Using SuperAgents as distributed repositories . . . . . . . . . . . . . . . . . . . . . . 84
Creating SuperAgent repositories . . . . . . . . . . . . . . . . . . . . . . . . 85
Selecting which packages are replicated to SuperAgent repositories . . . . . . . . . . 86
Deleting SuperAgent distributed repositories . . . . . . . . . . . . . . . . . . . . 86
Creating and configuring FTP, HTTP, and UNC repositories . . . . . . . . . . . . . . . . .
86
Creating a folder location on an FTP, HTTP server or UNC share . . . . . . . . . . . . 87
Adding the distributed repository to ePolicy Orchestrator . . . . . . . . . . . . . . . 87
Avoiding replication of selected packages . . . . . . . . . . . . . . . . . . . . . 89
Disabling replication of selected packages . . . . . . . . . . . . . . . . . . . . . 89
Enabling folder sharing for UNC and HTTP repositories . . . . . . . . . . . . . . . . 90
Editing distributed repositories . . . . . . . . . . . . . . . . . . . . . . . . . 90
Deleting distributed repositories . . . . . . . . . . . . . . . . . . . . . . . . . 90
Using local distributed repositories that are not managed . . . . . . . . . . . . . . . . .
91
Working with the repository list files . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Exporting the repository list SiteList.xml file . . . . . . . . . . . . . . . . . . . . 92
Exporting the repository list SiteMgr.xml file for backup or use by other servers . . . . .
93
Importing distributed repositories from the SiteMgr.xml file . . . . . . . . . . . . . . 93
Importing source sites from the SiteMgr.xml file . . . . . . . . . . . . . . . . . . 93
Changing credentials on multiple distributed repositories . . . . . . . . . . . . . . . . . . 94
9
Setting up registered servers
95
Registering servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Registering McAfee ePO servers . . . . . . . . . . . . . . . . . . . . . . . . . 95
Registering LDAP servers . . . . . . . . . . . . . . . . . . . . . . . . . . .
97
Registering SNMP servers . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Registering a database server . . . . . . . . . . . . . . . . . . . . . . . . .
99
10
Setting up Agent Handlers
101
Agent Handlers and what they do . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
How Agent Handlers work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Handler groups and priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Working with Agent Handlers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Assigning agents to Agent Handlers . . . . . . . . . . . . . . . . . . . . . . . 103
Managing Agent Handler assignments . . . . . . . . . . . . . . . . . . . . . . 104
Setting up Agent Handler groups . . . . . . . . . . . . . . . . . . . . . . . . 104
Managing Agent Handler groups . . . . . . . . . . . . . . . . . . . . . . . . 105
Moving agents between handlers . . . . . . . . . . . . . . . . . . . . . . . . 105
11
Other important server information
109
About Internet Protocols in managed environment . . . . . . . . . . . . . . . . . . . 109
Exporting objects from ePolicy Orchestrator . . . . . . . . . . . . . . . . . . . . . . 110
Importing items into ePolicy Orchestrator . . . . . . . . . . . . . . . . . . . . . . . 110
Exporting objects and data from your ePolicy Orchestrator server . . . . . . . . . . . . . . 111
ePolicy Orchestrator Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
The Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
The Server Task log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
The Threat Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Managing your network security with your ePolicy
Orchestrator server
12
Organizing the System Tree
121
The System Tree structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Considerations when planning your System Tree . . . . . . . . . . . . . . . . . . . . . 123
Administrator access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Environmental borders and their impact on system organization . . . . . . . . . . . 124
Contents
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
5
Содержание EPOCDE-AA-BA - ePolicy Orchestrator - PC
Страница 1: ...Product Guide McAfee ePolicy Orchestrator 4 6 0 Software...
Страница 14: ......
Страница 20: ......
Страница 24: ......
Страница 26: ......
Страница 42: ......
Страница 46: ......
Страница 76: ......
Страница 100: ......
Страница 108: ......
Страница 120: ......
Страница 158: ......
Страница 162: ......
Страница 210: ......
Страница 228: ......
Страница 238: ......
Страница 264: ......
Страница 288: ......
Страница 310: ......
Страница 314: ......
Страница 328: ...00...