Configuring the template and location for exported reports . . . . . . . . . . . . . . 36
Using a proxy server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
Enabling System Tree sorting on the server . . . . . . . . . . . . . . . . . . . . 39
ePolicy Orchestrator server settings categories and their descriptions . . . . . . . . .
39
5
Creating user accounts
43
About user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
Global administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Working with user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
44
Creating user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Editing user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Deleting user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
6
Setting up permission sets
47
How users, groups, and permission sets fit together . . . . . . . . . . . . . . . . . . . . 47
Working with permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Creating a new permission set . . . . . . . . . . . . . . . . . . . . . . . . . 49
Modifying an existing permission set . . . . . . . . . . . . . . . . . . . . . . . 50
Duplicating a permission set . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Exporting permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Importing permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Removing a permission set . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Deleting permission sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7
Configuring advanced server settings
53
Configuring Active Directory user login . . . . . . . . . . . . . . . . . . . . . . . . . 53
Managing ePolicy Orchestrator users with Active Directory . . . . . . . . . . . . . . 53
Configuring Windows authentication and authorization . . . . . . . . . . . . . . . . 56
Authenticating with certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
When to use certificate authentication . . . . . . . . . . . . . . . . . . . . . . 58
Configuring ePolicy Orchestrator for certificate authentication . . . . . . . . . . . . . 58
Uploading server certificates . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Removing server certificates . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Configuring users for certificate authentication . . . . . . . . . . . . . . . . . . . 60
Problems with certificate authentication . . . . . . . . . . . . . . . . . . . . . . 60
Configuring Rogue System Detection server settings . . . . . . . . . . . . . . . . . . .
61
Configuring server settings for Rogue System Detection . . . . . . . . . . . . . . . 61
Managing security keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Security keys and how they work . . . . . . . . . . . . . . . . . . . . . . . . 64
Master repository key pair . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Agent-server secure communication (ASSC) keys . . . . . . . . . . . . . . . . . . 67
Backing up and restoring keys . . . . . . . . . . . . . . . . . . . . . . . . . 71
Configuring source and fallback sites . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Working with source and fallback sites . . . . . . . . . . . . . . . . . . . . . . 73
8
Setting up repositories
77
Repository types and what they do . . . . . . . . . . . . . . . . . . . . . . . . . .
78
Types of distributed repositories . . . . . . . . . . . . . . . . . . . . . . . . . 79
Repository branches and their purposes . . . . . . . . . . . . . . . . . . . . .
80
Repository list file and its uses . . . . . . . . . . . . . . . . . . . . . . . . . 81
How repositories work together . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Ensuring access to the source site . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Configuring proxy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Configuring proxy settings for the McAfee Agent . . . . . . . . . . . . . . . . . . 83
Configuring proxy settings for McAfee Labs Security Threats . . . . . . . . . . . . . 84
Contents
4
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
Содержание EPOCDE-AA-BA - ePolicy Orchestrator - PC
Страница 1: ...Product Guide McAfee ePolicy Orchestrator 4 6 0 Software...
Страница 14: ......
Страница 20: ......
Страница 24: ......
Страница 26: ......
Страница 42: ......
Страница 46: ......
Страница 76: ......
Страница 100: ......
Страница 108: ......
Страница 120: ......
Страница 158: ......
Страница 162: ......
Страница 210: ......
Страница 228: ......
Страница 238: ......
Страница 264: ......
Страница 288: ......
Страница 310: ......
Страница 314: ......
Страница 328: ...00...