Subnets and IP address ranges . . . . . . . . . . . . . . . . . . . . . . . . 124
Tags and systems with similar characteristics . . . . . . . . . . . . . . . . . . . 124
Operating systems and software . . . . . . . . . . . . . . . . . . . . . . . . 125
Tags and how they work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Active Directory and NT domain synchronization . . . . . . . . . . . . . . . . . . . . . 126
Active Directory synchronization . . . . . . . . . . . . . . . . . . . . . . . . 126
NT domain synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Criteria-based sorting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
How settings affect sorting . . . . . . . . . . . . . . . . . . . . . . . . . . 129
IP address sorting criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Tag-based sorting criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Group order and sorting . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Catch-all groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
How a system is added to the System Tree when sorted . . . . . . . . . . . . . . . . . 130
Working with tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Creating tags with the Tag Builder . . . . . . . . . . . . . . . . . . . . . . . 132
Excluding systems from automatic tagging . . . . . . . . . . . . . . . . . . . . 133
Applying tags to selected systems . . . . . . . . . . . . . . . . . . . . . . . 133
Applying criteria-based tags automatically to all matching systems . . . . . . . . . . 133
Creating and populating groups . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Creating groups manually . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Adding systems manually to an existing group . . . . . . . . . . . . . . . . . . 137
Exporting systems from the System Tree . . . . . . . . . . . . . . . . . . . . . 138
Importing systems from a text file . . . . . . . . . . . . . . . . . . . . . . . 138
Sorting systems into criteria-based groups . . . . . . . . . . . . . . . . . . . . 140
Importing Active Directory containers . . . . . . . . . . . . . . . . . . . . . . 142
Importing NT domains to an existing group . . . . . . . . . . . . . . . . . . . . 144
Synchronizing the System Tree on a schedule . . . . . . . . . . . . . . . . . . . 146
Updating the synchronized group with an NT domain manually . . . . . . . . . . . . 147
Moving systems manually within the System Tree . . . . . . . . . . . . . . . . . . . . 147
Transferring systems between McAfee ePO servers . . . . . . . . . . . . . . . . . . . . 148
13
Working with the agent from the McAfee ePO server
149
Agent-server communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Agent-server communication interval . . . . . . . . . . . . . . . . . . . . . . 150
Agent-server communication interruption handling . . . . . . . . . . . . . . . . 150
Wake-up calls and tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
SuperAgents and broadcast wake-up calls . . . . . . . . . . . . . . . . . . . . 151
SuperAgent caching and communication interruptions . . . . . . . . . . . . . . . 152
Viewing agent and product properties . . . . . . . . . . . . . . . . . . . . . . . . . 153
Responding to policy events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Running client tasks immediately . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Sending manual wake-up calls to systems . . . . . . . . . . . . . . . . . . . . . . . 155
Sending manual wake-up calls to a group . . . . . . . . . . . . . . . . . . . . . . . 155
Locate inactive agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Queries provided by McAfee Agent . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Windows system and product properties reported by the agent . . . . . . . . . . . . . . . 157
14
Using the Software Manager to check in software
159
What's in the Software Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Checking in, updating, and removing software using the Software Manager . . . . . . . . . . 160
15
Using policies to manage products and systems
163
Policy management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Policy application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
How policy assignment rules work . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Contents
6
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
Содержание EPOCDE-AA-BA - ePolicy Orchestrator - PC
Страница 1: ...Product Guide McAfee ePolicy Orchestrator 4 6 0 Software...
Страница 14: ......
Страница 20: ......
Страница 24: ......
Страница 26: ......
Страница 42: ......
Страница 46: ......
Страница 76: ......
Страница 100: ......
Страница 108: ......
Страница 120: ......
Страница 158: ......
Страница 162: ......
Страница 210: ......
Страница 228: ......
Страница 238: ......
Страница 264: ......
Страница 288: ......
Страница 310: ......
Страница 314: ......
Страница 328: ...00...