No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE
EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,
WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in
connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property
of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,
WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS
THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,
A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU
DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN
THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
ePolicy Orchestrator 4.5 provides a scalable platform for centralized policy management and
enforcement of your security products and the systems on which they reside. It also provides
comprehensive reporting and product deployment capabilities, all through a single point of
control.
Contents
Components and what they do
Using this guide
Finding documentation for McAfee enterprise products
Components and what they do
The ePolicy Orchestrator software is comprised of these components:
• ePO server — The center of your managed environment. The server delivers security
policies and tasks, controls updates, and processes events for all managed systems. The
ePO server includes these subcomponents:
• Application server — Auto Response, Registered Servers, and user interface
• Agent Handler — Policies, tasks, and properties
• Event parser — Threat events and client events
• RSD server and data channel listener
• Registered servers — Used to register the ePO server with other servers. Registered
server types include:
• LDAP server — Used for Policy Assignment Rules and to enable automatic user account
creation.
• SNMP server — Used to receive an SNMP trap. You must add the SNMP server’s
information so that ePolicy Orchestrator knows where to send the trap.
• Ticketing server — Before tickets can be associated with issues, you must have a registered
Ticketing server configured. The system running the ticketing extension must be able to
resolve the address of the Service Desk system.
• Database — The central storage component for all data created and used by ePolicy
Orchestrator. You can choose whether to house the database on your ePO server or on a
separate system, depending on the specific needs of your organization.
• Master repository — The central location for all McAfee updates and signatures, residing
on the ePO server. Master repository retrieves user-specified updates and signatures from
McAfee or from user-defined source sites.
• Distributed repositories — Placed strategically throughout your environment to provide
managed systems access to receive signatures, product updates, and product installations
McAfee ePolicy Orchestrator 4.5 Product Guide14
Introducing ePolicy Orchestrator 4.5
Using this guide
with minimal bandwidth impact. Depending on how your network is configured, you can set
up SuperAgent, HTTP, FTP, or UNC share distributed repositories.
• McAfee Agent — A vehicle of information and enforcement between the ePO server and
each managed system. The agent retrieves updates, ensures task implementation, enforces
policies, and forwards events for each managed system. It uses a separate secure data
channel to transfer data to the ePO server. A McAfee Agent can also be configured as a
SuperAgent with the addition of a repository.
• Remote Agent Handlers — A server that you can install in various network locations to
help manage agent communication, load balancing, and product updates. Remote Agent
Handlers can help you manage the needs of large or complex network infrastructures by
allowing you more control over agent-server communication.
NOTE: Depending on the needs of your organization and the complexity of your network, you
might not need to use all of these components.
Using this guide
This guide provides information on configuring and using your product. For system requirements
and installation instructions, see the
This material is organized in the order that McAfee recommends you set up ePolicy Orchestrator
in a production environment for the first time, and is also accessible to anyone seeking specific
topics.
This guide serves as a tool to help administrators set up their ePolicy Orchestrator environment
for the first time, and as a reference tool for more experienced users.
ePolicy Orchestrator Installation Guide
.
Audience
This information is intended primarily for network administrators who are responsible for their
company’s security program, and assumes the customer has installed and used ePolicy
Orchestrator in a lab environment.
Finding documentation for McAfee enterprise
products
To access the documentation for your McAfee products, use the McAfee ServicePortal.
1Go to the McAfee ServicePortal (http://mysupport.mcafee.com) and, under Self Service,
click Read Product Documentation.
2Select a Product.
3Select a Version.
4Select a product document
Product documentation by phase
McAfee documentation provides the information you need during each phase of product
implementation, from installing a new product to maintaining existing ones. Depending on the
product, additional documents might also be available. After a product is released, information
15McAfee ePolicy Orchestrator 4.5 Product Guide
Introducing ePolicy Orchestrator 4.5
Finding documentation for McAfee enterprise products
regarding the product is entered into the online KnowledgeBase, available through the McAfee
ServicePortal.
Installation phase — Before, during, and after installation
•
Release Notes
•
Installation Guide
Setup phase — Using the product
•
Product Guide
•
Online Help
Maintenance phase — Maintaining the software
•
KnowledgeBase
(http://mysupport.mcafee.com)
McAfee ePolicy Orchestrator 4.5 Product Guide16
Getting Started with ePolicy Orchestrator 4.5
This chapter provides a high-level overview of ePolicy Orchestrator and how it works. All of the
concepts included here, along with their associated tasks, are discussed in greater detail in the
chapters that comprise the rest of this guide.
Contents
Logging on and off ePO servers
Viewing the server version number
How to navigate the ePO interface
Setting up ePolicy Orchestrator
Logging on and off ePO servers
Use these tasks to log on to and off from ePO servers. Before using ePolicy Orchestrator, you
must be logged on to the ePO server with valid account credentials.
Tasks
Logging on to ePO servers
Logging off ePO servers
Logging on to ePO servers
Use this task to log on to the ePO server. You must have valid credentials to do this. You can
log on to multiple ePO servers by opening a new browser session for each ePO server.
Task
1Open an Internet browser and go to the URL of the server to open the Log On to ePolicy
Orchestrator dialog box.
2Type the User name and Password of a valid account.
NOTE: Passwords are case-sensitive.
3Select the Language you want the software to display.
4Click Log On.
Logging off ePO servers
Use this task to log off from ePO servers. Log off from the ePO server whenever you finish
using the software.
17McAfee ePolicy Orchestrator 4.5 Product Guide
Getting Started with ePolicy Orchestrator 4.5
Viewing the server version number
Task
• To log off from the server, click Log Off at the top of any page, or close the browser.
Viewing the server version number
You can view the version number, edition, and license information of the ePolicy Orchestrator
server.
• To view the version number and edition of an ePO server, log on to the desired ePolicy
Orchestrator server. This information appears in the title bar.
NOTE: For more specific information about the version of ePolicy Orchestrator:
1Click Menu | Software | Extensions, then click Server in the McAfee category of
the Extensions list.
2Scroll through the server extension to ePO Core.
• To view license information, go to the logon page.
• To view detailed information about the extensions installed on your ePO server, click Menu
| Software | Extension. Select a category from the Extensions list to view details.
How to navigate the ePO interface
Navigation in ePolicy Orchestrator 4.5 has been redesigned to make it faster and easier to find
the features and functionality you need. The interface now uses a single menu for all top-level
features of ePolicy Orchestrator, and a customizable navigation bar. Top-level features were
previously displayed as tabs when selecting a section.
For example, in ePolicy Orchestrator 4.0, when the Reporting section was selected, the top-level
features that were displayed included: Queries, Server Task Log, Audit Log, Event Log, and
MyAvert.
In version 4.5, all of these top-level features are accessed from the Menu. The following table
provides some examples of the change in navigation steps to arrive at a desired page.
in version 4.5in version 4.0To get to...
Click Menu | Audit Log tab.The Audit Log
The Menu
Click Menu and select User Management |
Audit Log.
Click Menu and select Policy | Policy Catalog.Click Menu | Policy Catalog page.The Policy Catalog
McAfee ePolicy Orchestrator 4.5 Product Guide18
Getting Started with ePolicy Orchestrator 4.5
Setting up ePolicy Orchestrator
The Menu is new in version 4.5 of ePolicy Orchestrator software. The Menu uses categories
that comprise the various ePO features and functionalities. Each category contains a list of
primary feature pages associated with a unique icon. The Menu and its categories replace static
group of section icons used to navigate the 4.0 version of the interface. For example, in the
4.5 version, the Reporting category includes all of the pages included in the 4.0 version Reporting
section, plus other commonly used reporting tools such as the Dashboards page. When an item
in the Menu is highlighted, its choices appear in the details pane of the interface.
The navigation bar
In ePolicy Orchestrator 4.5, the navigation bar is customizable. In the 4.0 version of the interface,
the navigation bar was comprised of a fixed group of section icons that organized functionality
into categories. Now you can decide which icons are displayed on the navigation bar by dragging
any Menu item on or off the navigation bar. When you navigate to a page in the Menu, or click
an icon in the navigation bar, the name of that page is displayed in the blue box next to the
Menu.
On systems with 1024x768 screen resolution, the navigation bar can display six icons. When
you place more than six icons on the navigation bar, an overflow menu is created on the right
side of the bar. Click > to access the Menu items not displayed in the navigation bar. The icons
displayed in the navigation bar are stored as user preferences, so each user's customized
navigation bar is displayed regardless of which console they log on to.
Setting up ePolicy Orchestrator
How you set up ePolicy Orchestrator depends on the unique needs of your environment. This
process overview highlights the major set up and configuration required to use ePolicy
Orchestrator. Each of the steps represents a chapter in this product guide, where you can find
the detailed information you need to understand the features and functionalities of ePolicy
Orchestrator, along with the tasks needed to implement and use them.
19McAfee ePolicy Orchestrator 4.5 Product Guide
Getting Started with ePolicy Orchestrator 4.5
Setting up ePolicy Orchestrator
Process overview
Configure your ePO server
Add systems to the System Tree
Distribute agents to your systems
Create repositories
Configure your policies and client tasks
Deploy your products and software
Configure advanced features
Configure your ePO server
To configure your ePO server, you'll need to:
• Set up user accounts
• Assign permission sets
• Configure ePO server settings
Set up user accounts
Set up user accounts for all of the users in your network who need to access and use the ePolicy
Orchestrator software. You need to set up these accounts before assigning permission sets.
For more information on setting up user accounts, see
Orchestrator
To set up user accounts, click Menu | User Management | Users.
.
Assign permission sets
Assign permission sets for your ePO users. Permission sets allow you to define what users are
allowed to do with the software. You can assign permission sets to individuals or to groups. For
more information on assigning permission sets, see
User Roles and Permissions
To assign permission sets, click Menu | User Management | Permissions Sets.
Configure server settings
Configure server settings for your specific environment. You can change the server settings at
any time. For more information on configuring server settings, see
behaviors they controlinManaging User Roles and Permissions
To configure server settings, click Menu | Configuration | Server Settings.
ePO user accountsinConfiguring ePolicy
How permission sets workinManaging
.
Server settings and the
.
Add systems to the System Tree
The System Tree allows you to organize and act on all systems you manage with ePolicy
Orchestrator. Before setting up other features, you must create your System Tree. There are
several ways you can add systems to the System Tree, including:
• Synchronize ePolicy Orchestrator with your Active Directory server.
• Browse to systems on your network individually.
McAfee ePolicy Orchestrator 4.5 Product Guide20
Getting Started with ePolicy Orchestrator 4.5
Setting up ePolicy Orchestrator
• Add individual and groups of systems by importing a text (.txt) file containing a list of systems.
For more information on all of the methods you can use to add systems, including detailed
steps for each method, see
To begin adding systems to the System Tree, click Menu | Systems | System Tree.
Organizing the System Tree
Distribute agents to your systems
Each system you want to manage must have the McAfee Agent installed. You can install agents
on Windows-based systems manually, or by using the ePO interface. You must install agents
on non-Windows systems manually.
Once agents are installed on all of your systems, you can use ePolicy Orchestrator to manage,
update, and report on these systems. For more information on distributing agents, see
Distributing Agents
To begin distributing agents to your systems, click Menu | Systems | System Tree.
.
Create repositories
.
Before deploying any products, components, or updates to your managed systems with ePolicy
Orchestrator, you must configure repositories. There are two types of repositories you can use
in your environment, master and distributed.
Master repository
The master repository is located on your ePO server. It is the location where products and
updates that are pulled from the Source Site are saved. For more information about the master
repository, see
To start working with the master repository, click Menu | Software | Master Repository.
Repository types and what they doinCreating Repositories
Distributed repositories
Distributed repositories are those that you place throughout your network. The placement and
type of distributed repositories you use depend on the unique needs of your organization and
environment. There are several ePO components and types you can use for distributed
repositories, including:
• SuperAgents
• FTP
• HTTP
• UNC share
• Unmanaged
The complexity and size of your network are determining factors in which type and how many
distributed repositories you use. For more information about distributed repositories, see
Repository types and what they doinCreating Repositories
To start working with distributed repositories, click Menu | Software | DistributedRepository.
.
.
21McAfee ePolicy Orchestrator 4.5 Product Guide
Getting Started with ePolicy Orchestrator 4.5
Setting up ePolicy Orchestrator
Configure your policies and client tasks
McAfee recommends that you configure policy settings before deploying the respective product,
component, or update to your managed systems. By doing so you can ensure that products
and components have the desired settings as soon as possible.
Policies
A policy is a collection of settings that you create and configure. These policies are enforced
by McAfee products. Policies ensure that the managed security products are configured and
perform according to that collection of settings.
Once configured, policies can be enforced at any level of the System Tree, as well as on specific
groups of users. System policies are inherited from their parent group in the System Tree.
However, you can break inheritance at any location in the tree in order to enforce specific
policies at a particular location. For more information about policies, see
and
Policy applicationinConfiguring Policies and Client Tasks
To start configuring policies for systems in the System Tree, click Menu | Policy | PolicyCatalog, then select a product from the Product menu and click Actions | New Policy.
Policy management
.
Client tasks
Client tasks are scheduled actions that run on managed systems that host any client-side
software. You can define tasks for the entire System Tree, a specific group, or an individual
system. Like policy settings, client tasks are inherited from parent groups in the System Tree.
For more information about client tasks, see
and Client Tasks
To start scheduling client tasks, click Menu | Systems | System Tree | Client Tasks, then
click Actions | New Task.
.
Client tasks and what they doinConfiguring Policies
Deploy your products and software
Once your repositories, policy settings, and client tasks are created and configured, you can
deploy products, components, and updates to the desired systems with ePolicy Orchestrator.
You can perform these actions as needed, or you can schedule them using server tasks. For
more information, see
To schedule these actions, click Menu | Automation | Server Tasks, then click Actions |New Task.
Deploying Software and Updates
Configure advanced features
Once your managed environment is up and running, you can configure and implement the
advanced features of ePolicy Orchestrator, including:
• Remote Agent Handlers
• Automatic Responses
• Issues and Ticketing
More information on these and all ePolicy Orchestrator features is available in the following
chapters of this guide.
.
McAfee ePolicy Orchestrator 4.5 Product Guide22
Configuring ePolicy Orchestrator
The ePO server is the center of your managed environment, providing a single location from
which to administer system security throughout your network.
If your organization is very large or divided into multiple large sites, ePolicy Orchestrator 4.5
is scalable to allow you to customize how you set up your managed environment. You can:
• Install a separate ePO server at each site.
• Install remote Agent Handlers at each site, provided an ePO server is installed that you want
to communicate with.
The option you choose depends on the needs of your environment. Using remote agent handlers
allows you to reduce network traffic when managing agents and sending updates. Agent handlers
can also serve as distributed repositories. Remote agent handlers help to load balance your
network and increase fallback security, while passing all agent-server communication back to
your ePO server and its database.
Using multiple ePO servers differs from using remote agent handlers because each ePO server
maintains a separate database from which you can roll up information to your main ePO server
and database. Both choices can help to limit the amount of network traffic created within a
local LAN. Network traffic has a larger impact on your resources when this communication takes
place across WAN, VPN, or other slower network connections typically found between remote
sites.
Are you configuring the ePO server for the first time?
When configuring the ePO server for the first time:
1Decide how to implement the flexibility of permission sets.
2Create user accounts and permission sets, and assign the permission sets to the user
accounts as needed.
3Set up your contacts list and email server settings.
Contents
ePO user accounts
How permission sets work
Contacts
Server settings and the behaviors they control
Managing ePolicy Orchestrator users with Active Directory
Registering servers for use with ePolicy Orchestrator
Security keys and how they work
MyAvert Security Threats
Agent Handlers and what they do
IPv6
23McAfee ePolicy Orchestrator 4.5 Product Guide
Configuring ePolicy Orchestrator
ePO user accounts
Exporting tables and charts to other formats
ePO user accounts
User accounts provide a means for users to access and use the software. They are associated
with permission sets, which define what users are allowed to do with the software.
You must create user accounts and permission sets to accommodate the needs of each user
that logs on to the ePO server. You can create accounts for individual users, or you can create
a permission set that maps to users or groups in your Active Directory/NT server.
There are two types of users, global administrators and users with limited permissions.
Global administrators
Global administrators have read and write permissions and rights to all operations. When you
install the server, a global administrator account is created with the user name admin.
You can create additional global administrator accounts for people who require global
administrator rights.
Permissions exclusive to global administrators include:
• Create, edit, and delete source and fallback sites.
• Change server settings.
• Add and delete user accounts.
• Add, delete, and assign permission sets.
• Import events into ePolicy Orchestrator databases and limit events that are stored there.
Working with user accounts
Use these tasks to create and maintain user accounts.
Tasks
Creating user accounts
Editing user accounts
Deleting user accounts
Creating user accounts
Use this task to create a user account. You must be a global administrator to add, edit, or delete
user accounts.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Users, then click New User. The New User page
appears.
2Type a user name.
McAfee ePolicy Orchestrator 4.5 Product Guide24
Configuring ePolicy Orchestrator
How permission sets work
3Select whether to enable or disable the logon status of this account. If this account is for
someone who is not yet a part of the organization, you might want to disable it.
4Select whether the new account uses ePO authentication or Windows authentication,
and provide the required credentials.
5Optionally, provide the user’s full name, email address, phone number, and a description
in the Notes text box.
6Choose to make the user a global administrator, or select the appropriate permission sets
for the user.
7Click Save to save the current entries and return to the Users tab. The new user should
appear in the Users list.
Editing user accounts
Use this task to edit a user account. Global administrators can change passwords on any user
account. Other users can only change passwords on their own accounts.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Users.
2From the Users list, select the user you want to edit, then click Actions | Edit.
3Edit the account as needed.
4Click Save.
Deleting user accounts
Use this task to delete a user account. You must be a global administrator to delete user
accounts.
NOTE: McAfee recommends disabling the Login status of an account instead of deleting it,
until you are sure all valuable information associated with the account has been moved to other
users.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Users.
2From the Users list, select the user you want to delete, then click Actions | Delete.
3Click OK.
How permission sets work
A permission set is a group of permissions that can be granted to users or Active Directory (AD)
groups by assigning it to those users’ accounts. One or more permission sets can be assigned
to users who are not global administrators (global administrators have all permissions to all
products and features).
Permission sets only grant rights and access — no permission ever removes rights or access.
When multiple permission sets are applied to a user account, they aggregate. For example, if
25McAfee ePolicy Orchestrator 4.5 Product Guide
Configuring ePolicy Orchestrator
How permission sets work
one permission set does not provide any permissions to server tasks, but another permission
set applied to the same account grants all permissions to server tasks, that account has all
permissions to server tasks. Consider this as you plan your strategy for granting permissions
to the users in your environment.
When are permission sets assigned?
Global administrators can assign existing permission sets when they create or edit user accounts
and when they create or edit permission sets.
What happens when I install new products?
When a new product extension is installed, it can add one or more groups of permissions to
the permission sets. For example, when you install a VirusScan Enterprise extension, a VirusScan
Enterprise section is added to each permission set. Initially, the newly added section is listed
in each permission set with no permissions yet granted. The global administrators can then
grant permissions to users through existing or new permission sets.
Default permission sets
ePolicy Orchestrator 4.5 ships with four default permission sets that provide permissions to
ePolicy Orchestrator functionality. These are:
• Executive Reviewer — Provides view permissions to dashboards, events, contacts, and
can view information that relates to the entire System Tree.
• Global Reviewer — Provides view access globally across functionality, products, and the
System Tree, except for extensions, multi-server roll-up data, registered servers, and software.
• Group Admin — Provides view and change permissions across ePolicy Orchestrator features.
Users that are assigned this permission set each need at least one more permission set that
grants access to needed products and groups of the System Tree.
• Group Reviewer — Provides view permissions across ePolicy Orchestrator features. Users
that are assigned this permission set each need at least one more permission set that grants
access to needed products and groups of the System Tree.
Working with permission sets
Use these tasks to create and maintain permission sets.
Tasks
Creating permission sets for user accounts
Duplicating permission sets
Editing permission sets
Deleting permission sets
Creating permission sets for user accounts
Use this task to create a permission set.
Before you begin
You must be a global administrator to perform this task.
McAfee ePolicy Orchestrator 4.5 Product Guide26
Configuring ePolicy Orchestrator
How permission sets work
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Permission Sets, then click New Permission Set.
2Type a name for the permission set and select the users to which the set is assigned.
3Select a server name from the drop-down list, or click Add if the server name you need
does not appear in the server list.
4Click Save. The Permission Sets page appears.
5Select the new permission set from the Permission Sets list. Its details appear to the right.
6Click Edit next to any section where you want to grant permissions.
7On the Edit Permission Set page that appears, select the appropriate options, then click
Save.
8Repeat for all appropriate sections of the permission set.
Duplicating permission sets
Use this task to duplicate a permission set. Duplicating a permission set is useful when you
want to change only a few of the settings for a new permission set. Only global administrators
can duplicate permission sets.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Permission Sets, then select the permission set
you want to edit in the Permission Sets list. Its details appear to the right.
2Click Actions | Duplicate, type a New name in the Duplicate dialog box, then click OK.
3Select the new duplicate in the Permission Sets list. Its details appear to the right.
4Click edit next to any section where you want to change permissions.
5On the Edit Permission Set page that appears, select the appropriate options, then click
Save.
6Repeat for all sections of the permission set where you want to grant permissions.
Editing permission sets
Use this task to edit a permission set. Only global administrators can edit permission sets.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Permission Sets, then select the permission set
you want to edit in the Permission Sets list. Its details appear to the right.
2Click Edit next to any section where you want to grant permissions.
3On the Edit Permission Set page that appears, select the appropriate options, then click
Save.
4Repeat for all appropriate sections of the permission set.
27McAfee ePolicy Orchestrator 4.5 Product Guide
Configuring ePolicy Orchestrator
Contacts
Deleting permission sets
Use this task to delete a permission set. Only global administrators can delete permission sets.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Permission Sets, then select the permission set
you want to delete in the Permission Sets list. Its details appear to the right.
2Click Actions | Delete, then click OK in the Action pane. The permission set no longer
appears in the Permission Sets list.
Contacts
The ePolicy Orchestrator software maintains a list of email addresses that it uses to send email
messages to specified users in response to events. Currently this list is used by Automatic
Responses, Queries, and export functionality.
Working with contacts
Use these tasks to create and maintain email address information of individuals who might
receive email messages from ePolicy Orchestrator.
Tasks
Creating contacts
Editing contacts
Deleting contacts
Creating contacts
Use this task to add email addresses to Contacts.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Contacts, then click Actions | New Contact.
2Type a first name, last name, and email address for the contact.
3Click Save. The new contact appears on the Contacts page.
Editing contacts
Use this task to edit information in an existing entry on the Contacts page.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Contacts, then select a contact.
2Click Actions | Edit. The Edit Contact page appears.
McAfee ePolicy Orchestrator 4.5 Product Guide28
Configuring ePolicy Orchestrator
Server settings and the behaviors they control
3Edit the information as desired.
4Click Save.
Deleting contacts
Use this task to delete entries from the Contacts page.
Task
For option definitions, click ? in the interface.
1Click Menu | User Management | Contacts, then select a contact.
2Click Actions | Delete, then click OK in the Action pane. The contact no longer appears
in the list.
Server settings and the behaviors they control
Various settings control how the ePO server behaves. You can change most settings at any
time. But, only global administrators can access the server settings.
Types of ePO server settings are:
• Dashboards — Specifies the default active dashboard that is assigned to new users’ accounts
at the time of account creation, if one has been defined.
• Detected System Compliance — Specifies the settings that affect how rogue systems in
your network are identified and treated.
• Detected System Exception Categories — Specifies the categories that can be used to
mark systems in your environment as exceptions.
• Detected System Matching — Specifies the settings used to match detected systems and
system interfaces.
• Detected System OUIs — Specifies how your OUI (Organizationally Unique Identifier) list
is updated, and when the last update occurred.
• Email Server — Specifies the email server that is used when ePolicy Orchestrator sends
email messages.
• Event Filtering — Specifies which events are forwarded by the agent.
• Event Notification — Specifies the interval at which you want ePO Notification Events to
be sent to Automatic Responses.
• Global Updating — Specifies whether and how global updating is enabled.
• License Key — Specifies the 25 digit license key you provide while installing ePolicy
Orchestrator, via the hyperlink from the Log On to ePO page to an Enter License Key page,
or via this Server Settings page. McAfee introduced license keys to help customers with
license usage tracking needs and to be compliant with McAfee licensing terms.
• MyAvert Security Threats — Specifies the update frequency for the MyAvert Security
Threats service. If proxy settings are entered in Proxy Settings, they are used while collecting
MyAvert security threats.
• Policy Maintenance — Specifies whether policies for unsupported products are visible or
hidden. This is needed only after ePolicy Orchestrator is upgraded to 4.5 from a previous
version.
29McAfee ePolicy Orchestrator 4.5 Product Guide
Configuring ePolicy Orchestrator
Server settings and the behaviors they control
• Ports — Specifies the ports used by the server when it communicates with agents and the
database.
• Printing and exporting — Specifies how information is exported to other formats, and
the template for PDF exports. It also specifies the default location where the exported files
are stored.
• Proxy Settings — Specifies the type of proxy settings configured for your ePO server.
• Repository Packages — Specifies whether any package can be checked in to any branch.
Only agents later then version 3.6 can retrieve packages other than updates from branches
other than Current.
• Rogue System Sensor — Specifies the settings that define behavior for Rogue System
Sensors in your network.
• Security Keys — Specifies and manages the agent-server secure communication keys, and
repository keys.
• Server Certificate — Specifies the server certificate that your ePO server uses for HTTPS
communication with browsers.
• System Tree Sorting — Specifies whether and how System Tree sorting is enabled in your
environment.
• User Auto Creation — Specifies whether ePO users are automatically created upon logon,
based on AD (Active Directory) user profiles.
• Windows Authentication — Specifies the domain name and Active Directory servers
configured. This is also used for user authentication. For example, Windows Authentication
is used to determine if the password entered should allow the user to log on to ePolicy
Orchestrator.
• Windows Authorization — Specifies the domain name and Active Directory servers
configured for use with this ePO server. This is used while dynamically assigning permissions
to the users who have logged on to ePolicy Orchestrator.
Working with server settings
Use these tasks to configure and maintain the server. Only general server settings are covered
here. Feature-specific server settings are covered in the sections for those features. For example,
System Tree sorting server settings are covered in
Tasks
Specifying an email server
Replacing the server certificate
Configuring the template and location for exported reports
Determining which events are forwarded to the server
Viewing and changing communication ports
Specifying an email server
Use this task to specify an email server that ePolicy Orchestrator uses to send email messages.
Task
For option definitions, click ? in the interface.
Organizing the Systems Tree
.
McAfee ePolicy Orchestrator 4.5 Product Guide30
Loading...
+ 268 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.