Index
A
absolute scoring model, Policy Auditor
51
accept events, file integrity monitoring
62
,
66
agent plug-in debug tool
display help
84
execute tool
83
run a benchmark
85
run a check
85
run an audit
84
save debug information
86
audience for Policy Auditor Product Guide
8
audit creation and editing
activate a benchmark for use in audit
42
assign benchmark profiles
41
filter benchmarks based on labels
41
selecting benchmarks
43
using audit builder
43
audits
add group
41
add system
41
add tag
41
benchmarks
39
blackout period
44
concept
11
,
39
Data Collection Scan
36
,
37
delete
44
differentiating expired results
40
disable
44
Foundstone, create audit that uses
42
frequency (how often data is gathered)
40
introduction
10
missing audit results
36
,
37
no results
40
run manually
43
run on demand
42
set whiteout and blackout periods
44
specify criteria
41
Vulnerability Manager, create audit that uses
42
when audits are run
40
whiteout period
44
audits results
export
47
view
46
audits, scoring models on Policy Auditor
absolute scoring model
51
changing the scoring model
51
default scoring model
49
flat scoring model
50
flat unweighted scoring model
50
B
baseline, file integrity monitoring
60
benchmark profiles
effect on system audits
41
benchmarks
activate for use in Policy Auditor
42
defining frequency
43
select benchmarks for an audit
43
used in audits
39
using Foundstone to audit systems
43
using Vulnerability Manager to audit systems
43
C
CCE implementation
89
certificates for Vulnerability Manager ePO Extension
37
,
38
checks
use in audits
39
Common Configuration Enumeration (CCE)
89
common criteria requirements
92
Common Platform Enumeration (CPE)
89
Common Vulnerabilities and Exposures (CVE)
88
Common Vulnerability Scoring System (CVSS)
90
compare file versions, file integrity monitoring
62
,
65
compliance audits
10
components installed
12
conventions used in this guide
8
CPE implementation
89
CVE implementation
88
CVSS implementation
90
D
dashboards, Policy Auditor
default provided by Policy Auditor
77
PA:Compliance Summary dashboard
80
PA:MS Patch Status Summary dashboard
80
PA:Operations
80
PA:PCI Summary
81
queries as dashboard monitors
82
Data Collection Scan
28
Data Import server task
29
default scoring model, Policy Auditor
49
delete audits
44
differentiating expired results
40
disable audits
44
documentation
product-specific, finding
9
typographical conventions
8
E
ePolicy Orchestrator
features used by Policy Auditor
13
events, file integrity monitoring
62
,
66
expiration date, Policy Auditor waivers
54
F
FDCC compliance
87
file integrity monitoring
accept events
62
,
66
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
94