19
ePolicy Orchestrator
®
3.6 Walkthrough Guide
Organizing the Directory and Repositories
ePolicy Orchestrator Directory: concepts and roles
3
Lost&Found groups
Lost&Found groups store system names whose locations could not be determined by
the ePolicy Orchestrator server. The administrator (with appropriate rights) must move
the systems in Lost&Found groups to the appropriate place in the Directory to manage
them. Each site has a Lost&Found group, and the Directory has a global Lost&Found
group.
Inheritance
Inheritance is an important property that makes policy administration simpler. Because
of inheritance, child nodes in the Directory hierarchy inherit policies that have been set
at their parent nodes. For example:
Policies set at the Directory level are inherited by sites.
Site policies are inherited by groups and individual systems within that site.
Group policies are inherited by sub-groups or individual systems within that group.
Inheritance is enabled by default for all sites, groups and individual systems that you
add to your Directory. This allows you to set policies and schedule scan tasks in fewer
places.
However, inheritance can be turned off at any location of the Directory to allow for
customization.
About ePolicy Orchestrator roles
If you plan to have multiple people administer ePolicy Orchestrator in your environment,
you can create multiple user accounts in the console. Fellow administrators can use
these accounts to log onto the server.
The different types of user accounts include:
Global administrator
.
Site administrators
on page 20
.
Global reviewers
on page 21
.
Site reviewers
on page 21
.
Global administrator
Global administrators have read and write permissions and rights to all operations.
When you install the server and console, a global administrator account with the user
name
admin
is created.
You can create additional global administrator accounts for other people who need
global administrative rights to all aspects of the console.
Note
Let inheritance do the work for you. While you can assign security policies and
schedule client on-demand scans or DAT file update tasks at any node of the
Directory, consider setting policies at the highest-level node possible. If you do, you’ll
have fewer changes to make. Avoid setting policies at the individual system level if
possible.
Содержание ePolicy Orchestrator
Страница 2: ......