1,000 60 30 20 15 10
2,000 120 60 40 30 20
3,000 180 90 60 45 30
Table 20-8 Recommended interval (minutes) for network bandwidth of 100 Mbps
(continued)
Systems in LAN Distributed repositories in LAN
1 2 3 4 5
Recommended randomization interval (minutes)
4,000 240 120 80 60 40
5,000 300 150 100 75 50
See also
Configure settings for global updates best practice on page 280
Updating tasks on page 222
The following example uses updating the DAT files for VirusScan Enterprise, that are released daily.
The numbers used to determine if a repository is needed at a site are:
400 KB The average size of the daily DAT file to download
100 The number of system agents that must download those daily DAT files
To download the daily DAT file randomly, from the central McAfee ePO server, to the system agents
takes the following bandwidth: 100 agents * 400-KB file = about 40 MB of bandwidth
For the McAfee ePO server to replicate the DAT file to each repository every day takes at least 70 MB
of bandwidth.
The following formula calculates the bandwidth to move the 19 GB of data per repository randomly
over a 9-hour workday. The total equals about 2.1 GB of data per hour pulled from each repository.
McAfee ePO provides built in querying and reporting capabilities. These are highly customizable,
flexible, and easy to use.
Both the Query Builder and Report Builder create and run queries and reports that organize user-configured
data in user-specified charts and tables. The data for these queries and reports can be obtained from
any registered internal or external database used with your McAfee ePO system.
Contents
Reporting features
Best practices: How to use custom queries
Multi-server rollup querying
Best practices: Running reports with the web API
Reporting features
You can use the preconfigured queries, create custom queries, use the output of the queries to
perform tasks, and create reports as output.
Whenever you change a policy, configuration, client or server task, automatic response, or report,
export the settings before and after the change.
To view one of the preconfigured queries, click Run. You can then perform the following tasks:
Save the output as a report.
Take action on the results as you normally would in the System Tree.
As you add new products using extensions to McAfee ePO, new preconfigured queries and reports
become available.
You run a query hourly and the query takes 10 minutes to run.
Events that occur during the 10 minutes, while the query is being run, are not included in that
report, but are written to the database.
Those events appear in the next query report run an hour later.
2 You can explore the Query Builder wizard and try different variables to see the different types of
available queries.
Both approaches are valid and can yield interesting data about your environment. If you are new to
the query system, try exploring different variables to see the types of data that McAfee ePO can
return.
Once you have created your report, you can act on the results. The type of action depends on the type
of output created by the report. You can do anything that you could do in the System Tree for
example, you can wake up systems, update them, delete them, or move them to another group. The
wake-up action is useful when running reports on systems that:
Have not communicated with the McAfee ePO server recently
Are suspected of not working properly when you try to wake them up
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then New Query. The Query wizard opens and displays the
Result Types tab.
The result types are organized into groups on the left side of the page. Depending on what
extensions have been checked in to McAfee ePO, these groups vary. Most of the result types are
self-explanatory, but two of the more powerful result types are Threat Events and Managed
Systems. You can access these two events types as shown in the following examples.
Threat Events In the Feature Group, select Events. Under Result Types, select Threat Events.
Managed Systems In the Feature Group, select System Management. Under Result Types, select
Managed Systems.
2 Choose your chart type. You have several chart types to choose from and some are more complex
than others. The two simplest charts are the pie chart and the single group summary table. The pie
chart compares multiple values in a graphic format, and the summary table displays a data set with
over 20 results.
To create a pie chart, in the Chart type, click Pie Chart.
3 Choose the label or variable that you want the report to display.
Many times the report does not have to return data on McAfee products. For example, you can
report on the operating system versions used in your environment.
4 Choose the columns that you want to see when you drill down on any of the variables in the report.
Choosing columns is not a critical component when building a query and can be adjusted later.
You can also drag and drop columns from left to right and add and remove columns to display.
You can filter the data that you want the query to return. You can leave the filter area blank, which
returns every device in your tree, or specify the return results you are interested in. Examples of
filter options include:
A group in your System Tree where the report applies. For example, a geographic location or
office.
Only return systems that have communicated with the McAfee ePO server in the past 14 days.
5 Click Next to not create any filters and display all operating system types.
When you have made all changes to your report, click Save to save it permanently. Now, this query
is included with your dashboards and you can run it any time.
Client events from your agents relate their task status to McAfee ePO. Items like update complete,
update failed, deployment completed, or encryption started are considered client events. Threat
events include a virus was found, a DLP event was triggered, or an intrusion was detected. Depending
on which products you have installed and which events you are collecting, there might be thousands
or even millions of these events in your database.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To create a client events summary query, select Menu | Reporting | Queries & Reports.
3 From the Query Builder, starting with the Result Types tab, click Events in the Features Group, Client
Events in Result Types, then click Next.
4 On the Chart page under Summary, click Single Group Summary Table to display a total count of all client
events in the events table.
5 To create a filter with a good human-readable description of the events, click Event Description, in the
Labels are list under Threat Event Descriptions.
Optionally, you can filter by the Event ID, which is the number that represents client event data in
McAfee ePO. For details about managed product generated event IDs listed in McAfee ePO, see
KnowledgeBase article McAfee point product generated Event IDs listed in ePO, KB54677.
6 If needed, adjust the column information based on the type that you want displayed.
In this example, there are a total of 308 client events. You can click one event and drill down to
display more information about it.
9 Click Save and type an appropriate name for the report. For example, All Client Events by
Event Description.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To start the query configuration, select Menu | Reporting | Queries & Reports.
3 From the Query wizard page, starting with the Result Types tab, click Events in the Features Group
and Threat Events in the Result Type, and click Next.
4 From the Chart page, under Summary, click Single Group Summary Table, to display a total count of all
threat events in the events table.
5 To create a filter with a good human-readable description of the events, click Event Description, in the
Labels are list, under Threat Event Descriptions.
Optionally, you can filter by the Event ID which is the number that represents client event data in
McAfee ePO. For details about managed product generated event IDs listed in McAfee ePO, see
KnowledgeBase article McAfee point product generated Event IDs listed in ePO, KB54677.
6 If needed, adjust the columns information based on the type that you want displayed, then click
Next.
7 On the Filter page, you do not need any filtering because you want every client event returned in
the database. Optionally, you can create a query based on events generated in a certain time, for
example the last 24 hours, or the last 7 days. Click Run to display the query report.
8 To determine about how many events you should have on your network, use the following formula:
(10,000 nodes) x (5 million events) = estimated number of events
For example, if you have 50,000 nodes, your range is 25 million total client and threat events.
This number varies greatly based on the number of products and policies you have and your data
retention rate. Do not panic if you exceed this number.
If you significantly exceed this number, determine why you have so many events. Sometimes this
many events are normal if you receive a significant number of viruses in unrestricted networks,
such as universities or college campuses. Another reason for a high event count could be how long
you keep the events in your database before purging. Here is what to check:
Are you purging your events regularly?
Is there a specific event in the query that comprises most of your events?
Remember, it's common to forget to include a purge task. This causes McAfee ePO to retain every
event that has occurred since the McAfee ePO server was built. You can fix this simply by creating a
purge task.
If you notice one or two events make up a disproportionate number of your events, you can then
determine what they are by drilling down into those events. For example, if you see that the event
with the most instances is an access protection rule from VirusScan Enterprise. This is a common
event. If you double-click the Access Protection rule event to drill down on the cause, you can see that
a few access protection rules are being triggered repeatedly on VirusScan Enterprise.
9 At this point, determine whether these are important events in your organization and if they are
being looked at by administrators. Ignoring some events is common by some administrators.
Ultimately, when dealing with excessive events in your database, you must follow this process:
a Create a query that shows all events you are questioning, then use the information in this
section to analyze these threat events.
c If events are not being analyzed, change your policy to stop the event forwarding.
d If the event is important, make sure that you are monitoring the number of events.
If no one is looking at these events, you might consider disabling them completely in the VirusScan
Enterprise access protection policy to stop them from being sent to the McAfee ePO server. Or, you
can adjust your policy to send only the access protection events that you are concerned with
instead of excessive events that are not being analyzed. If you do want to see these events, you
can leave the policy as configured, but confirm that you are following the rules about purging
events from the McAfee ePO server so that these events do not overrun your database.
See also
How event summary queries work best practice on page 353
Best practices: Purging events automatically on page 244
Best practices: Filtering 1051 and 1059 events on page 246
A table query is used to return data in a simple table format, without graphs or charts. Server tasks
can act on simple table data. For example, you can automatically delete this data.
This task creates a custom query that returns all 1051 and 1059 events in the database.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To open the Queries dialog box, select Menu | Reporting | Queries & Reports, then click New Query.
2 Click Events in the Features Group and Client Events in the Result Types, and click Next.
3 In the Display Results As pane, click List, then click Table, then click Next.
You can skip this step because McAfee ePO does not use the columns you choose in the server task.
5 In Available Properties under Client Events, click Event ID to create an Event ID filter.
An Event ID row is added in the Filter pane.
6 Click the plus sign, +, at the right to add another Event ID comparison row, select equals in the
Comparison column, add 1051 and 1059 in the Value column; then click Save and Run.
7 (Optional) You can select all these 1051 and 1059 events, then click Actions | Purge to purge them in
real time. You can filter which events to purge based on those events older than X Days, Weeks,
Months, or Years. Or you can Purge using a specific previously defined query.
Instead of purging the events in real time during business hours, you can create a server task that
runs the purge nightly during off hours.
8 To create a erver task, select Menu | Automation | Server Tasks and click Actions | New Task.
9 Give the task an appropriate name and description; then click Next.
For example, Purge of 1051 and 1059 Events Nightly.
10 Click Purge Threat Event Log from the Actions list, then click Purge by Query.
11 In the list, find and click the custom query that you created.
How it works
To roll up data for use by rollup queries, you must register each server (including the local server) that
you want to include in the query.
Once the servers are registered, you must configure Roll Up Data server tasks on the reporting server
(the server that performs the multi-server reporting). Roll Up Data server tasks retrieve the
information from all databases involved in the reporting, and populate the EPORollup_ tables on the
reporting server. The rollup queries target these database tables on the reporting server.
As a prerequisite to running a Rolled-Up Compliance History query, you must take two preparatory
actions on each server whose data you want to include:
Create a query to define compliance.
The reporting server must also be registered to include its summary data in roll up
reporting.
You can't roll up data from registered McAfee ePO servers at versions that are no longer supported. For
example, you can't aggregate data from McAfee ePO servers at version 4.5 or earlier.
Task
For details about product features, usage, and best practices, click ? or Help.
2 On the Description page, type a name and description for the task, and select whether to enable it,
then click Next.
4 From the Roll up data from: drop-down menu, select All registered servers or Select registered servers.
5 If you chose Select registered servers, click Select. Choose the servers you want data from in the Select
Registered Servers dialog box, then click OK.
6 Select the data type to be rolled up, then click Next. To select multiple data types, click the + at the
end of the table heading.
The data types Threat Events, Client Events, and Applied Policies can be further configured to
include the properties Purge, Filter, and Rollup Method. To do so, click Configure in the row that
describes the available properties.
If you are reporting on rolled-up compliance history data, make sure that the time unit of the
Rolled-Up Compliance History query matches the schedule type of the Generate Compliance Event
server tasks on the registered servers.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, then click New Query.
2 On the Result Type page, select System Management for Feature Group and Managed Systems for Result
Types, then click Next.
3 Select Boolean Pie Chart from the Display Result As list, then click Configure Criteria.
4 Select the properties to include in the query, then set the operators and values for each property.
Click OK. When the Chart page appears, click Next.
These properties define compliance for systems managed by this McAfee ePO server.
6 Select the filters to be applied to the query, click Run, then click Save.
Task
For option definitions, click ? in the interface.
1 Select Menu | Automation | Server Tasks , then click Actions | New Task.
2 On the Description page, type a name for the new task, then click Next.
4 Click browse (...) next to the Query field and select a query. The Select a query from the list dialog
box appears with the My Groups tab active.
5 Select the compliance-defining query. This could be a default query, such as McAfee Agent Compliance
Summary in the McAfee Groups section, or a user-created query, such as one described in Creating a
query to define compliance.
6 From the Sub-Actions drop-down menu, select Generate Compliance Event and specify the percentage or
number of target systems, then click Next.
You can generate events using the generate compliance event task if noncompliance rises above a
set percentage or set number of systems.
7 Schedule the task for the time interval needed for Compliance History reporting. For example, if
compliance must be collected on a weekly basis, schedule the task to run weekly. Click Next.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Reporting | Queries & Reports, select a query, then click Run.
3 Select what to export. For chart-based queries, select Chart data only or Chart data and drill-down tables.
4 Select whether the data files are exported individually or in a single archive (.zip) file.
HTML Use this report format to view the exported results as a webpage.
(Optional) Include a cover page with this text and enter the needed text.
7 Select whether the files are emailed as attachments to selected recipients, or they are saved to a
location on the server to which a link is provided. You can open or save the file to another location
by right-clicking it.
8 Click Export.
The files are either emailed as attachments to the recipients, or you are taken to a page where you
can access the files from links.
Use the web URL API or the McAfee ePO user interface
You can run queries using the web URL application programming interface (API) instead of using the
McAfee ePO user interface.
Using the web URL API or the McAfee ePO user interface, you can:
Run the URL and display the output as a list of text
Filter the output using Boolean operators that aren't available in the user interface
For example, you can run the New Agents Added to ePO per Week query in the McAfee ePO user interface and
get this output.
To run this query, select Menu | Reporting | Queries & reports, select New Agents Added to ePO per Week query, then
click Actions | Run.
Or you can paste this web URL query in your browser address bar.
https://<localHost>:8443/remote/core.executeQuery?queryId=34&:output=terse
OK:
count Completion Time (Week)
----- ----------------------
3 4/27/14 - 5/3/14
2 5/4/14 - 5/10/14
6 5/11/14 - 5/17/14
1 5/18/14 - 5/24/14
The AppliedTag command is accessed from the System Tree page in the McAfee ePO user interface.
You can find valid AppliedTag command parameters using this core.listTables web URL command:
https://<localHost>:8443/remote/core.listTables
The following Web URL command structure, and its parts, are used to find the AppliedTags command.
https://<localHost:8443/remote/core.listDatatypes?type=applied_tags
Command name Appears before the ? and is listed in the web API Help.
See also
Using the web URL Help: best practice on page 362
Using S-Expressions in web URL queries: best practice on page 364
https://<localHost>:8443/remote/core.listQueries?:output=terse
https://<localHost>:8443/remote/core.help?command=core.executeQuery
https://<localHost>:8443/remote/core.listTables
https://<localHost>:8443/remote/core.listQueries?:output=terse
Type the following command to query with an ID:
https://<localHost>:8443/remote/core.executeQuery?queryId=<IdNumber>
https://<localHost>:8443/remote/core.help?command=core.executeQuery
https://<localHost>:8443/remote/core.listTables?:output=terse
To list only the parameters for a specific table, use this command:
https://<localHost>:8443/remote/core.listTables?table=<tableName>
See also
Run query with ID number: best practice on page 370
This diagram shows the basic requirements for a fully qualified S-Expression query.
<tableName>.<argumentName> The names of the SQL table columns you want to display and
manipulate. For example, EPOLeafNode.NodeName is a managed system name and
EPOBranchNode.NodeName is a System Tree group name.
In this example web URL query, the EPOLeafNode and EPOBranchNode tables are automatically
joined to fulfill the query.
The two tables in this example must be fully qualified, or related, for the automatic join to work.
Find the valid parameters for the target tables and confirm the table relationships.
Before you can configure a sort order for your web URL query output, you must determine if the data
in a table column can be sorted. Use this command to confirm the column data can be sort ordered.
https://<localHost>:8443/remote/core.listTables?table=<tableName>
This example confirms you can sort the EPOBranchNode table NodeName column data. In the NodeName
row, True is listed in the Order ? column.
https://<localHost>:8443/remote/core.listTables?table=EPOBranchNode
OK:
Name: Groups
Target: EPOBranchNode
Type: join
Database Type:
Description: null
Columns:
Name Type Select? Condition? GroupBy? Order? Number?
------------- ------------- ------- ---------- -------- ------ -------
AutoID group False True False True True
NodeName string True False True True False
L1ParentID group False False True True True
L2ParentID group False False True True True
Type int False False False True True
This Order command is used to sort the McAfee ePO branch nodes, or System Tree Group Names, in
descending order.
https://<localHost>:8443//remote/core.executeQuery?
target=EPOLeafNode&:output=terse&select=(select EPOLeafNode.NodeName EPOLeafNode.Tags
EPOBranchNode.NodeName&order=(order(desc EPOBranchNode.NodeName)
OK:
System Name Tags Group Name
--------------- ------------ --------------
DP-2K12R2S-SRVR Server SuperAgents
DP-2K8ER2EPO510 Server Servers
DP-W7PIP-1 Workstation NAT Systems
DP-W7PIP-2 Workstation NAT Systems
DP-W7PIP-3 Workstation NAT Systems
DP-EN-W7E1XP-2 Lost&Found
DP-2K8AGTHDLR Server, test Agent handlers
This command groups, or counts, the System Tree system names, and groups them by McAfee ePO
branch nodes, or System Tree Group Names.
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&:output=terse&select=(select EPOBranchNode.NodeName (count))&group=(group
EPOBranchNode.NodeName)
OK:
Group Name count
-------------- -----
Agent handlers 1
Lost&Found 1
NAT Systems 3
Servers 1
SuperAgents 1
This is the command output displaying only the names with the string "2k8" in the name.
OK:
System Name Tags Group Name
--------------- ------------ --------------
DP-2K8ER2EPO510 Server Servers
DP-2K8AGTHDLR Server, test Agent handlers
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&:output=terse&select=(select (top 3) EPOLeafNode.NodeName
EPOLeafNode.Tags EPOBranchNode.NodeName)
This is the command output displaying the top 3 names in the list.
OK:
System Name Tags Group Name
--------------- ------ -----------
DP-2K8ER2EPO510 Server Servers
DP-2K12R2S-SRVR Server SuperAgents
DP-EN-W7E1XP-2 Lost&Found
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&:output=terse&select=(select EPOLeafNode.NodeName EPOLeafNode.Tags
EPOBranchNode.NodeName)&where=(hasTag EPOLeafNode.AppliedTags 4)
OK:
System Name Tags Group Name
----------- -------------- -----------
DP-W7PIP-1 7, Workstation Workstation
DP-W7PIP-2 7, Workstation Workstation
DP-W7PIP-3 7, Workstation Workstation
You can use the most common filters AND and OR. For example:
(AND <expression> <expression> )
You can also use filters that cant be constructed in the McAfee ePO user interface. For example:
(OR
(AND (hasTag EPOLeafNode.AppliedTags 3)
(contains EPOLeafNode.NodeName 100))
(AND (hasTag EPOLeafNode.AppliedTags 4)
(contains EPOLeafNode.NodeName 100))
)
See also
Using the web URL Help: best practice on page 362
<list id="1">
<query id="2">
<dictionary id="3"/>
<name>VSE: DAT Deployment</name>
<description>Displays the three highest DAT versions, and a slice for all the other
versions.</description>
<target>EPOLeafNode</target>
<table-uri>query:table?orion.table.columns=EPOComputerProperties.ComputerName
%3AEPOComputerProperties.DomainName%3AEPOLeafNode.os%3AEPOComputerProperties.Description
%3AEPOLeafNode.Tags%3AEPOProdPropsView_VIRUSCAN.productversion
%3AEPOProdPropsView_VIRUSCAN.hotfix%3AEPOProdPropsView_VIRUSCAN.servicepack
%3AEPOProdPropsView_VIRUSCAN.enginever
%3AEPOProdPropsView_VIRUSCAN.enginever64%3AEPOProdPropsView_VIRUSCAN.datver
%3AEPOLeafNode.LastUpdate&orion.table.order.by=EPOComputerProperties.ComputerName
%3AEPOComputerProperties.DomainName%3AEPOLeafNode.os%3AEPOComputerProperties.Description
%3AEPOLeafNode.Tags%3AEPOProdPropsView_VIRUSCAN.productversion
%3AEPOProdPropsView_VIRUSCAN.hotfix%3AEPOProdPropsView_VIRUSCAN.servicepack
%3AEPOProdPropsView_VIRUSCAN.enginever
%3AEPOProdPropsView_VIRUSCAN.enginever64%3AEPOProdPropsView_VIRUSCAN.datver
%3AEPOLeafNode.LastUpdate&orion.table.order=az</table-uri>
<condition-uri>query:condition?orion.condition.sexp=%28+where+%28+version_ge
+EPOProdPropsView_VIRUSCAN.productversion+%228%22+%29+%29</condition-uri>
<summary-uri>query:summary?
pie.slice.title=EPOProdPropsView_VIRUSCAN.datver&pie.count.title=EPOLeafNode&orion.query.type=pi
summary-uri>
</query>
</list>
The exported query contains strings that are URL-encoded. Use this table to convert the URL-encoded
characters to valid web URL query characters.
Figure 21-7 Exported query and web URL query data comparison
The commands in the <summary-uri>query: code creates the pie chart and are not used to create the
web URL query output. The order=desc parameter is shown as a sorting and grouping example in the
final web URL query.
This table lists the numbers shown in the figure, the major sections of the exported query and the
final web URL query, and how they are used.
Using the information from the existing query exported XML file, you can create this file, with line
breaks for clarity:
https://<localHost>8443/remote/core.executeQuery?
target=EPOLeafNode&
:output=terse&
order=(order(desc EPOLeafNode.NodeName))
The ? and &s indicate the different parts of the web URL query.
When you remove the line breaks, this example is final web URL query.
https://<localHost>:8443/remote/core.executeQuery?target=EPOLeafNode&select=(select
EPOLeafNode.NodeName EPOProdPropsView_VIRUSCAN.datver)&:output=terse& order=(order(desc
EPOLeafNode.NodeName))
OK:
System Name DAT Version (VirusScan Enterprise)
--------------- ----------------------------------
DP-W7PIP-3 7465.0000
DP-W7PIP-2 7429.0000
DP-W7PIP-1 7437.0000
DP-EN-W7E1XP-2
DP-2K8ER2EPO510 7465.0000
DP-2K8AGTHDLR 7437.0000
DP-2K12R2S-SRVR
Running web API queries is quicker than running a query using the McAfee ePO user interface. Plus,
you can use their output in scripts and redirect the output and port it for further processing.
For example, to access the query New Agents Added to ePO per Week using the McAfee ePO user
interface, select Menu | Reports | Queries & Reports, select the New Agents Added to ePO per Week query, and click
Actions | Run.
This web URL output is similar to the query output with the user interface, plus it allows you to use the
output in another script or manipulate it as needed.
Task
As an alternative, you can paste, https://<localHost>:8443/remote/core.executeQuery?
queryId=34 in a browser address bar to display this URL output.
2 To get a list of the preconfigured queries and their ID numbers, type this URL into the browser
address bar, then press Enter.
https://<localHost>:8443/remote/core.listQueries?:output=terse
Task
1 Export the existing query definition XML file and open it in a text editor.
Your export files look similar to this VSE: DAT Deployment XML definition file.
<list id="1">
<query id="2">
<dictionary id="3"/>
<name>VSE: DAT Deployment</name>
<description>Displays the three highest DAT versions, and a slice for all the other
versions.</description>
<target>EPOLeafNode</target>
<table-uri>query:table?orion.table.columns=EPOComputerProperties.ComputerName
%3AEPOComputerProperties.DomainName%3AEPOLeafNode.os%3AEPOComputerProperties.Description
%3AEPOLeafNode.Tags%3AEPOProdPropsView_VIRUSCAN.productversion
%3AEPOProdPropsView_VIRUSCAN.hotfix%3AEPOProdPropsView_VIRUSCAN.servicepack
%3AEPOProdPropsView_VIRUSCAN.enginever
%3AEPOProdPropsView_VIRUSCAN.enginever64%3AEPOProdPropsView_VIRUSCAN.datver
%3AEPOLeafNode.LastUpdate&orion.table.order.by=EPOComputerProperties.ComputerName
%3AEPOComputerProperties.DomainName%3AEPOLeafNode.os%3AEPOComputerProperties.Description
%3AEPOLeafNode.Tags%3AEPOProdPropsView_VIRUSCAN.productversion
%3AEPOProdPropsView_VIRUSCAN.hotfix%3AEPOProdPropsView_VIRUSCAN.servicepack
%3AEPOProdPropsView_VIRUSCAN.enginever
%3AEPOProdPropsView_VIRUSCAN.enginever64%3AEPOProdPropsView_VIRUSCAN.datver
%3AEPOLeafNode.LastUpdate&orion.table.order=az</table-uri>
<condition-uri>query:condition?orion.condition.sexp=%28+where+%28+version_ge
+EPOProdPropsView_VIRUSCAN.productversion+%228%22+%29+%29</condition-uri>
<summary-uri>query:summary?
pie.slice.title=EPOProdPropsView_VIRUSCAN.datver&pie.count.title=EPOLeafNode&orion.query.type
summary-uri>
</query>
</list>
2 Open an existing web URL query file to use as a template, then save it with a new name. For
example, URL_template.
https://<localHost>:8443/remote/core.executeQuery?
target=<tableTarget>&
select=(select <tableObjectNames>)
3 From the query definition XML file, find the query target listed between the target tags.
For example, <target>EPOLeafNode</target> and paste the target table name in target= of your
template URL.
This is the template the URL with the target table name added.
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&
select=(select <tableObjectNames>)
4 From the query definition XML file, find the S-Expression function, listed between the opening and
closing <condition-uri> ... </condition-uri> tags, then perform these steps:
a In the URL template file, paste the object names in the select=(select parameter and the
closing parenthesis. This example adds the EPOLeafNode.NodeName (system name) and
EPOProdPropsView_VIRUSCAN.datver (VirusScan Enterprise DAT version) from the
EPOLeafNode (System Tree) table.
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&
select=(select EPOLeafNode.NodeName EPOProdPropsView_VIRUSCAN.datver)
b Add the sort order function. For example, to sort the output by system name, add the string "&
order=(order(desc EPOProdPropsView_VIRUSCAN.datver)" in the existing S-Expression.
The following example sorts the output by the VirusScan Enterprise DAT version.
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&
select=(select EPOLeafNode.NodeName EPOProdPropsView_VIRUSCAN.datver&
order=(order(asc EPOProdPropsView_VIRUSCAN.datver))
5 Replace the <localHost> variable with your McAfee ePO server DNS name, or IP address and paste
the URL in your browser address bar. Your output should be similar to this output, but with many
entries.
OK:
System Name: DP-2K12R2S-SRVR
DAT Version (VirusScan Enterprise):
6 (Optional) To have the information appear in table format, paste the string :output=terse& before
any ampersand in the URL and rerun the command. This is an example of your template file
with :output=terse& added.
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&:output=terse&select=(select EPOLeafNode.NodeName
EPOProdPropsView_VIRUSCAN.datver)&
order=(order(desc EPOLeafNode.NodeName))
OK:
System Name DAT Version (VirusScan Enterprise)
--------------- ----------------------------------
DP-2K12R2S-SRVR
DP-EN-W7E1XP-2
DP-W7PIP-2 7429.0000
DP-W7PIP-1 7437.0000
DP-2K8AGTHDLR 7437.0000
DP-2K8ER2EPO510 7465.0000
DP-W7PIP-3 7465.0000
.
.
.
You have created a web URL query using the information exported from an existing XML query
definition.
See also
Using S-Expressions in web URL queries: best practice on page 364
Parsing query export data to create web URL queries best practice on page 368
When the agent was last updated Displays the information as a table
Task
1 To find the name of the SQL table with most of your information, use this Help command.
https://<localHost>:8443/remote/core.listTables?:output=terse
2 Using your text editor, type this web URL template command.
https://<localHost>:8443/remote/core.executeQuery?target=<tableName>&select=(select
<columns>)
3 Use the information from this command to find the arguments for the system names, McAfee Agent
version, and when it was last updated.
https://<localHost>:8443/remote/core.listTables?:output=terse&table=EPOLeafNode
This command displays this information, which you need for your web URL query:
Query "target" EPOLeafNode
OK:
Name: Managed Systems
Target: EPOLeafNode
Type: target
Database Type:
Description: Retrieves information about systems that have been added to your System Tree.
Columns:
Name Type Select? Condition? GroupBy? Order? Number?
---------------------------- ------------- ------- ---------- -------- ------ -------
AutoID int False False False True True
Tags string True False False True False
ExcludedTags string True False False True False
AppliedTags applied_tags False True False False False
LastUpdate timestamp True True True True False
os string True False False False False
products string False False False False False
NodeName string True True True True False
ManagedState enum True True False True False
AgentVersion string_lookup True True True True False
AgentGUID string True False False True False
Type int False False False True False
ParentID int False False False True True
ResortEnabled boolean True True False True False
ServerKeyHash string True True False True False
NodePath string_lookup False False False True False
TransferSiteListsID isNotNull True True False True False
SequenceErrorCount int True True False True True
SequenceErrorCountLastUpdate timestamp True True False True False
LastCommSecure string_enum True True True True False
TenantId int False False False True True
Related Tables:
Name
--------------------------
EPOProdPropsView_EEFF
EPOProdPropsView_VIRUSCAN
EPOProductPropertyProducts
EPOProdPropsView_PCR
EPOBranchNode
EPOProdPropsView_EPOAGENT
EPOComputerProperties
EPOComputerLdapProperties
EPOTagAssignment
EPOProdPropsView_TELEMETRY
Foreign Keys:
Source table Source Columns Destination table Destination columns Allows
inverse? One-to-one? Many-to-one?
4 Add the arguments from step 3 to the web URL template command and test it. Confirm that your
command looks similar to this example.
https://<localHost>:8443/remote/core.executeQuery?target=EPOLeafNode&select=(select
EPOLeafNode.NodeName EPOLeafNode.AgentVersion EPOLeafNode.LastUpdate)
OK:
System Name: DP-2K8ER2EPO510
Agent Version (deprecated): 4.8.0.887
Last Communication: 6/13/14 9:21:49 AM PDT
.
.
.
5 Use the core.listTables Help command again, but with the EPOProdPropsView_VIRUSCAN table.
This table lists the VirusScan Enterprise products and versions installed on each system. Confirm
that your command looks similar to this example.
https://<localHost>:8443/remote/core.listTables?table=EPOProdPropsView_VIRUSCAN
6 Using the output of step 5, add these parameters to your web URL command and test it.
VirusScan Enterprise product family EPOProdPropsView_VIRUSCAN.ProductFamily
OK:
System Name: DP-2K8ER2EPO510
Agent Version (deprecated): 4.8.0.887
Last Communication: 6/13/14 10:21:50 AM PDT
ProdProps.productFamily (VirusScan Enterprise): VIRUSCAN
Product Version (VirusScan Enterprise): 8.8.0.1266
.
.
.
7 Finally, to show the output as a table, add the command :output=terse& after the first ampersand
and rerun the command.
https://<localHost>:8443/remote/core.executeQuery?
target=EPOLeafNode&:output=terse&select=(select EPOLeafNode.NodeName
EPOLeafNode.AgentVersion EPOLeafNode.LastUpdate EPOProdPropsView_VIRUSCAN.ProductFamily
EPOProdPropsView_VIRUSCAN.productversion)
OK:
System Name Agent Version (deprecated) Last Communication
ProdProps.productFamily (VirusScan Enterprise) Product Version (VirusScan Enterprise)
--------------- -------------------------- ----------------------- ----------------------------------
DP-2K8ER2EPO510 4.8.0.887 6/13/14 10:21:50 AM PDT
VIRUSCAN 8.8.0.1266
DP-2K12R2S-SRVR 4.8.0.887 6/13/14 10:55:19 AM PDT
VIRUSCAN
DP-EN-W7E1XP-2 null null
VIRUSCAN
DP-W7PIP-1 4.8.0.887 6/13/14 10:37:20 AM PDT
VIRUSCAN 8.8.0.1266
DP-W7PIP-2 4.8.0.887 6/13/14 10:36:56 AM PDT
VIRUSCAN 8.8.0.1266
DP-W7PIP-3 4.8.0.887 6/13/14 10:37:00 AM PDT
VIRUSCAN 8.8.0.1266
DP-2K8AGTHDLR 4.8.0.887 6/13/14 10:25:10 AM PDT
VIRUSCAN 8.8.0.1266
See also
Using the web URL Help: best practice on page 362
Contents
Open a remote console connection
Plan your disaster recovery
Registered servers
Issues
SSL certificates
Configure Product Improvement Program
Restore administrator rights
Ports overview
When you connect to McAfee ePO using a remote connection, some configuration changes are not
allowed. For example, you can't run registered executables from a remote connection.
To configure a remote connection you must determine your McAfee ePO server name, or IP address,
and the server communication port number. When you open McAfee ePO, while logged on to your
physical McAfee ePO server, notice the address that appears in your browser. Confirm that it is similar
to:
https://win-2k8-epo59:8443/core/orionSplashScreen.do
:8443 Is the console-to-application server communication port number used by McAfee ePO.
Task
1 Open any McAfee ePO supported Internet browser. See McAfee ePO Installation Guide for a list of
supported browsers.
2 In the browser address bar type either of the following, and click Enter:
https://<servername>:8443
https://<ipaddress_of_server>:8443
3 Logon to McAfee ePO and you have established a remote console connection.
See the McAfee ePO Web API Scripting Guide for examples of expanded commands you can run from
a remote console connection.
Disaster Recovery
The Disaster Recovery feature helps you quickly recover or reinstall your McAfee ePO software.
Disaster Recovery uses a Snapshot feature that periodically saves your McAfee ePO configuration,
extensions, keys, and more to snapshot records in the McAfee ePO database. For additional
information, see KnowledgeBase Article McAfee ePO server backup and disaster recovery procedure,
KB66616.
The records saved by the snapshot contain the whole McAfee ePO configuration at the specific time the
snapshot is taken. Once the snapshot records are saved to the database, you can use the Microsoft
SQL backup feature to save the whole McAfee ePO database and restore it to another SQL Server.
The McAfee ePO software Disaster Recovery configuration includes these general steps performed on
the McAfee ePO primary server:
1 Take a snapshot of the McAfee ePO server configuration and save it to the primary SQL database.
You can create this snapshot manually or through a default server task provided for this purpose.
2 Back up the SQL database using the Microsoft SQL Server Management Studio or the BACKUP
(Transact-SQL) command-line process.
3 Copy the SQL database backup file, created in step 2, to the duplicate SQL Server used to restore
the database.
4 Reinstall the McAfee ePO software using the Restore option when the McAfee ePO Setup starts.
The full restore procedures are described in McAfee ePO server backup and disaster recovery
procedure, KnowledgeBase article KB66616.
You must have a last-known-good SQL database backup for this IP address change to work.
If the primary site fails to communicate, configure all agents previously communicating with the
primary McAfee ePO server to communicate with the secondary server. The agents find the McAfee
ePO server by communicating to its IP address first, and if that fails they use its DNS name. If the
agents find that the primary McAfee ePO server's IP address is not available, these steps occur.
1 The agents query the DNS where you have changed the IP address for the primary server.
3 The agents try to connect to the secondary McAfee ePO server and SQL database.
Registered servers
Access additional servers by registering them with your McAfee ePO server. Registered servers allow
you to integrate your software with other, external servers. For example, register an LDAP server to
connect with your Active Directory server.
LDAP servers
Each type of registered server supports or supplements the functionality of McAfee ePO and other
McAfee and third-party extensions and products.
We recommend that you use certificates with RSA public key lengths of 2048 bits or greater for the
registered servers that connect to McAfee ePO. For more information, including additional supported
public key algorithms and key lengths, see KnowledgeBase article, KB87731.
Contents
Register McAfee ePO servers
Using database servers
Register SNMP servers
Register syslog servers
Register LDAP servers
Mirroring an LDAP server
Sharing objects between servers
https://<server_name>:<port>/core/config
<port> The assigned McAfee ePO server port number, usually "8443", unless your
server is configured to use a different port number
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Server type menu on the Description page, select ePO, specify a unique name and any
notes, then click Next.
Option Definition
Authentication type Specifies the type of authentication to use for this database, including:
Windows authentication
SQL authentication
Client task sharing Specifies whether to enable or disable client task for this server.
Database name Specifies the name for this database.
Database port Specifies the port for this database.
Database server Specifies the name of the database for this server. You can specify a
databaseMcAfee ePO using DNS Name or IP address (IPv4 or IPv6).
ePO Version Specifies the version of the server being registered.
Password Specifies the password for this server.
Policy sharing Specifies whether to enable or disable policy sharing for this server.
SQL Server instance Allows you to specify whether this is the default server or a specific instance,
by providing the Instance name.
Ensure that the SQL browser service is running before connecting to a specific
SQL instance using its instance name. Specify the port number if the SQL
browser service is not running.
Select the Default SQL server instance and type the port number to
connect to the SQL server instance.
SSL communication Specifies whether McAfee ePO uses SSL (Secure Socket Layer)
with database server communication with this database server including:
Try to use SSL
Always use SSL
Never use SSL
Option Definition
Transfer systems Specifies whether to enable or disable the ability to transfer systems for this
server. When enabled, select Automatic sitelist import or Manual sitelist import.
Use NTLMv2 Optionally choose to use NT LAN Manager authentication protocol. Select this
option when the server you are registering uses this protocol.
User name Specifies the user name for this server.
4 Click Save.
Database types
An extension can register a database type, otherwise known as a schema or structure, with McAfee
ePO. If it does, that extension can provide data to queries, reports, dashboard monitors, and server
tasks. To use this data, you must first register the server with McAfee ePO.
Database server
A database server is a combination of a server and a database type installed on that server. A server
can host more than one database type, and a database type can be installed on multiple servers. Each
specific combination of the two must be registered separately and is referred to as a database server.
After you register a database server, you can retrieve data from the database in queries, reports,
dashboard monitors, and server tasks. If more than one database using the same database type is
registered, you are required to select one of them as the default for that database type.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Registered Servers page: select Menu | Configuration | Registered Servers, then click New Server.
2 Select Database server in the Server type drop-down list, enter a server name and an optional
description, then click Next.
3 Choose a Database type from the drop-down list of registered types. Indicate if you want this
database type to be as the default.
If there is already a default database assigned for this database type, it is indicated in the Current
Default database for database type row.
4 Indicate the Database Vendor. Currently, only Microsoft SQL Server and MySQL are supported.
5 Enter the connection specifics and logon credentials for the database server.
6 To verify that all connection information and logon credentials are entered correctly, click Test
Connection.
7 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Registered Servers page by selecting Menu | Configuration | Registered Servers.
3 Change the name or notes for the server, then click Next.
4 Modify the information as appropriate. To verify the database connection, click Test Connection.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Open the Registered Servers page: select Menu | Configuration | Registered Servers.
3 When the confirmation dialog appears, click Yes to delete the database.
The database has been deleted. Any queries, reports, or other items within McAfee ePO that used the
deleted database is designated as invalid until updated to use a different database.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Server Type menu on the Description page, select SNMP Server, provide the name and any
additional information about the server, then click Next.
3 From the URL drop-down list, select one of these types of server address, then enter the address:
DNS Name Specifies the DNS name of the registered server.
IPv6 Specifies the DNS name of the registered server which has an IPv6 address.
6 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Server type menu on the Description page, select Syslog Server, specify a unique name and
any details, then click Next.
b TCP port number Type the syslog server TCP port. The default is 6514.
c Enable event forwarding Click to enable even forwarding from Agent Handler to this syslog server.
d Test Click Test Connection to verify the connection to your syslog server.
4 Click Save.
After you register the syslog server, you can set McAfee ePO to send events to your syslog server.
These events are saved, by default, on your Agent Handler at this path: C:\Program Files
(x86)\McAfee\Agent Handler\DB\Logs\server_<serverName>.log. This log file includes any syslog
server errors that might occur.
Task
For details about product features, usage, and best practices, click ? or Help.
2 From the Server type menu on the Description page, select LDAP Server, specify a unique name and any
details, then click Next.
3 Choose whether you are registering an OpenLDAP or Active Directory server in the LDAP server type
list.
The rest of these instructions assume that an Active Directory server is being configured.
OpenLDAP-specific information is included where required.
4 Choose if you are specifying a Domain name or a specific server name in the Server name section.
Use DNS-style domain names. For example, internaldomain.com and fully-qualified domain
names or IP addresses for servers, and server1.internaldomain.com or 192.168.75.101.
Using domain names gives failover support, and allows you to choose only servers from a specific
site if wanted.
OpenLDAP servers can only use server names and cannot be specified by domain.
6 If you have chosen to not use the Global Catalog, choose whether to Chase referrals or not.
Chasing referrals can cause performance problems if it leads to non-local network traffic, whether a
Global Catalog is used.
7 Choose whether to Use SSL when communicating with this server or not.
10 Either enter a Site name for the server, or select it by clicking Browse and navigating to it.
11 Click Test Connection to verify communication with the server as specified. Alter information as
necessary.
Default connection process from the configured LDAP server to the Agent Handler.
Mirrored LDAP connection with the LDAP Synchronize server task requesting user information
from the LDAP server.
Shows the LDAP server user information mirrored to the McAfee ePO database.
Shows an Agent Handler behind the DMZ accessing the mirrored LDAP server information in the
McAfee ePO database.
Medium to large organizations can access that user information used by the Agent Handler from
the database faster to satisfy LDAP requests for UBPs.
Agent Handlers behind a DMZ can access the LDAP user information.
The LDAP information in the database can't be accessed or queried from the McAfee ePO user interface.
By default, the LDAP information in the database is updated every 8 hours by the LdapSync: Sync
across users from LDAP server task unless:
An "LDAP change notification" is sent to the Agent Handler from the McAfee ePO server.
By default, the LDAP user information cache in the Agent Handler is updated every 30 minutes.
The following items can be exported. Installed extensions can add items to this list. Check the
extension documentation for details.
Reports
Policy Catalog
Tag Catalog
The following items can have a table of their current contents exported.
Audit Log
Issues
Task
For details about product features, usage, and best practices, click ? or Help.
1 From the page displaying the objects or data, click Actions and select an option. For example, when
exporting a table, select Export Table, then click Next.
2 When exporting content that can be downloaded in multiple formats, such as Query data, an Export
page with configuration options appears. Specify your preferences, then click Export.
3 When exporting objects or definitions, such as client task objects or definitions, one of the following
occurs:
A browser window opens where you can choose Open or Save.
An Export page with a link to the file opens. Left-click the link to view the file in your browser, or
right-click the link to save the file.
Importing items
When importing items into McAfee ePO, certain rules are followed:
All items except users are imported with private visibility by default. You can apply other
permissions either during or after import.
If an item exists with the same name, "(imported)" or "(copy)" is appended to the imported
item's name.
Imported items requiring an extension or product that does not exist on the new server is
designated as invalid.
Specific details on how to import different kinds of items can be found in the documentation for the
individual items.
Issues
Issues are action items that can be prioritized, assigned, and tracked.
Contents
Issues and how they work
View issues
Remove closed issues from the Issues table
Create issues manually
Configure responses to automatically create issues
Manage issues
Use tickets with McAfee ePO
Issues can be deleted manually, and closed issues can be manually purged based on their age and
automatically purged through a user-configured server task.
View issues
The Issues page provides a list of current and closed issues.
Task
For details about product features, usage, and best practices, click ? or Help.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click Purge.
3 In the Purge dialog box, enter a number, then select a time unit.
4 Click OK.
Any items of the specified age or older are deleted, including items not in the current view. The
number of removed items is displayed in the lower right corner of the page.
Task
For details about product features, usage, and best practices, click ? or Help.
2 In the New Issue dialog box, select an issue type from the Create issue of type drop-down list, then click
OK. If you are unsure which issue type to select, choose Basic.
3 Configure the new issue. Any due dates you specify must be in the future.
4 Click Save.
Task
For details about product features, usage, and best practices, click ? or Help.
3 Select properties to narrow the events that trigger the response, then click Next.
The maximum time period that you want this response to occur.
5 Select Create issue from the drop-down list, then select the type of issue to create.
This choice determines the options that appear on this page.
6 Type a name and description for the issue. Optionally, select one or more variables for the name
and description.
This feature provides a number of variables providing information to help fix the issue.
7 Type or select any additional options for the response, then click Next.
Manage issues
You can add comments, assign, delete, edit, and view details of issues.
Task
For details about product features, usage, and best practices, click ? or Help.
Option Definition
Adding comments 1 Select the checkbox next to each issue you want to comment, then click
to issues Action | Add comment.
2 In the Add comment panel, type the comment you want to add to the
selected issues.
3 Click OK to add the comment.
Assigning issues Select the checkbox next to each issue you want to assign, then click Assign
to user.
Display required Click Actions | Choose Columns. Select columns of data to be displayed on the
columns on Issues Issues page.
page
Deleting issues 1 Select the checkbox next to each issue you want to delete, then click
Delete.
2 Click OK to delete the selected issues.
Editing issues 1 Select the checkbox next to an issue, then click Edit.
3 Click Save.
Exporting the list of 1 Click Actions | Export Table to open the Export page.
issues
2 From the Export page, you can specify the format of files to be exported,
as well as how they are packaged.
SSL certificates
Browsers supported by McAfee ePO warn about a servers SSL certificate if the browser cannot verify
whether a TrustedSource signed the certificate. Creating a self-signed certificate with OpenSSL stops
the browser warning.
Creating a self-signed certificate can provide the basic security and functionality needed for systems
used on internal networks, or if you don't want to wait for a certification authority to authenticate a
certificate.
http://www.slproweb.com/products/Win32OpenSSL.html http://www.slproweb.com/
products/Win32OpenSSL.html
To create and self-sign a certificate to use with your McAfee ePO server, use OpenSSL for Windows
software. There are many tools you can use to create a self-sign a certificate. This task describes the
process using OpenSSL.
To have a third party, for example Verisign or Microsoft Windows Enterprise Certificate Authority, create
a signed certificate for McAfee ePO, see How to generate a custom SSL certificate for use with ePO
using the OpenSSL toolkit, KB72477.
OpenSSL does not create these folders by default. They are used in these examples and can be created
to help you find your output files.
We recommend that you use certificates with RSA public key lengths of 2048 bits or greater.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To generate the initial certificate key, type the following command at the command line:
C:\ss\bin>
2 Enter a passphrase at the initial command prompt and verify the pass phase at the second
command prompt.
Make a note of the passphrase you enter. You need it later in the process.
The file name ca.key is generated and stored in the path C:\ssl\keys\.
3 To self-sign the certificate key you created, type the following command at the command line:
openssl req -new -x509 -days 365 -key C:/ssl/keys/ca.key -out C:/ssl/certs/ca.cer
The following screen appears.
At this command prompt, type the name of your server, for example your McAfee ePO server
name.
The file named ca.cer is generated and stored in the path C:\ssl\certs\.
4 To upload the self-signed certificate, open the Edit Server Certificate page.
a Select Menu | Configuration | Server Settings.
b From the Setting Categories list, select Server Certificate, and click Edit.
Use these commands to separate the certificate and key from a PKCS12 certificate with them
combined.
In the previous example, C:\ssl\keys is the input and output paths for the file names key.pem and
keyNoPassword.pem.
http://www.slproweb.com/products/Win32OpenSSL.html
Using the OpenSSL for Windows software, convert your PVK format certificate to PEM format.
Task
For details about product features, usage, and best practices, click ? or Help.
1 To convert a previously created PVK file to a PEM file, type the following at the command line:
openssl rsa -inform PVK -outform PEM -in C:\ssl\keys\myPrivateKey.pvk -out C:\ssl
\keys\myPrivateKey.pem -passin pass:p@$$w0rd -passout pass:p@$$w0rd
2 If prompted, type the password used when you originally created the PVK file.
If the passout argument is not used in the example, the newly created PEM-formatted key is not
password protected.
Migrate certificates that are signed by older signing algorithm to the new algorithm such as SHA-1
to SHA256.
Regenerate your certificates when your existing certificates are compromised due to vulnerabilities
in your environment.
Migrate or regenerate certificates for managed products that are derived from McAfee ePO root CA.
This task replaces certificates that are used for all these McAfee ePO operations:
Agent-server communication
Authenticating to browsers
Task
For details about product features, usage, and best practices, click ? or Help.
Distribution percentage is calculated based on the agent-server communication after the certificates
are regenerated.
If the certificate generation fails, click Restart Migration to revert to the previous certificates and start
the certificate migration again after fixing the issues.
4 Once the certificates are generated, click Activate Certificates to carry out all future operations using
new certificates.
A backup of original certificates is created before proceeding with activation process.
Make sure that the distribution percentage is 100%. If not the pending systems do not receive the
newly generated certificates and cannot communicate with the McAfee ePO when the certificates are
activated. Deploy agent on the pending systems to enable them to communication with the server.
If the certificate activation fails, click Restart Migration to revert to the previous certificates and start
the certificate migration again after fixing the issues.
Each pair's secret key signs messages or packages at their source, while the pair's public key verifies
the messages or packages at their target.
From then on, the server uses the agent public key to verify messages signed with the agent's
secret key.
The server uses its own secret key to sign its message to the agent.
The agent uses the server's public key to verify the server's message.
You can have multiple secure communication key pairs, but only one can be designated as the
master key.
When the client agent key updater task runs (McAfee ePO Agent Key Updater), agents using different
public keys receive the current public key.
When you upgrade, existing keys are migrated to your McAfee ePO server.
The agent retrieves available new content each time the client update task runs.
By exporting and importing keys among servers, you can use the same key pair in a multi-server
environment.
If this key is deleted, you cannot perform a pull, even if you import a key from another server.
Before you overwrite or delete this key, make sure to back it up in a secure location.
The McAfee Agent public key verifies content that is retrieved from the remote repository.
This key pair is unique to each server installation. However, by exporting and importing keys, you can
use the same key pair in a multi-server environment. Doing so ensures that agents can always
connect to one of your Master Repositories, even when another repository is down.
If an agent downloads content that originated from a source where the agent does not have the
appropriate public key, the agent discards the content.
These keys are a new feature, and only agents 4.0 and later are able to use the new protocols.
Tasks
Use one Master Repository key pair for all servers on page 399
You can ensure that all McAfee ePO servers and agents use the same Master Repository key
pair in a multi-server environment using Server Settings.
Use Master Repository keys in multi-server environments on page 399
Make sure that agents can use content originating from any McAfee ePO server in your
environment using Server Settings.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Security Keys from the Setting Categories list, then click
Edit.
2 From the Edit Security Keys page next to Local master repository key pair, click Export Key Pair.
4 Click Save, browse to a location that is accessible by the other servers, where you want to save
the .zip file containing the secure-communication key files, then click Save.
6 Browse to the .zip file containing the exported Master Repository key files, then click Next.
7 Verify that these are the keys you want to import, then click Save.
The imported Master Repository key pair replaces the existing key pair on this server. Agents begin
using the new key pair after the next agent update task runs. Once the Master Repository key pair is
changed, an ASSC must be performed before the agent can use the new key.
The Master Repository key pair is unique for each installation of McAfee ePO. If you use multiple
servers, each uses a different key. If your agents can download content that originates from different
Master Repositories, you must make sure that agents recognize the content as valid.
Use the same Master Repository key pair for all servers and agents.
Make sure that agents are configured to recognize any repository public key that is used in your
environment.
This task exports the key pair from one McAfee ePO server to a target McAfee ePO server, then, at the
target McAfee ePO server, imports, and overwrites the existing key pair.
Task
For details about product features, usage, and best practices, click ? or Help.
1 On the McAfee ePO server with the Master Repository key pair, select Menu | Configuration | Server
Settings, select Security Keys from the Setting Categories list, then click Edit.
2 Next to Local master repository key pair, click Export Key Pair, then click OK.
4 Browse to a location on the target McAfee ePO server to save the .zip file. Change the name of the
file if needed, then click Save.
5 On the target McAfee ePO server where you want to load the Master Repository key pair, select
Menu | Configuration | Server Settings, select Security Keys from the Setting Categories list, then click Edit.
b Next to Select file, browse to and select the master key pair file you saved, then click Next.
c If the summary information appears correct, click Save. The new master key pair appears in the
list next to Agent-server secure communication keys.
7 From the list, select the file you imported in the previous steps, then click Make Master. This setting
changes the existing master key pair to the new key pair you imported.
Make sure to wait until all agents have updated to the new master before deleting older keys.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Security Keys, then click Edit.
Action Steps
Generate and 1 Next to the Agent-server secure communication keys list, click New Key. In the dialog box,
use new type the name of the security key.
ASSC key
pairs 2 If you want existing agents to use the new key, select the key in the list, then
click Make Master. Agents begin using the new key after the next McAfee Agent
update task is complete.
Make sure that there is an Agent Key Updater package for each version of the
McAfee Agent managed by McAfee ePO.
In large installations, only generate and use new master key pairs when you
have specific reason to do so. We recommend performing this procedure in
phases so that you can more closely monitor progress.
3 After all agents have stopped using the old key, delete it.
In the list of keys, the number of agents currently using that key is displayed to
the right of every key.
4 Back up all keys.
Export ASSC Export ASSC keys from one McAfee ePO server to a different McAfee ePO server, to
keys allow agents to access the new McAfee ePO server.
1 In the Agent-server secure communication keys list, select a key, then click Export.
2 Click OK.
Your browser prompts you to download the sr<ServerName>.zip file to the
specified location.
If you specified a default location for all browser downloads, this file might be
automatically saved to that location.
Import ASSC Import ASSC keys that were exported from a different McAfee ePO server, allowing
keys agents from that server to access this McAfee ePO server.
1 Click Import.
2 Browse to and select the key from the location where you saved it (by default,
on the desktop), then click Open.
3 Click Next and review the information about the Import Keys page.
4 Click Save.
Action Steps
Designate an Change which key pair is specified as the master. Specify a master key pair after
ASSC key importing or generating a new key pair.
pair as the
1 From the Agent-server secure communication keys list, select a key, then click Make Master.
master
2 Create an update task for the agents to run immediately, so that agents update
after the next agent-server communication.
Make sure that the Agent Key Updater package is checked in to the McAfee ePO
Master Repository. Agents begin using the new key pair after the next update
task for the McAfee Agent is complete. At any time, you can see which agents are
using any of the ASSC key pairs in the list.
Delete ASSC
keys Do not delete any keys that are being used by any agents. If you do, those agents
cannot communicate with the McAfee ePO server.
1 From the Agent-server secure communication keys list, select the key that you want to
remove, then click Delete.
2 Click OK to delete the key pair from this server.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Security Keys from the Setting Categories list, then click
Edit.
2 In the Agent-server secure communication keys list, select a key, then click View Agents.
This Systems using this key page lists all systems whose agents are using the selected key.
Use the same ASSC key pair for all servers and agents
Verify that all McAfee ePO servers and agents use the same agent-server secure communication
(ASSC) key pair.
If you have many managed systems in your environment, McAfee recommends performing this process
in phases so you can monitor agent updates.
Task
1 Create an agent update task.
2 Export the keys chosen from the selected McAfee ePO server.
6 When all agents are using the new keys, delete any unused keys.
Use a different ASSC key pair for each McAfee ePO server
You can use a different ASSC key pair for each McAfee ePO server to ensure that all agents can
communicate with the required McAfee ePO servers in an environment where each server must have a
unique agent-server secure communication key pair.
Agents can communicate with only one server at a time. The McAfee ePO server can have multiple keys
to communicate with different agents, but the opposite is not true. Agents cannot have multiple keys to
communicate with multiple McAfee ePO servers.
Task
For details about product features, usage, and best practices, click ? or Help.
1 From each McAfee ePO server in your environment, export the master agent-server secure
communication key pair to a temporary location.
2 Import each of these key pairs into every McAfee ePO server.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Settings, select Security Keys from the Setting Categories list, then click
Edit.
2 From the Edit Security Keys page, select one of these actions.
Action Steps
Back up all 1 Click Back Up All near the bottom of the page.
security
keys. The Backup Keystore dialog box appears.
2 You can optionally enter a password to encrypt the Keystore .zip file or click OK to
save the files as unencrypted text.
3 From the File Download dialog box, click Save to create a .zip file of all security
keys.
The Save As dialog box appears.
4 Browse to a secure network location to store the .zip file, then click Save.
4 Click Restore.
The Edit Security Keys page reappears.
5 Browse to a secure network location to store the .zip file, then click Save.
6 Verify that the keys in this file are the ones you want to overwrite your existing
keys, then click Restore All.
Task
For details about product features, usage, and best practices, click ? or Help.
1 Select Menu | Configuration | Server Setting, select Product Improvement Program from the Setting Categories, then
click Edit.
2 Select Yes to allow McAfee to collect anonymous diagnostic and usage data, then click Save.
To learn more about the McAfee Product Improvement Program, go to http://www.mcafee.com/us/
products/security-management/product-improvement-program.aspx.
Tasks
Uninstall McAfee Product Improvement Program on page 405
The McAfee Product Improvement Program can be uninstalled at any time.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Select Menu | Policy | Client Task Catalog, select McAfee Agent | Product Deployment as Client Task Types, then
click Actions | New Task.
3 Create a task to uninstall the McAfee Product Improvement Program from the required client
systems.
4 Assign the task to the client systems and send an agent wake-up call.
5 Click Menu | Software | Master Repository, click Delete next to the McAfee Product Improvement Program package,
then click OK.
6 Click Menu | Software | Extensions, then select McAfee Product Improvement Program.
You must have the current database credentials for McAfee ePO.
Task
1 From your server, open a browser to localhost:8080.
3 Under Database credentials, enter the current user name and password.
Database user name: the current user name for the database.
4 Under Administrator credentials, enter the user name and password for the new temporary administrator
account.
User name: the user name for the new account.
Confirm password: re-enter the password for the new account to verify it.
5 Click Submit.
You can now access McAfee ePO using the new administrator account. Use the account to restore
access for your administrator users. After they have access, delete the temporary administrator
account.
Ports overview
Follow these guidelines when customizing the ports used by the McAfee ePO server.
Make sure that you run only .reg files that are not confirmed to be genuine registry
import files.
This topic contains information about opening or modifying the registry. This information is intended for
use by network and system administrators only. Registry modifications are irreversible and can cause
system failure if done incorrectly.
Task
For details about product features, usage, and best practices, click ? or Help.
3 In the right pane, double-click TomcatSecurePort.SQL and change the value data to reflect the required
port number (default is 8443).
4 Open a text editor and paste this line into a blank document:
5 Name the file TomcatSecurePort.sql and save it to a temporary location on the SQL Server.
6 Use Microsoft SQL Server Management Studio to install the TomcatSecurePort.SQL file that you
created.
a Click Start | All Programs | Microsoft SQL Server Management Studio.
8 In Notepad, open Server.xml and replace all entries for port 8443 with the new port number.
This topic contains information about opening or modifying the registry. This information is
for network and system administrators only. Registry modifications are irreversible and can
cause system failure if done incorrectly.
We strongly recommend that you back up your registry and understand the restore
process. For more information, see the Microsoft documentation.
Make sure that you run only .REG files that are confirmed to be genuine registry import
files.
Modifying the agent-server communication port requires five steps and one optional step if you are
using remote Agent Handlers.
1 Stop the McAfee ePO services
Task
For details about product features, usage, and best practices, click ? or Help.
c Modify the string value AgentPort to reflect the appropriate port, then close the registry editor.
The default value for this port is 80.
UPDATE EPOServerInfo
ServerHTTPPort=80
c Click Start | All Programs | Microsoft SQL Server Management Studio to use Microsoft SQL Server
Management Studio to install the DefaultAgentPort.sql file.
g Click File | Open | File, browse to and select the DefaultAgent.SQL file, then click Open | Execute.
i Name the file DefaultAgentPort.SQL and save it to a temporary location on the SQL Server.
j Use Microsoft SQL Server Management Studio to install the DefaultAgentPort.SQL file.
Click Start | All Programs | Microsoft SQL Server Management Studio.
Click File | Open | File, browse to and select the DefaultAgentPort.SQL file, then click Open |
Execute.
b Using a text editor, open Server.ini and change the value for HTTPPort=80 to reflect the new
number, then save the file.
c Using a text editor, open Siteinfo.ini and change the value for HTTPPort=80 to reflect the new
number, then save the file.
Listen 80
ServerName<YourServerName>: 80
This server might be listed as MCAFEEAPACHESRV if the server wasn't restarted since the
Agent Handler was installed.
Listen 80
ServerName<YourServerName>: 80
This server might be listed as MCAFEEAPACHESRV if the server has not been restarted since
the Agent Handler was installed.
If you previously deployed agents to clients, reinstall the agent on all clients using the /
forceinstall switch to overwrite the existing Sitelist.xml file. For more information about specific
McAfee Agent versions that allow the /forceinstall switch to work successfully, see McAfee
KnowledgeBase article KB60555.
Relevant terms
Bidirectional The remote or local system can initiate the connection.
Agent wake-up 8081 TCP port opened by agents to Outbound connection from
communication port receive agent wake-up requests the McAfee ePO server and
SuperAgent repository port from the McAfee ePO server. Agent Handler to the McAfee
TCP port opened to replicate Agent.
repository content to a
SuperAgent repository.
Agent broadcast 8082 UDP port opened by SuperAgent Outbound connection from
communication port to forward messages from the the SuperAgent to other
McAfee ePO server and Agent agents.
Handler.
Console-to-application 8443 HTTPS port opened by the Inbound connection to the
server communication port McAfee ePO Application Server McAfee ePO server from the
service to allow web browser McAfee ePO console.
console access.
Client-to-server 8444 Used by the Agent Handler to Outbound connection from
authenticated communicate with the McAfee remote Agent Handlers to
communication port ePO server to get required the McAfee ePO server.
information (for example, LDAP
servers).
SQL Server TCP port 1433 TCP port used to communicate Outbound connection from
with the SQL Server. This port is the McAfee ePO server and
specified or determined Agent Handler to the SQL
automatically during the setup Server.
process.
SQL Server UDP port 1434 UDP port used to request the Outbound connection from
TCP port that the SQL instance the McAfee ePO server and
hosting the McAfee ePO Agent Handler to the SQL
database is using. Server.
Default LDAP server port 389 LDAP connection to look up Outbound connection from
computers, users, groups, and the McAfee ePO server and
Organizational Units for Agent Handler to an LDAP
User-Based Policies. server.
Default SSL LDAP server 636 User-Based Policies use the Outbound connection from
port LDAP connection to look up the McAfee ePO server and
users, groups, and Agent Handler to an LDAP
Organizational Units. server.
Relevant terms
Bidirectional A local or remote system can initiate the connection.
When systems connect to McAfee ePO using a VPN server, they use the MAC address of the VPN server
for all connecting systems. This causes some of the VPN connected systems to disappear from the
System Tree because they appear as duplicate MAC addresses.
This diagram and its description explain why some systems connecting to McAfee ePO over a VPN
disappear from the System Tree because they have the same MAC address.
McAfee ePO associates the MAC address of the VPN server, 00:12:3F:11:11:11, to Client A
rather than the client's actual MAC address.
Client B connects to McAfee ePO over the VPN connection.
McAfee ePO associates the MAC address of the VPN server, also 00:12:3F:11:11:11, to Client B.
Now two clients have the same VPN server MAC address.
Client A is deleted from the System Tree because both clients appear to have the same MAC
address.
To stop McAfee ePO from using the VPN server MAC addresses as valid matching criteria and deleting
the systems, you must:
1 Find the VPN server MAC address to learn the Organizationally Unique Identifier (OUI), or vendor
identifier. The OUI is the first six digits of the VPN server MAC address.
2 Use SQL Server Management Studio to insert the VPN server OUI in the McAfee ePO virtual MAC
vendor values to stop that OUI being used as the first valid matching criteria. This change causes
McAfee ePO to use the client GUID as valid matching criteria instead of the MAC address for all
systems connecting with the VPN server OUI.
Contents
Determining connected VPN server's OUI
Use the System Tree to find VPN server MAC address
Create report to find VPN server MAC address best practice
Best practice: Use SQL Server Management Studio to add virtual MAC vendor ID value
Task
For details about product features, usage, and best practices, click ? or Help.
1 Remotely connect to a system connecting to McAfee ePO through that VPN server.
2 Use one of these processes to display the McAfee Agent Status Monitor:
If the McAfee Agent icon appears in the system tray, click the icon.
If the McAfee Agent Icon does not appear in the notification area, use the following
command-line steps to display the McAfee Agent Status Monitor:
1 From the command prompt, change directories to this default folder:
C:\Program Files\McAfee\Common Framework\
3 From the McAfee Agent Status Monitor, click Collect and Send Props.
This process collects the system properties and sends them to the McAfee ePO server.
4 From the McAfee ePO console, select Menu | Systems | System Tree.
5 To display the system information, locate the system that connects to McAfee ePO over the VPN
connection and double-click the system name.
6 Click the System Properties tab, then click Customize on the right of the display.
7 From the Properties list, find MAC Address, click Move to Top, then click Save.
The VPN connected system's MAC address appears at the top of the list of the system information
display.
8 Make a note of the first six digits of the system MAC address, which is the OUI for the VPN server.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click New Query to display the Result Type tab, configure these settings, then click Next.
In the Feature Group list, select System Management.
3 From the Chart tab, configure these settings, then click Next.
In the Display Results As list, select Single Group Summary Table.
In the Labels are list, under Computer Properties, select MAC Address.
4 In the Columns tab, from the Available Columns list under Computer Properties, select MAC Address,
then click Next
In the Managed State settings, select Equals from the Comparison drop-down list and Managed
from the Values drop-down list.
In the Available Properties list, expand Computer Properties and click MAC Address.
In the MAC Address settings, select Value is not Blank from the Comparison drop-down list.
6 In the output of the query, find any two systems with the same MAC address.
This MAC address probably belongs to the VPN server connecting the systems to McAfee ePO.
7 Make a note of the first six digits of the system MAC address, which is the OUI of the VPN server.
Task
1 Type this command in your browser to learn your McAfee ePO server and database name.
https://<ServerName>:8443/core/config-auth
Replace <ServerName> with the name of your McAfee ePO server and your server communication
port number, if it is not the default 8443.
2 Open SQL Server Management Studio and connect to the McAfee ePO SQL database server using
your database authentication method.
Typically the McAfee ePO SQL database server name is <McAfee_ePO_server_name>\EPOSERVER.
Databases
ePO_<McAfee_ePO_server_name>
Tables
4 Scroll down the list to the dbo.EPOVirtualMacVendor table, right-click the table name, and select
Script Table as | INSERT to | New Query Editor Window.
An SQLQuery1.sql file opens in the right pane of the display with the ePOVirtualMacVendor table default
value.
5 The default query value, listed between parentheses, is <VendorID, nvarchar(8),>. Change that value to
the VPN server vendor ID.
Enclose the six-digit hexadecimal value in single quotes.
This is an example of the default table value and the changed '00123F' table value.
6 To run the query and add the VPN server OUI value to the EPOVirtualMacVendor table, click Query |
Execute in the menu bar.
7 Confirm that this status appears in the Messages pane below the query that you updated:
(1 Row(s) affected)
Now McAfee ePO uses the client GUID as valid matching criteria instead of the MAC address for all
systems connecting with the VPN server OUI.
See also
Determining connected VPN server's OUI on page 414
Installing McAfee ePO on an Amazon Web Services (AWS) virtual server allows you to resize your
server as your network grows and can eliminate the chance of hardware failure.
Contents
Using an AWS server with McAfee ePO
Create the AWS server
Connect to the AWS server
Install McAfee ePO on an AWS server
Create a virtual Agent Handler
Figure C-1 AWS server with McAfee ePO basic configuration steps
Log on to the AWS Management Console and configure your AWS virtul server.
1 Select and configure the virtual server with software, hard disk storage, and memory.
Select the AWS geographical region for your virtual server nearest to most of your McAfee ePO
managed systems.
In AWS, a firewall is called a Security Group and must be created to allow a McAfee Agent to
connect to the McAfee ePO server.
3 Capture the AWS instance public DNS name, or IP address, that AWS created.
Use Remote Desktop Connection and the DNS name, or public IP address, to connect to the AWS
server.
Install McAfee ePO using software provided by McAfee and information from the AWS SQL
database server.
Create a virtual Agent Handler in the McAfee ePO console.
A virtual Agent Handler allows your managed systems to communicate with the McAfee ePO server
that is installed on the AWS server.
This example, and the selected values, describe creating a McAfee ePO server to manage about
30,000 client systems. The values you select might be different. See the McAfee ePolicy Orchestrator
Installation Guide for CPU, storage, and memory requirements.
Task
1 Log on to the AWS console to display the AWS Console page.
2 Set the AWS data center region to the location closest to most of the client systems you manage
with McAfee ePO. To select the region, click the list on the right side of the navigation bar on the
AWS Console page.
3 Under Compute, double-click EC2 (Amazon Elastic Compute Cloud) to open Step 1: Choose an
Amazon Machine Image (AMI).
In this example, the server instance is a 64-bit server with a Microsoft Server 2012 with SQL
Standard Edition already installed.
4 Scroll to the image you want, then click Select, to open Step 2: Choose an Instance Type.
5 In this example, to manage 30,000 clients, in the Family column, select the instance type General
purpose, and configure these settings:
The instance type you choose depends on many factors in your managed network. For example,
the number of managed clients, network geography, and connectivity between locations. Use the
McAfee ePO server CPU cores, RAM, and hard drive suggestions to select you comparable instance
type.
6 Click Next: Configure Instance Details to open Step 3: Configure Instance Details.
Do not select Terminate. If you do, when you stop your AWS server, the server instance is
deleted and you must completely reconfigure it to start again.
b Type For theMcAfee ePO server partition, select EBS (Elastic Block Store) and configure these
settings:
Device Select an individual device name from the list.
11 Configure a specific tag and value used to identify this AWS server, then click Next: Configure Security
Group to open Step 6: Configure Security Group page.
Tags don't have any semantic meaning to Amazon EC2 and are interpreted strictly as a string of
characters. Also, tags are not automatically assigned to your resources.
Using Add Rule, configure this list of ports and matching protocols.
14 Confirm your settings, then click Launch to Create a new key pair.
15 Create a security key pair, with these settings, to generate an encrypted password when you first
log on to this AWS server.
Click Download Key Pair to copy the .pem file to your local computer.
Click Launch Instances after the .pem file is saved to your local computer.
16 On the Launch Status page, click View Instances to confirm the status of the AWS server.
Once you click Launch instance, it might take 2030 minutes before your instance is ready to access.
During that time, Initializing displays under Status Checks.
You have created your AWS server. Continue with the connection process and create a static IP
address for your AWS server.
See also
Ports required for communicating through a firewall on page 410
By default, AWS creates a non-routeable IP address (10.x.x.x) and a virtual IP address (56.x.x.x).
Create a static IP address, using AWS Elastic IPs, to allow your managed systems to connect to the
McAfee ePO server and use your DNS to create a DNS name.
Task
1 Log on to the AWS console.
2 In the left pane, select Instances, then in the details pane right-click the AWS server instance that
you created, and select Connect to open Connect To Your Instance.
3 Click Get Password to open Connect To Your Instance > Get Password dialog box.
The RSA Private Key file you selected is loaded into the dialog box.
7 Type the user name Administrator, the decrypted password, and click OK to open your AWS
server.
8 In the left pane, click Elastic IPs, then in the details pane, right-click your instance name, and select
Associate Address to create a static IP address and open the Associate Address dialog box.
10 Click Associate to release the non-routeable IP address assigned by AWS to your server.
Note the public IP address assigned to your AWS server and ask your IT group to create a fully
qualified DNS name for this AWS server.
In the future, if you must replace your McAfee ePO server, you can redirect that DNS name to a
different IP address without losing the connections from your managed systems.
You have created a static IP address to use with Microsoft Remote Desktop Connection to log on to the
AWS server and install McAfee ePO.
See also
Create the AWS server on page 420
You must know this information before you start the McAfee ePO installation:
SQL database name configured on your AWS server
Paths to the McAfee ePO server and SQL database disk space
Task
1 Connect to the AWS server using Remote Desktop Connection and the configured static IP address
or DNS name.
2 Start the McAfee ePO installation process using the McAfee ePolicy Orchestrator Installation Guide
and the Perform Custom installation process.
3 In the Database Information, configure the Microsoft SQL Server using the AWS server name.
By default, the McAfee ePO SQL Server name is <AwsServerName>\EPOSERVER.
c Right-click the AWS server that you created, then from the lists that appears, click Image, and
Create Image.
You have a McAfee ePO server installed and configured that you can connect to from a remote browser
using this format:
https://<AwsServerName>:<port>
See also
Create the AWS server on page 420
Connect to the AWS server on page 431
Because McAfee ePO cannot use an Elastic IP address, it needs a virtual Agent Handler configured to
publish its private IP address to the McAfee Agent. But, the McAfee Agent cannot connect back to the
Agent Handler on this private IP address over the Internet.
Task
For details about product features, usage, and best practices, click ? or Help.
2 Click New Group, configure these settings for your virtual Agent Handler, then click Save.
Group Name Type a virtual Agent Handler group name.
In Included Handlers, click Use load balancer and type the virtual DNS name and virtual IP address.
Virtual DNS Name Type the DNS name assigned to the static public IP address that is associated
with this AWS server.
Virtual IP Address Type the static public IP address that is associated with this AWS server.
3 Enable the new virtual Agent Handler: on the Handler Groups page, find the new virtual Agent Handler
that you created, then click Enable in the Actions column.
4 From the Agent Handlers page, click New Assignment, configure these settings, then click Save.
Assignment Name Type a name.
In Agent Criteria, under System Tree location, click ..., select My Organization from the dialog box, then
click OK.
In Handler Priority, click Use custom handler list, click + to add the virtual Agent Handler, and move it to
the top of the list.
5 Confirm that the virtual Agent Handler has the following configuration on the Agent Handlers page:
Handler Groups 1
Handler Assignment Rules The virtual Agent Handler rule that you created is at the top of the
list.
You have everything needed to create a McAfee Agent URL and start connecting your managed
systems to your AWS McAfee ePO server.
See also
Install McAfee ePO on an AWS server on page 432
A agent (continued)
deployment credentials 241
about this guide 13
first call to server 117
access requirements for System Tree 111
grouping 318
accounts
grouping by assignment rules 319
user 141
GUID and System Tree location 117
actions
maintenance 239
Apply Tag 137
traffic direction and ports 412
Check IP Integrity 117
agent communication port 241
Run Tag Criteria 133
Agent Handlers
Sort Now 124
about 295
Test Sort 124
assigning agents 316
used with Product Deployment 181
assignment priority 319
Active Directory
assignments 310
applying permission sets 144
authentication modes 295
configuring Windows authorization 146
behind a DMZ 303
containers, mapping to System Tree groups 124
component in McAfee ePO 17
implementation strategies 144
configure priority 309
synchronization 55
configure virtual groups 308
systems only synchronization 115
deployment 306
Active Directory synchronization
eliminates multiple McAfee ePO servers 299
borders and 112
enable and disable from Handlers List 308
deleting systems 114
failover protection 300
duplicate entry handling 114
frequently asked questions 320
Synchronize Now action 114
hardware, software, and port requirements 311
systems and structure 115
how they work 295
tasks 114
LDAP access 386
to System Tree structure 124
managing assignments 317
types 114
moving agents between 318
AD, See Active Directory
multiple 295
adding comments to issues 390
node count 32
administrators
ports used to communicate through firewall 410
about 152
priority in sitelist file 315
access through the System Tree 57
required for Amazon Web Services server 432
contacted automatically to stop DAT release 172
software installation 312
contacted automatically with compliance report 256
traffic direction and ports 412
creating groups 58
used with Amazon Web Services 419
managing user accounts 141
user interface 306
permission needed for Disaster Recovery 102
virtual settings 308
permissions 152
why use them 297
recommended monthly task to review IDs 335
Agent Status Monitor, to collect and send properties 414
source sites, configuring 276
agent-server communication
agent
interval reduced with LDAP mirroring 386
configuring policies to use repositories 280
managing 241
configuring proxy settings for 279
events (continued) G
show threat event 73
geographic borders, advantages of 112
system list on tag groups 136
global unique identifier, See GUID
threat event summary queries 355
global unique identifier (GUID) 117
thresholds 228
global updating
throttling 228
contents 280
executables, managing 234
enabling 186
exporting
process description 185
dashboards 81
requirements 185
permission sets 154
Global Updating, about 275
policies 387
groups
exporting and importing
Agent Handlers 306
client task objects 387
catch-all 117
dashboards 387
configuring criteria for sorting 122
permission sets 387
controlling access 152
policy assignments 387
creating manually 120
queries 387
criteria-based 117
repositories 387
defined 58
responses 387
importing NT domains 126
systems 387
in the System Tree 60
tags 387
moving systems manually 128
tasks 387
My Group 58
exporting systems 121
of SuperAgents 267
extension files, installing 163
operating systems and 113
pasting policy assignments to 207
F policies, inheritance of 59
failback to your original server 105 policy enforcement for a product 194
failover protection using Agent Handlers 300 sorting criteria 122
fallback sites sorting, automated 113
about 260 updating manually with NT domains 128
configuring 276 using IP address to define 113
deleting 278 viewing policy assignment 209
edit existing 278 GTI, See McAfee Global Threat Intelligence
switching to source 277 GUIDs
features, McAfee ePO 16 deleting from the image file 55
filters finding duplicates 243
creating 26
custom 26 H
list 26
handler assignment
overview 25
editing priority 319
query results 89
managing 317
setting for response rules 236
handler groups
used with Policy Assignment Rules 199
about 315
used with Product Deployment 182
creating 317
firewall
deleting 318
ports used to communicate through to server 410
editing settings 318
fragmentation in the database 327
handlers
FramePkg.exe, agent installation application 53
creating groups 317
frequently asked questions about Agent Handlers 320
grouping agents 320
FTP repositories 266
moving agents between 318
creating and configuring 283
priority 315
editing 286
Handlers List, enable, and disable Agent Handlers 308
enabling folder sharing 286
hardware
recommend for McAfee ePO and database 32
T troubleshooting (continued)
SQL database connectivity 328
table row, select checkboxes 27
VPN system connection problem 413
tables, working with 25
Tag Builder wizard 133
Tag Catalog 133 U
tag-based sorting criteria 113, 117 UBP, See user-based policies
tags 387 UNC share repositories 266
applying 138 creating and configuring 283
create, delete, and modify subgroups 135 editing 286
creating with Tag Builder wizard 133 enabling folder sharing 286
criteria-based 115 using
criteria-based sorting 122 recommendations 287
edit, delete, export, and move 134 Universal Naming Convention, See UNC share repositories
excluding systems from automatic tagging 135 unmanaged repositories 265
group sorting criteria 113 updates
manual application of 137 calculating required bandwidth 344
policy assignment based on 192 checking in manually 163
tags, subgroups client tasks 222
create, delete, and modify 135 considerations for creating tasks 222
selecting multiple items 27 DAT files and products automatically 245
tasks 387 deployment packages 219
automatically pull and copy DAT updates from McAfee 167 package signing and security 217
copying files from Evaluation branch into Current 168 packages and dependencies 217
find inactive agents 250 scheduling an update task 223
Inactive Agents task 251 source sites and 260
periodic 336 updating
pull content automatically 246 automatically, with global updating 186
purge events 335 DATs and Engine 219
purge events automatically 244 deployment tasks 217
purge events with a query 245 global, process 185
recommended daily 329 process description 219
recommended monthly 335 user accounts 141
recommended weekly 333 user actions
running compliance queries 255 removing outdated 148
scheduling on-demand scan of test group 171 viewing 147
test virus protection 73 user menu, navigating in the interface 21
to run and deliver a report 257 user-based policies 386
technical support, finding product information 14 about 192
Test Sort action 115 criteria 192
Threat Event Log users
common event format 340 about 141
viewing and purging 342 permission sets and 152
ticketing server 17 restricting to a single IP address 146
Ticketing with McAfee ePO 391 utilities
tools, third party NETDOM.EXE, creating a text file 121
used to deploy agents 53
Windows Performance Monitor 324
V
tools, third-party
use Windows Explorer to check ePolicy Orchestrator events VDI, See Virtual Desktop Infrastructure
326 viewing issue details 390
used to deploy agents 52 Virtual Desktop Infrastructure mode 55
troubleshooting virtual machine
client certificate authentication 152 used as McAfee ePO server 32
finding inactive systems 250 virtual machines
product deployment 217 Amazon Web Services 419
W
WAN connections and geographical borders 112
Windows
authentication, configuring 142, 145