McAfee EPOLICY ORCHESTRATOR 4.5 - Guide d'installation

Naviguer en ligne ou télécharger Guide d'installation pour Logiciel McAfee EPOLICY ORCHESTRATOR 4.5 -. McAfee EPOLICY ORCHESTRATOR 4.5 - Installation guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 110
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Best Practices Guide
McAfee
®
ePolicy Orchestrator
®
for use with ePolicy Orchestrator versions 4.5.0 and 4.0.0
Vue de la page 0
1 2 3 4 5 6 ... 109 110

Résumé du contenu

Page 1 - ePolicy Orchestrator

Best Practices GuideMcAfee® ePolicy Orchestrator®for use with ePolicy Orchestrator versions 4.5.0 and 4.0.0

Page 3 - Contents

Setting up a maintenance task to automatically reindex and rebuild your ePolicy Orchestrator SQLdatabase only takes a few minutes and is essential to

Page 4

12Disaster recovery Many ePolicy Orchestrator users want to know how to set up ePolicy Orchestrator for a disasterrecovery scenario. There are a few o

Page 5 - About this guide

Use server clusters for disaster recoveryIf you require zero downtime if a hardware failure occurs you can cluster your ePolicy Orchestrator andSQL se

Page 6 - What's in this guide

Now, if the primary site fails you must make all the agents previously communicating with the primaryMcAfee ePO server start communicating with the s

Page 8

Reference documentationFollowing are several informative and valuable links for your McAfee implementation.Product videosSupport Video Tutorials— Thes

Page 9

Other Informative ArticlesDeploying SQL Server 2005 with SAN #1Deploying SQL Server 2005 with SAN #2Deploying SQL Server 2005 with SAN #3SQL Storage T

Page 10

IndexAabout this guide 5Active Directoryorganizing the System Tree 47synchronization 44, 47AD, See Active DirectoryAgent Handlersabout 8, 33increased

Page 11 - Orchestrator software

databases (continued)installed with ePolicy Orchestrator 11maintaining 99recommended hardware 15reindex 99restoring 101server clusters for disaster re

Page 12 - Hard disk configuration

IP address (continued)used to sort the System Tree 48LLDF file 12Mmaster repositorydefault 26disabling from ePolicy Orchestrator server 68on ePolicy O

Page 13

2Configuring your hardware for ePolicyOrchestrator softwareHow you configure your ePolicy Orchestrator software is influenced by many factors, includi

Page 14

server tasks (continued)acting on a query 65serverscombining ePolicy Orchestrator and database 11disaster recovery 101finding performance problems 94p

Page 15 - SAN usage

• Optimize your storage using multiple dedicated drives (see Hard disk configuration) for eachapplication as your node count increases• Manage only th

Page 16 - Small organization example

The primary limiting factor when choosing your configuration is the cost of storage. Depending on yourhardware budget, choose the best configuration t

Page 17 - Medium organization example

Manage 25,000 to 75,000 nodesIf you have 25,000 to 75,000 nodes to manage with the McAfee ePO server, use two separate servers.For the McAfee ePO ser

Page 18

SAN usageStorage area network (SAN) devices are the standard configuration for larger storage requirementssuch as SQL databases that require backup

Page 19 - About repositories

There is no technical limit on how many nodes can be managed by one McAfee ePO server. The keyconcept to remember about McAfee ePO servers is less is

Page 20 - Overview of repository types

The ePolicy Orchestrator software 4.5 installation is bundled with Microsoft SQL Express for installingMcAfee ePO server in very small environments. M

Page 21 - SuperAgent repositories

• 8 processors• 16 – 32 GB of RAM• Disk space is not a concern since all the data is stored in the SQL databaseThe minimum SQL Server hardware recomme

Page 22

3Using distributed repositories to keepyour security software up to dateDistributed repositories are file shares that you create to store and distribu

Page 23

COPYRIGHTCopyright © 2011 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrie

Page 24

Overview of repository typesThere are several types of repositories you can use in your managed environment.The ePolicy Orchestrator server always act

Page 25 - Where to place repositories

UNC share repositoriesYou can use Universal Naming Convention (UNC) shares to host your McAfee ePO server repository.Since most administrators are fam

Page 26

Creating a new SuperAgent policyA SuperAgent policy allows you to assign that policy to client machines to convert them to SuperAgents.Task1From the P

Page 27

Task1From the System Tree, click System Tree Actions | New Subgroup and give it a distinctive name, forexample 1_SuperAgents. 2Click OK. The new grou

Page 28

Task1From the SuperAgent group you created, click the Assign Policies tab and select McAfee Agent from theProduct list.2From the Actions column, click

Page 29

Task1In the System Tree, click the Systems tab and find the system you want to change to a SuperAgentrepository.2Drag that row with the system name an

Page 30 - Conclusions

To download the daily DAT file randomly from the central ePO server to the system agents takes thefollowing bandwidth: 100 Agents * 200 KB file = 20 M

Page 31 - About Global Updating

• Policy deployment• Event collection• Distributing all updates and softwareExample 2 — Medium organization with four officesThe medium organization e

Page 32

APAC region serversThere are small offices in the APAC region with slow WAN links back to the McAfee ePO server in theUK. Plus these WAN links are alr

Page 33 - What are Agent Handlers

4From the Repositories list find the McAfee ePO server and click Disable in the Actions column. 5Click Save and the McAfee ePO server repository is d

Page 34 - Handlers white paper

ContentsPreface 5About this guide ...5Audience ...5Conventions ...

Page 35

In the small office in India you could add a repository but you must replicate the DAT file from theMcAfee ePO server to the repository. This file rep

Page 36 - In-place upgrade tips

About Global UpdatingGlobal Updating is a powerful feature, but if it is used incorrectly it can have a negative impact in yourenvironment.Global Upda

Page 38

4Scaling your ePolicy Orchestratorinfrastructure with Agent HandlersAgent Handlers co-ordinate work between themselves and the ePolicy Orchestrator se

Page 39 - Using Transfer Systems

Do not use Agent Handlers to replace repositories. A repository is a simple file share meant to keepupdate traffic local. While an Agent Handler has r

Page 40

5Installing and upgrading ePolicyOrchestrator softwareThere are two types of ePolicy Orchestrator installations: a new installation in an environment

Page 41 - Agent functionality

• You retain all your policies and client tasks — This means you don't have to rebuild them andcould save you time.• You retain your directory st

Page 42 - Deploying agents

• Test your upgrade in a VM environment with a copy of your SQL database to make sure theupgrade works smoothly.• Validate all your settings to confir

Page 43

Move McAfee Agents between servers Before the release of ePolicy Orchestrator 4.5, many customers wanted an upgrade path that wouldallow them to start

Page 44

Exporting and import the ASSC keysYou must export the agent-server secure communication (ASSC) keys from the old server to the newserver before moving

Page 45 - Communication column

What is the System Tree ... 47Use Active Directory synchronization ... 47Dynamically sorting your mach

Page 46

3Select the systems to move to the new McAfee ePO server and click Actions | Agents | Transfer Systems.The Transfer Systems dialog box appears. 4Sele

Page 47 - What is the System Tree

6The McAfee Agent and your System TreeThe McAfee Agent and your System Tree are two of the most important pieces of your managedenvironment.The agent

Page 48

Once an agent is installed on a system, you never need to use a third-party deployment tool to updateanything on that client.Figure 6-1 One agent to

Page 49

• A logon script• Manual execution• The McAfee ePO server• Third-party tools• An image with the agent as part of the imageYou must use the specific Mc

Page 50

If you gave this custom McAfee Agent to your desktop team a year ago, it is probably outdated. Itbecomes outdated if, for example you have made change

Page 51 - Manage policies

• The machines in your AD tree must be well maintained. This is not always the case in many largerorganizations. Machines need to be deleted and place

Page 52 - McAfee agent policy

Using third-party tools is not a requirement, but your organization might have strict policies thatdictate how products are deployed for consistency a

Page 53

Confirm you deleted the agent GUID before freezing the imageIf you choose option 1, Include the agent in your Windows image it can cause one of the mo

Page 54 - Configuring ASCI

Dynamically sorting your machines To dynamically sort your machines into your ePolicy Orchestrator System Tree use a combination ofsystem criteria, su

Page 55

The McAfee Agent and your System TreeWhat is the System Tree6McAfee® ePolicy Orchestrator® Best Practices Guide for use with ePolicy Orchestrator ver

Page 56 - Deploying packages

PrefaceThis guide provides information about suggested best practices for using your McAfee ePolicyOrchestrator (McAfee ePO™) 4.5 and 4.0 software.Abo

Page 58

7Managing endpoint security with policiesand packages Policies are the settings that govern each product on the endpoint. Packages are the binaries th

Page 59 - Client tasks

This is not an exhaustive list and new products are constantly being added as McAfee expands itssolution portfolio. Because of the McAfee ePO server&

Page 60

• Collects and sends its properties to the McAfee ePO server or Agent Handler• Checks to see if any policy changes or client tasks have occurred on th

Page 61

Configuring ASCI Configure the ASCI to determine how often every McAfee Agent calls the McAfee ePO serverThe ASCI is set to 60 minutes by default. If

Page 62 - Updating products

Task1Click Menu | Policy | Policy Catalog, then select McAfee Agent from the Product list and General from theCategory list.2Click the General tab, an

Page 63

1Click Menu | Policy | Policy Catalog, then select McAfee Agent from the Product list and General from theCategory list.2Click the General tab, and ty

Page 64

TaskFor option definitions, click ? in the interface.1Click Menu | Configuration | Server Settings, then in the Settings Category pane click Repositor

Page 66

8Using Client and Server tasks in yourmanaged environmentClient and Server tasks are, as their names imply, tasks that are carried out on your ePolicy

Page 67

What's in this guide This guide outlines some core recommendations for implementing McAfee ePolicy Orchestratorsoftware versions 4.5 and 4.0.This

Page 68

local and does not need to communicate with the McAfee ePO server. Policy enforcement makes theagent compare the last known product policy pulled from

Page 69 - Purge events automatically

• Bandwidth• Which machines have the latest content for protection• The quality of your compliance reportsIf a deployment task is being deployed to mu

Page 70

The following formula calculates the bandwidth needed to move the 12 GB of data per repositoryrandomly over a 9-hour workday. The total equals 1.33 GB

Page 71 - Purging events by query

4Choose the content to update using this task. In this example the Daily Master Update task downloads the VirusScan Enterprise DAT and Enginefiles.If

Page 72

5Click Next to configure the schedule for this task.The key to a good update task is updating several times per day at completely random intervals.Man

Page 73

Server tasks Server tasks are any item that is scheduled to run on the McAfee ePO server itself. Using server tasksproperly can significantly improve

Page 74

TaskFor option definitions, click ? in the interface.1Click Menu | Automation | Server Tasks and click Actions | New Task. The Server Task dialog box

Page 75 - Reporting overview

TaskFor option definitions, click ? in the interface.1Click Menu | Automation | Server Tasks, and click Actions | New Task. The Server Task dialog box

Page 76 - Custom queries

1Pull content from McAfee into your master repository, which is always the McAfee ePO server.2Replicate that content to your distributed repositories.

Page 77

3From the Repositories list, find the McAfee ePO server and click Disable in the Actions column. 4Click Save to disable the McAfee ePO server reposit

Page 78

1The history and architecture of ePolicyOrchestrator softwareePolicy Orchestrator software is a mature security management platform that delivers the

Page 79

TaskFor option definitions, click ? in the interface.1Click Menu | Automation | Server Tasks, then click Action | New Task. The Server Task Builder di

Page 80

events is only 10 days because it collects all URLs that are visited by managed machines. Thiscan save a lot of data in environments with greater than

Page 81

As systems are decommissioned, or disappear because of extended travel, users on leave, or otherreasons, remove them from the System Tree. Removing th

Page 82 - Event summary queries

3Optional. Instead of using the default subaction Delete Systems, you can select Move Systems toanother Group. This moves the systems found by the que

Page 84

9Reporting on your managed environmentwith QueriesePolicy Orchestrator provides built in querying and reporting capabilities. These are highlycustomiz

Page 85

See McAfee ePolicy Orchestrator 4.5 Product Guide and McAfee ePolicy Orchestrator 4.5 ReportingGuide for details.The following example shows some of t

Page 86

• Have not communicated with the McAfee ePO server in a while• Are suspected of not working properly when you attempt to wake them up• Need a new agen

Page 87

Creating custom event queries Create a custom query.Task1Click Menu | Reporting | Queries, then Actions | New Query. The Query Wizard appears starting

Page 88

Reporting on your managed environment with QueriesCustom queries9McAfee® ePolicy Orchestrator® Best Practices Guide for use with ePolicy Orchestrator

Page 89

Overview of the product architectureThe architecture of the ePolicy Orchestrator software and its components provides all the functionalityneeded to m

Page 90

3You must choose the label or variable that you want the report to display. There are many variablesyou can choose to have the McAfee Agent reports di

Page 91

4You can choose the columns that you want to see if you drill down on any of the variables in yourreport. This is not a critical component when buildi

Page 92

5Click Next to not create any filters and display all of the operating system types.6Click Run to generate the report and see the results. After you

Page 93 - FAQs and common scenarios

3Click Events in the Features Group and Client Events in the Result Type. Click Next to continue to theChart dialog box. 4Under Summary, click Single

Page 94

5Click Event Description, in the Labels are list, under Threat Event Descriptions to create a filter with agood human readable description of the even

Page 95

8Click Run to display the query report. In this example there are 308 client events total. If you want, you can click one event and drilldown on it t

Page 96

5Click Event Description, in the Labels are list, under Threat Event Descriptions to create a filter with agood human readable description of the even

Page 97 - 1051 and 1059 events

8Click Run to display the query report. The McAfee ePO server displays approximately 8,000 threat events total.The data shown in this example comes f

Page 98

9To determine approximately how many events you should have on your network use the followingformula:(10,000 nodes) x (1 to 2 million events) = estima

Page 99 - Maintaining your SQL database

4If the event is important, make sure you are monitoring the number of events using theCreating event summary queries and Purging events automatically

Page 100

1ePO server — Connects to the McAfee update server to download the latest security content2ePO Microsoft SQL database — Stores all the data about the

Page 101 - Disaster recovery

5Click Next to skip the Columns dialog box. You can choose the columns you want to analyze.You can skip this step because the McAfee ePO server does n

Page 102

11Find the custom query you just created and click it in the list. 12Schedule the task to run every night, then click Save.You can use this technique

Page 104

10FAQs and common scenariosThis chapter contains some frequently asked questions (FAQs) and some common scenarios that anePolicy Orchestrator administ

Page 105 - Reference documentation

Task1Click Menu | Automation | Server Tasks to open the Server Tasks Builder.2Click Edit for one of the following tasks.• Duplicate Agent GUID — Clear

Page 106 - Other Informative Articles

Task1Under Reliability and Performance, click Monitoring Tools | Performance Monitoring, then click the plus sign(+). The Add Counters dialog box appe

Page 107

You can also check how quickly your ePolicy Orchestrator server processes events from agents bylooking in the Events folder on the McAfee ePO server.

Page 108

• "4.0.0" — Is the product revision number• "1421" — Is the build number. That build number indicates this is "Patch 2"T

Page 109

• Because the scan timed out due to the size of the file, which is a 1059 event• The file was not scanned because it was inaccessible due to a passwor

Page 110

11Maintaining your SQL databaseFor your McAfee ePO server to function correctly it is very important to have a well performing SQLdatabase. It is the

Commentaires sur ces manuels

Pas de commentaire