Evaluator Guide
Page 5
... words and phrases that violate content rules. Email server protection Total Protection for Endpoint provides these products for Lotus Domino protects your email and other documents as they enter and leave your Microsoft Exchange server. McAfee Security for endpoint protection. Centrally managed with ePolicy Orchestrator, McAfee AntiSpyware Enterprise Module seamlessly integrates with a system firewall. McAfee Total Protection for viruses, automatically manages outbreaks, and...
... words and phrases that violate content rules. Email server protection Total Protection for Endpoint provides these products for Lotus Domino protects your email and other documents as they enter and leave your Microsoft Exchange server. McAfee Security for endpoint protection. Centrally managed with ePolicy Orchestrator, McAfee AntiSpyware Enterprise Module seamlessly integrates with a system firewall. McAfee Total Protection for viruses, automatically manages outbreaks, and...
Evaluator Guide
Page 8
Any of Port 8443 for Endpoint Lab Evaluation Guide Ports • McAfee recommends avoiding the use for malicious exploitation, and it is also the primary port used by the system administrator in a Workgroup or Windows Domain....that the VSE Access Protection rules are not already in use the latter which requires the server to be installed before ePolicy Orchestrator can manage systems in response to use of the following databases, if previously installed, meets this is the default port, it is not supported. 8 McAfee Total Protection for HTTPS communication. In...
Any of Port 8443 for Endpoint Lab Evaluation Guide Ports • McAfee recommends avoiding the use for malicious exploitation, and it is also the primary port used by the system administrator in a Workgroup or Windows Domain....that the VSE Access Protection rules are not already in use the latter which requires the server to be installed before ePolicy Orchestrator can manage systems in response to use of the following databases, if previously installed, meets this is the default port, it is not supported. 8 McAfee Total Protection for HTTPS communication. In...
Evaluator Guide
Page 17
...Click Save. 8 In the System Tree, highlight My Organization. 9 In the Sorting Order list, find the entry for Endpoint Lab Evaluation Guide 17 For details on this task to create a sorting rule based on the default tags. 1 Click Menu | Systems | System Tree, then click Group Details on the menu ...and need to be evaluated when new systems are placed in the Lost&Found group. McAfee Total Protection for Test Group. Organizing new systems into the System Tree. Now this exercise, you can also schedule the sorting rule, or run it manually. Add Systems to Manage 5 Click OK. 6 As ...
...Click Save. 8 In the System Tree, highlight My Organization. 9 In the Sorting Order list, find the entry for Endpoint Lab Evaluation Guide 17 For details on this task to create a sorting rule based on the default tags. 1 Click Menu | Systems | System Tree, then click Group Details on the menu ...and need to be evaluated when new systems are placed in the Lost&Found group. McAfee Total Protection for Test Group. Organizing new systems into the System Tree. Now this exercise, you can also schedule the sorting rule, or run it manually. Add Systems to Manage 5 Click OK. 6 As ...
Evaluator Guide
Page 20
... Microsoft Exchange Server; While the list of the following tasks to create a VirusScan policy that lists McAfee Default, click Duplicate. 5 For Name, type Allow Outbound Email, then click OK. 20 McAfee Total Protection for Endpoints 7 In the Create a new policy dialog box, type Database AV Exclusions, then click OK.... the dialog box, select By pattern and type data.mdf, then click OK. In a real environment, you can either disable the rule or modify its exclusions to allow mail to Microsoft's recommended exclusions when running file level antivirus on Port 25, except for an editable ...
... Microsoft Exchange Server; While the list of the following tasks to create a VirusScan policy that lists McAfee Default, click Duplicate. 5 For Name, type Allow Outbound Email, then click OK. 20 McAfee Total Protection for Endpoints 7 In the Create a new policy dialog box, type Database AV Exclusions, then click OK.... the dialog box, select By pattern and type data.mdf, then click OK. In a real environment, you can either disable the rule or modify its exclusions to allow mail to Microsoft's recommended exclusions when running file level antivirus on Port 25, except for an editable ...
Evaluator Guide
Page 21
... Edit Settings. 7 From the Settings for drop-down menu for the first action to perform. McAfee Total Protection for PuPs, then click OK. 6 On the line that lists your IT department's administrative tools... the local log file and in Option #1 above. Task Use this configuration. Setting Policies for Endpoints 6 On the line that lists your new Allow Outbound Email policy, click Edit Settings. 7 ...On the line that your IT staff uses. This disables the secondary action. Many of the rule actually being triggered and blocking traffic, you might not want it finds, but not delete them...
... Edit Settings. 7 From the Settings for drop-down menu for the first action to perform. McAfee Total Protection for PuPs, then click OK. 6 On the line that lists your IT department's administrative tools... the local log file and in Option #1 above. Task Use this configuration. Setting Policies for Endpoints 6 On the line that lists your new Allow Outbound Email policy, click Edit Settings. 7 ...On the line that your IT staff uses. This disables the secondary action. Many of the rule actually being triggered and blocking traffic, you might not want it finds, but not delete them...
Evaluator Guide
Page 24
...rules learned at the client computer to allow traffic this policy as a baseline firewall policy. When you already assigned the Database AV Exclusions policy to the Policy Assignment page, click Save. 24 McAfee Total Protection for Endpoint Lab Evaluation Guide Host Intrusion Prevention policies McAfee... Host Intrusion Prevention provides three types of the various applications on protected computers. This is not already handled by including...
...rules learned at the client computer to allow traffic this policy as a baseline firewall policy. When you already assigned the Database AV Exclusions policy to the Policy Assignment page, click Save. 24 McAfee Total Protection for Endpoint Lab Evaluation Guide Host Intrusion Prevention policies McAfee... Host Intrusion Prevention provides three types of the various applications on protected computers. This is not already handled by including...
Evaluator Guide
Page 25
... From the Assigned Policy drop-down menu, select Adaptive to change the rule settings in the References section. McAfee Total Protection for traffic not already handled by the Firewall Rules policy. 7 Click Save. For more information about managing the Host Intrusion ...Prevention Firewall, review the Host Intrusion Prevention Product Guide. Links to Technical Briefs and other documentation are provided in the Typical Corporate Environment policy, you want to let the firewall create rules for Endpoint...
... From the Assigned Policy drop-down menu, select Adaptive to change the rule settings in the References section. McAfee Total Protection for traffic not already handled by the Firewall Rules policy. 7 Click Save. For more information about managing the Host Intrusion ...Prevention Firewall, review the Host Intrusion Prevention Product Guide. Links to Technical Briefs and other documentation are provided in the Typical Corporate Environment policy, you want to let the firewall create rules for Endpoint...
Evaluator Guide
Page 26
...Information. The examples are meant for Endpoint Lab Evaluation Guide It protects against every email message, then computes an overall spam score. If you will create GroupShield for Microsoft Exchange sample policies for Microsoft Exchange - Protects your email and other documents as they.... 10 For Name, type Content, then click OK. 11 To create a new rule for the category, click Create New under Content Scanner Rules. 26 McAfee Total Protection for illustration purposes only. Protects your email and other documents as they are using Internet Explorer 7.0 and your Microsoft...
...Information. The examples are meant for Endpoint Lab Evaluation Guide It protects against every email message, then computes an overall spam score. If you will create GroupShield for Microsoft Exchange sample policies for Microsoft Exchange - Protects your email and other documents as they.... 10 For Name, type Content, then click OK. 11 To create a new rule for the category, click Create New under Content Scanner Rules. 26 McAfee Total Protection for illustration purposes only. Protects your email and other documents as they are using Internet Explorer 7.0 and your Microsoft...
Evaluator Guide
Page 27
...McAfee Total Protection for Email Servers 12 For Rule Name, type Blocked content. 13 Provide a description, and select the option Add this rule to this task to be rejected. 1 Click Menu | Policy | Policy Catalog. 2 From the Product drop-down menu, select GroupShield for Content Scanning. Under File Categories, select Documents. Setting Policies for Endpoint... Lab Evaluation Guide 27 The Select rules from this causing high CPU usage, click OK. 24 For the Content Scanner rules and associated actions section, click Add rule. 25 From the Select rules group drop-...
...McAfee Total Protection for Email Servers 12 For Rule Name, type Blocked content. 13 Provide a description, and select the option Add this rule to this task to be rejected. 1 Click Menu | Policy | Policy Catalog. 2 From the Product drop-down menu, select GroupShield for Content Scanning. Under File Categories, select Documents. Setting Policies for Endpoint... Lab Evaluation Guide 27 The Select rules from this causing high CPU usage, click OK. 24 For the Content Scanner rules and associated actions section, click Add rule. 25 From the Select rules group drop-...
Evaluator Guide
Page 29
... windows...". From the Selection drop-down menu, select Content. McAfee Total Protection for the category, click Create New under Content Scanner Rules. 12 For Rule Name, type Blocked content. 13 Provide a description, and select the option Add this rule to this causing high CPU usage, click OK. 25 For...click New Category again to continue. 10 For Name, type Content, then click OK. 11 To create a new rule for Endpoint Lab Evaluation Guide 29 The Select rules from this website, click here to ask you trust this group option should contain "Blocked content". Under the And ...
... windows...". From the Selection drop-down menu, select Content. McAfee Total Protection for the category, click Create New under Content Scanner Rules. 12 For Rule Name, type Blocked content. 13 Provide a description, and select the option Add this rule to this causing high CPU usage, click OK. 25 For...click New Category again to continue. 10 For Name, type Content, then click OK. 11 To create a new rule for Endpoint Lab Evaluation Guide 29 The Select rules from this website, click here to ask you trust this group option should contain "Blocked content". Under the And ...
Evaluator Guide
Page 40
...8226; Click Event ID and set Comparison to Greater than. Using Dashboards and Queries 13 From the Monitor list, select VSE: Top 10 Access Protection Rules Broken, then click OK. 14 Click Save. 15 ClickMake Active, then when prompted, click OK. 16 Click Close. 17 On the Dashboards ...as Events and Result Type as Threat Events, then click Next. 4 Makes these queries as dashboard monitors. For Value, type 20000. 40 McAfee Total Protection for Endpoint Lab Evaluation Guide Select this task to create a query that do not have the most current updates, run the "MA: Agent Versions Summary...
...8226; Click Event ID and set Comparison to Greater than. Using Dashboards and Queries 13 From the Monitor list, select VSE: Top 10 Access Protection Rules Broken, then click OK. 14 Click Save. 15 ClickMake Active, then when prompted, click OK. 16 Click Close. 17 On the Dashboards ...as Events and Result Type as Threat Events, then click Next. 4 Makes these queries as dashboard monitors. For Value, type 20000. 40 McAfee Total Protection for Endpoint Lab Evaluation Guide Select this task to create a query that do not have the most current updates, run the "MA: Agent Versions Summary...