Configuring the template and location for exported reports . . . . . . . . . . . . . . 36
Using a proxy server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
Enabling System Tree sorting on the server . . . . . . . . . . . . . . . . . . . . 39
ePolicy Orchestrator server settings categories and their descriptions . . . . . . . . .
39
5
Creating user accounts
43
About user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
Global administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Working with user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
44
Creating user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Editing user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Deleting user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
6
Setting up permission sets
47
How users, groups, and permission sets fit together . . . . . . . . . . . . . . . . . . . . 47
Working with permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Creating a new permission set . . . . . . . . . . . . . . . . . . . . . . . . . 49
Modifying an existing permission set . . . . . . . . . . . . . . . . . . . . . . . 50
Duplicating a permission set . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Exporting permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Importing permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Removing a permission set . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Deleting permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7
Configuring advanced server settings
53
Configuring Active Directory user login . . . . . . . . . . . . . . . . . . . . . . . . . 53
Managing ePolicy Orchestrator users with Active Directory . . . . . . . . . . . . . . 53
Configuring Windows authentication and authorization . . . . . . . . . . . . . . . . 56
Authenticating with certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
When to use certificate authentication . . . . . . . . . . . . . . . . . . . . . . 58
Configuring ePolicy Orchestrator for certificate authentication . . . . . . . . . . . . . 58
Uploading server certificates . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Removing server certificates . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Configuring users for certificate authentication . . . . . . . . . . . . . . . . . . . 60
Problems with certificate authentication . . . . . . . . . . . . . . . . . . . . . . 60
Configuring Rogue System Detection server settings . . . . . . . . . . . . . . . . . . .
61
Configuring server settings for Rogue System Detection . . . . . . . . . . . . . . . 61
Managing security keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Security keys and how they work . . . . . . . . . . . . . . . . . . . . . . . . 64
Master repository key pair . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Agent-server secure communication (ASSC) keys . . . . . . . . . . . . . . . . . . 67
Backing up and restoring keys . . . . . . . . . . . . . . . . . . . . . . . . . 71
Configuring source and fallback sites . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Working with source and fallback sites . . . . . . . . . . . . . . . . . . . . . . 73
8
Setting up repositories
77
Repository types and what they do . . . . . . . . . . . . . . . . . . . . . . . . . .
78
Types of distributed repositories . . . . . . . . . . . . . . . . . . . . . . . . . 79
Repository branches and their purposes . . . . . . . . . . . . . . . . . . . . .
80
Repository list file and its uses . . . . . . . . . . . . . . . . . . . . . . . . . 81
How repositories work together . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Ensuring access to the source site . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Configuring proxy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Configuring proxy settings for the McAfee Agent . . . . . . . . . . . . . . . . . . 83
Configuring proxy settings for McAfee Labs Security Threats . . . . . . . . . . . . . 84
Contents
4
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
Summary of Contents for EPOCDE-AA-BA - ePolicy Orchestrator - PC
Page 1: ...Product Guide McAfee ePolicy Orchestrator 4 6 0 Software...
Page 14: ......
Page 20: ......
Page 24: ......
Page 26: ......
Page 42: ......
Page 46: ......
Page 76: ......
Page 100: ......
Page 108: ......
Page 120: ......
Page 158: ......
Page 162: ......
Page 210: ......
Page 228: ......
Page 238: ......
Page 264: ......
Page 288: ......
Page 310: ......
Page 314: ......
Page 328: ...00...