McAfee FIREWALL 2.1-GETTING STARTED Guida Utente

Navigare online o scaricare Guida Utente per Firewall hardware McAfee FIREWALL 2.1-GETTING STARTED. McAfee FIREWALL 2.1-GETTING STARTED Product guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Product Guide

Product GuideRevision AEndpoint Intelligence Agent 2.1.0

Pagina 2 - TRADEMARK ATTRIBUTIONS

• ePolicy Orchestrator installs and configures the Endpoint Intelligence Agent settings on managedhosts.• Firewall Enterprise is configured for Endpoi

Pagina 3 - Contents

When the GTI capability is enabled on the NTBA appliance, McAfee EIA sends a GTI request consistingof the MD5. The NTBA communicates with the GTI serv

Pagina 4 - Index 37

The confidence levels associated with an executable are specified in numeric values. Each of thesevalues corresponds to the following confidence level

Pagina 5 - About this guide

2Setting up Endpoint Intelligence Agentwith ePolicy OrchestratorInstall the Endpoint Intelligence Management Extension, check in the Endpoint Intellig

Pagina 6 - Find product documentation

Product Supported versionFirewall EnterpriseControl CenterFirewall EnterpriseVersion 5.3.1 or later.Version 8.3.1 with the latest P-patch, version 8.3

Pagina 7

Upload the Endpoint Intelligence Agent packageUpload the Endpoint Intelligence Agent package to the ePolicy Orchestrator server. This packagecontains

Pagina 8

3In the Task Types list, select Product Deployment.4Click OK. The Client Task Catalog: New Task - McAfee Agent: Product Deployment window appears.5In

Pagina 9

3Configure Endpoint Intelligence Agent onFirewall EnterpriseTo configure Endpoint Intelligence Agent on Firewall Enterprise, follow the procedures in

Pagina 10 - Introduction

• Public key lengths must be 4096 bits or lower.• The host certificate used by McAfee EIA must be signed by the same certificate authority thatgenerat

Pagina 11

Option DefinitionRetentionIntervalSpecifies the number of days ePolicy Orchestrator keeps the Gateway Status reportssent from the McAfee EIA.'Tim

Pagina 12

COPYRIGHTCopyright © 2013 McAfee, Inc. Do not copy without permission.TRADEMARK ATTRIBUTIONSMcAfee, the McAfee logo, McAfee Active Protection, McAfee

Pagina 13 - System requirements

TaskFor option definitions, click Help in the interface.1From the Firewall Enterprise Admin Console, select Maintenance | Certificate/Key Management.2

Pagina 14 - Manager ePO extension

dEnter the information for the CA certificate.eClick Add.fClick Get CA Cert to get the Distinguished Name details.6Configure the firewall certificate.

Pagina 15

3Click New Policy. The New Policy window appears.4Choose a policy in the Create a policy based on this existing policy list.5Enter a name in the Polic

Pagina 16

Example: You have a subnet configured for route discovery, but you don't want to send metadatafor a particular host in that network.aEnter the ne

Pagina 17 - Firewall Enterprise

Option DefinitionLog LevelSpecifies the logging level for the Endpoint Intelligence Agent. By default, this isselected as Error. You can select other

Pagina 18 - Configure certificates

Option DefinitionThread CountUsed to configure the number of worker threads used by McAfee EIA tocompute reputation. Reducing the thread count reduces

Pagina 19 - Load the certificates

3Configure Endpoint Intelligence Agent on Firewall EnterpriseFirewall Enterprise setup26Endpoint Intelligence Agent 2.1.0 Product Guide

Pagina 20

4Configure Endpoint Intelligence Agent onNTBATo configure Endpoint Intelligence Agent on NTBA appliance, follow the procedures in this section.Content

Pagina 21 - Configure policy

4Configure Endpoint Intelligence Agent on NTBANTBA setup28Endpoint Intelligence Agent 2.1.0 Product Guide

Pagina 22 - Configure discovery options

5Maintenance and troubleshootingYou can use a variety of reports and logs to monitor the status of host agents and troubleshootcommunication or operat

Pagina 23 - Configure advanced settings

ContentsPreface 5About this guide ... 5Audience ... 5Conventions ...

Pagina 24

View the Gateway Status report The Gateway Status report lists agent hosts that have problems communicating with the FirewallEnterprise gateway.TaskFo

Pagina 25 - Firewall Enterprise setup

Log Collector toolYou can collect logs using LogCollector.exe in the Endpoint Intelligence Agent install folder. This file isfound in C:\Program Files

Pagina 26

Problem SolutionThe McAfee EIA Service doesnot startIn case the McAfee EIA Service does not start:• Check if Firecore service is running (start if it

Pagina 27 - NTBA setup

Problem SolutionIssues with the EIM extension In case of issues with the EIM extension:• Provide the policy configuration.• Provide the browser versio

Pagina 28

5Maintenance and troubleshootingTroubleshooting tips34Endpoint Intelligence Agent 2.1.0 Product Guide

Pagina 29

6Frequently asked questionsThis section answers some of the frequently asked questions about Endpoint Intelligence Agent.Question 1When McAfee EIA swi

Pagina 30 - View related firewall audit

6Frequently asked questions36Endpoint Intelligence Agent 2.1.0 Product Guide

Pagina 31 - Troubleshooting tips

IndexAabout this guide 5active hosts, viewing 30agent status 30CcertificatesePolicy Orchestrator deployment 17SCEP 20conventions and icons used in thi

Pagina 33

Log Collector tool ...31Troubleshooting tips ... 316 Frequently asked questions 35Index 37

Pagina 34

PrefaceThis guide provides the information you need to configure, use, and maintain your McAfee product.Contents About this guide Find product d

Pagina 35 - Frequently asked questions

Find product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and trou

Pagina 36

1IntroductionMcAfee® Endpoint Intelligence Agent is an endpoint solution that provides per-connection informationto the supported network devices, nam

Pagina 37

• The executable file name on the disk (full path) and hash of the process that generated theconnectionThis is an optional field and is sent only when

Pagina 38

When network traffic is generated, the reputation of the executable file is critical for the networkdevice to configure response actions to prevent ma

Commenti su questo manuale

Nessun commento