McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Spécifications

Naviguer en ligne ou télécharger Spécifications pour Logiciel McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE. McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE Specifications Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 120
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - 4.0 and

Best Practices GuideMcAfee® ePolicy Orchestrator® 4.0 and4.5

Page 3 - Contents

Task1Click Menu | Automation | Server Tasks to open the Server Tasks Builder.2Click Edit for one of the following tasks.• Duplicate Agent GUID — Clear

Page 4

Task1Under Reliability and Performance, click Monitoring Tools | Performance Monitoring, then click the plus sign(+). The Add Counters dialog box appe

Page 5 - Index 113

You can also check how quickly your ePolicy Orchestrator server processes events from agents bylooking in the Events folder on the McAfee ePO server.

Page 6

• "4.0.0" — Is the product revision number• "1421" — Is the build number. That build number indicates this is "Patch 2"T

Page 7 - About this guide

• Because the scan timed out due to the size of the file, which is a 1059 event• The file was not scanned because it was inaccessible due to a passwor

Page 8 - Finding product documentation

13SQL maintenanceFor your McAfee ePO server to function correctly it is very important to have a well performing SQLdatabase. It is the central storag

Page 9

Setting up a maintenance task to automatically reindex and rebuild your ePolicy Orchestrator SQLdatabase only takes a few minutes and is essential to

Page 10

14Disaster recovery Many ePolicy Orchestrator users want to know how to set up ePolicy Orchestrator for a disasterrecovery scenario. There are a few o

Page 11 - Architecture overview

Use server clusters for disaster recoveryIf you require zero downtime if a hardware failure occurs you can cluster your ePolicy Orchestrator andSQL se

Page 12

Now, if the primary site fails you must make all the agents previously communicating with the primaryMcAfee ePO server start communicating with the s

Page 13 - Hardware configuration

2ePolicy Orchestrator product architectureThe ePolicy Orchestrator software architecture offers extensive functionality that can be configuredmany dif

Page 15

15Reference documentationFollowing are several informative and valuable links for your McAfee implementation.Product videosSupport Video Tutorials— Th

Page 16

Other Informative ArticlesDeploying SQL Server 2005 with SAN #1Deploying SQL Server 2005 with SAN #2Deploying SQL Server 2005 with SAN #3SQL Storage T

Page 17 - SAN usage

IndexAabout this guide 7Active Directoryorganizing the System Tree 51synchronization 46, 51AD, See Active DirectoryAgent Handlersabout 11, 35increased

Page 18 - Small organization example

databases (continued)installed with ePolicy Orchestrator 13maintaining 105recommended hardware 17reindex 105restoring 107server clusters for disaster

Page 19 - Large organization example

IP address (continued)used to sort the System Tree 52LLDF file 14Mmaster repositorydefault 29disabling from ePolicy Orchestrator server 73on ePolicy O

Page 20 - • 32 – 128 GB of RAM

server tasks (continued)acting on a query 69serverscombining ePolicy Orchestrator and database 13disaster recovery 107finding performance problems 100

Page 24

1ePO server — Connects to the McAfee update server to download the latest security content2ePO Microsoft SQL database — Stores all the data about the

Page 26

6McAfee update server — Hosts the latest security content so your ePolicy Orchestrator can pullthe content at scheduled intervals.7Distributed reposit

Page 27 - Place repositories

Use VMs for the McAfee ePO ServerThe McAfee ePO server supports multiple versions of virtual environments, but when your node countreaches 25,000 to 3

Page 28

Manage fewer than 5,000 nodesIf you have fewer than 5,000 nodes to manage with the McAfee ePO server, disk configuration is rarelyan issue. Use your n

Page 29 - Determine repository count

• RAID 1 for the operating system with individual partitions for the SQL database (the MDF file) andthe SQL transaction log (the LDF file).• RAID 1 fo

Page 30

SAN usageStorage area network (SAN) devices are the standard configuration for larger storage requirementssuch as SQL databases that require backup a

Page 31

The following sections offer hypothetical environments to provide some guidelines for organization sizeand hardware requirements.These example provide

Page 32 - Global updates

Medium organization exampleA medium organization ranges from 5,000 to 25,000 nodes. A single McAfee ePO server can easilymanage this size organization

Page 33 - How Global Updates works

COPYRIGHTCopyright © 2011 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrie

Page 34

• 16 processors• 32 – 128 GB of RAM• At least 300 GB of space for the SQL databaseThese are not upper limits for hardware. If you have the budget fora

Page 35 - Agent Handlers

3RepositoriesA repository is a file sharing device that serves out files for clients to download. It does not managepolicies, collect events, or have

Page 36

• UNC share repositories• SuperAgentsThere are several things to keep in mind about these repositories:• The McAfee ePO server requires certain protoc

Page 37 - Orchestrator software

1Create the folder2Adjust share permissions3Change the NTFS permissions4Create two accounts, one with read and another with write accessAll of these t

Page 38 - In-place upgrade tips

Creating a new SuperAgent policyA SuperAgent policy allows you to assign that policy to client machines to convert them to SuperAgents.Task1From the P

Page 39 - Move the server

Task1From the System Tree, click System Tree Actions | New Subgroup and give it a distinctive name, forexample 1_SuperAgents. 2Click OK. The new grou

Page 40

Task1From the SuperAgent group you created, click the Assign Policies tab and select McAfee Agent from theProduct list.2From the Actions column, click

Page 41 - Using Transfer Systems

Task1In the System Tree, click the Systems tab and find the system you want to change to a SuperAgentrepository.2Drag that row with the system name an

Page 42

To download the daily DAT file randomly from the central ePO server to the system agents takes thefollowing bandwidth: 100 Agents * 200 KB file = 20 M

Page 43 - McAfee Agent

Example 2 — A large office in TokyoThe large office in Tokyo needs to download the 200 Kb per day for DAT files to its 4,000 nodes, usingthe formula:(

Page 44 - Deploying agents

Contents1 Preface 7About this guide ...7Audience ...7Conventions ...

Page 45

Server hardware Nodes updated Dedicated or sharedclient hardwareSingle 3 Ghz processor with 4 GB of memory 3,000 Shared with otherapplications3,000 –

Page 46

The EMEA offices have another data center in the UK with several other offices across EMEA. Theseother offices range from 200 nodes 3,000 nodes. The o

Page 47 - Communication column

Improve agent update performanceIn large environments, the ePolicy Orchestrator server is already very busy distributing policies andcollecting events

Page 48

How Global Updates worksIf the McAfee ePO server is scheduled to pull the latest DATs from the McAfee website at 2 p.m.Eastern time, and it changes th

Page 50

4Agent HandlersAgent Handlers co-ordinate work between themselves and the McAfee ePO server that communicateswith the remote Agent Handlers. Agent Han

Page 52

5Installation and upgrade of ePolicyOrchestrator softwareThere are two types of ePolicy Orchestrator installations: a new installation in an environme

Page 53

• You retain all your policies and client tasks — This means you don't have to rebuild them andcould save you time.• You retain your directory st

Page 54

• Test your upgrade in a VM environment with a copy of your SQL database to make sure theupgrade works smoothly.• Validate all your settings to confir

Page 55 - Policies and packages

6 McAfee Agent 43Agent functionality ...43Deploying agents ...44Deploy from the McAfee

Page 56 - McAfee agent policy

Move McAfee Agents between servers Before the release of ePolicy Orchestrator 4.5, many customers wanted an upgrade path that wouldallow them to start

Page 57

Exporting and import the ASSC keysYou must export the agent-server secure communication (ASSC) keys from the old server to the newserver before moving

Page 58 - Configuring ASCI

3Select the systems to move to the new McAfee ePO server and click Actions | Agents | Transfer Systems.The Transfer Systems dialog box appears. 4Sele

Page 59

6McAfee AgentThe McAfee agent is the liaison between all point-products and the McAfee ePO server. This 5 MBexecutable file is not a security product

Page 60 - Deploying packages

Once an agent is installed on a system, you never need to use a third-party deployment tool to updateanything on that client.Figure 6-1 One agent to

Page 61

The McAfee Agent is a 5 MB executable file that can simply be executed manually or more commonlydeployed on a larger scale to hundreds or thousands of

Page 62

If you gave this custom McAfee Agent to your desktop team a year ago, it is probably outdated. Itbecomes outdated if, for example you have made change

Page 63 - Client tasks

• The machines in your AD tree must be well maintained. This is not always the case in many largerorganizations. Machines need to be deleted and place

Page 64

Using third-party tools is not a requirement, but your organization might have strict policies thatdictate how products are deployed for consistency a

Page 65 - Updating products

Confirm you deleted the agent GUID before freezing the imageIf you choose option 1, Include the agent in your Windows image it can cause one of the mo

Page 66

14 Disaster recovery 107Configuring simple disaster recovery ...107Use server clusters for disaster recovery ...

Page 68

7Organizing your System TreeYour System Tree is a very important feature of your McAfee ePO server and you can configure theSystem Tree hierarchy in m

Page 69 - Server tasks

Dynamically sorting your machines To dynamically sort your machines into your ePolicy Orchestrator System Tree use a combination ofsystem criteria, su

Page 70 - Creating a server task

Organizing your System TreeDynamically sorting your machines7McAfee® ePolicy Orchestrator® 4.0 and 4.5 Best Practices Guide53

Page 72

8Policies and packages Policies are the settings that govern each product on the endpoint. Packages are the binaries that canbe deployed by the McAfee

Page 73

This is not an exhaustive list and new products are constantly being added as McAfee expands itssolution portfolio. Because of the McAfee ePO server&

Page 74 - Purge events automatically

• Collects and sends its properties to the McAfee ePO server or Agent Handler• Checks to see if any policy changes or client tasks have occurred on th

Page 75

Configuring ASCI Configure the ASCI to determine how often every McAfee Agent calls the McAfee ePO serverThe ASCI is set to 60 minutes by default. If

Page 76 - Purging events by query

Task1Click Menu | Policy | Policy Catalog, then select McAfee Agent from the Product list and General from theCategory list.2Click the General tab, an

Page 78

1Click Menu | Policy | Policy Catalog, then select McAfee Agent from the Product list and General from theCategory list.2Click the General tab, and ty

Page 79

TaskFor option definitions, click ? in the interface.1Click Menu | Configuration | Server Settings, then in the Settings Category pane click Repositor

Page 81 - Reporting

9Client tasks Client tasks run on the clients and are typically scheduled to run at a specific time. They are differentfrom policies because they are

Page 82 - Custom queries

Configuring which products are deployed Configure the agent client to deploy a product. See McAfee ePolicy Orchestrator 4.5 Product Guide fordetails.T

Page 83

nodes and you only have one repository, those 5,000 nodes are pulling a total of 180 GB of data fromthat one repository when the deployment task is ex

Page 84

Signatures, or DAT files, are released on a daily basis at approximately 11 a.m. Eastern time andaverage 200 Kb per day. Optionally, you can deploy ot

Page 85

4Choose the content to update using this task. In this example the Daily Master Update task downloads the VirusScan Enterprise DAT and Enginefiles.If

Page 86

5Click Next to configure the schedule for this task.The key to a good update task is updating several times per day at completely random intervals.Man

Page 87

10Server tasks Server tasks are any item that is scheduled to run on the McAfee ePO server itself. Using server tasksproperly can significantly improv

Page 88 - Event summary queries

PrefaceContents About this guide Finding product documentationAbout this guideThis information describes the guide's target audience, the t

Page 89

1Give your server task a descriptive name.2Choose an action then a subaction. This is the most important part of creating your task. After thetask per

Page 90

3Configure a weekly report.• Click Run Query from the Actions list.• Click Managed Inactive Agents query from the Query list dialog box that appears,

Page 91

3Configure an email report.• Click Run Query from the Actions list.• Click Managed Inactive Agents query from the Query list dialog that appears, then

Page 92

of content into each branch. Then the different versions can be rolled out to a selected group of testmachines before a full deployment to the entire

Page 93

3From the Repositories list, find the McAfee ePO server and click Disable in the Actions column. 4Click Save to disable the McAfee ePO server reposit

Page 94

TaskFor option definitions, click ? in the interface.1Click Menu | Automation | Server Tasks, then click Action | New Task. The Server Task Builder di

Page 95

events is only 10 days because it collects all URLs that are visited by managed machines. Thiscan save a lot of data in environments with greater than

Page 96

Deleting inactive systems automaticallyMost environments are constantly changing, new systems are added and old systems removed. Thiscreates inactive

Page 97

1Click Menu | Automation | Server Tasks and click Edit for the Inactive Agent Cleanup Task for 4.5 in theAction column. The Server Task dialog box app

Page 98

Changing the Managed Inactive Agents queryThe Inactive Agent Cleanup server task uses a preconfigured query named Managed Inactive Agents.Whichever sy

Page 99 - FAQ and common scenarios

Finding product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and t

Page 101

11ReportingePolicy Orchestrator ships with its own querying and reporting capabilities. These are highlycustomizable, flexible and easy to use. The Qu

Page 102

The following example shows some of the categories of preconfigured queries provided with theePolicy Orchestrator software. Custom queries Creating c

Page 103 - 1051 and 1059 events

• Have not communicated with the McAfee ePO server in a while• Are suspected of not working properly when you attempt to wake them up• Need a new agen

Page 104

Creating custom event queries Create a custom query.Task1Click Menu | Reporting | Queries, then Actions | New Query. The Query Wizard appears starting

Page 105 - SQL maintenance

ReportingCustom queries11McAfee® ePolicy Orchestrator® 4.0 and 4.5 Best Practices Guide85

Page 106

3You must choose the label or variable that you want the report to display. There are many variablesyou can choose to have the McAfee Agent reports di

Page 107 - Disaster recovery

4You can choose the columns that you want to see if you drill down on any of the variables in yourreport. This is not a critical component when buildi

Page 108

5Click Next to not create any filters and display all of the operating system types.6Click Run to generate the report and see the results. After you

Page 109

3Click Events in the Features Group and Client Events in the Result Type. Click Next to continue to theChart dialog box. 4Under Summary, click Single

Page 110

1History of McAfee ePolicy OrchestratorsoftwareePolicy Orchestrator software is a mature security management platform that delivers the quality andsta

Page 111 - Reference documentation

5Click Event Description, in the Labels are list, under Threat Event Descriptions to create a filter with agood human readable description of the even

Page 112 - Other Informative Articles

8Click Run to display the query report. In this example there are 308 client events total. If you want, you can click one event and drilldown on it t

Page 113

5Click Event Description, in the Labels are list, under Threat Event Descriptions to create a filter with agood human readable description of the even

Page 114

8Click Run to display the query report. The McAfee ePO server displays approximately 8,000 threat events total.The data shown in this example comes f

Page 115

9To determine approximately how many events you should have on your network use the followingformula:(10,000 nodes) x (1 to 2 million events) = estima

Page 116

4If the event is important, make sure you are monitoring the number of events using theCreating event summary queries and Purging events automatically

Page 117

5Click Next to skip the Columns dialog box. You can choose the columns you want to analyze.You can skip this step because the McAfee ePO server does n

Page 118

11Find the custom query you just created and click it in the list. 12Schedule the task to run every night, then click Save.You can use this technique

Page 120

12FAQ and common scenariosThis chapter contains some frequently asked questions (FAQs) and some common scenarios that anePolicy Orchestrator administr

Commentaires sur ces manuels

Pas de commentaire