Beruflich Dokumente
Kultur Dokumente
McAfee
AT
BY
-1-
McAfee
Architecture :
-2-
McAfee
Contents:-
-3-
McAfee
Console login:
Fig -1
-4-
McAfee
Fig-2
-5-
McAfee
The McAfee Server Task
Fig-3
-6-
McAfee
The Active Directory modified settings as defined below (Fig-4 and Fig-5) :-
Fig-4
The settings for Active Directory task is like this as per NIC architecture.
Click on next option.
-7-
McAfee
Fig-5
Click on finish.
-8-
McAfee
The DAT Update modified settings as defined below (Fig-6 and Fig-7) :-
Fig-6
The settings for DAT Update task is like this as per NIC architecture.
Click on next .
-9-
McAfee
Fig-7
Click on finish.
- 10 -
McAfee
Fig-8
- 11 -
McAfee
Fig-9
Click on finish.
Incremental replication is selected over here, because only the latest update will be replicated to the clients from the
server.
- 12 -
McAfee
Fig-10
The settings of Inactive Agents task is like this as per NIC architecture.
Click on next.
- 13 -
McAfee
Fig-11
- 14 -
McAfee
Fig-12
- 15 -
McAfee
Fig-13
Click on create task.
- 16 -
McAfee
Fig-14
- 17 -
McAfee
Fig-15
- 18 -
McAfee
Fig-16
- 19 -
McAfee
Fig-17
This type of task is normally scheduled for daily updates. The client machine will take updates everyday at a
particular scheduled time.
- 20 -
McAfee
Fig-18
- 21 -
McAfee
Fig-19
Click on Schedule.
Uncheck Inherit.
Schedule time Daily Start time 11:05:00AM
Select Local time.
Enable randomization as 30 minutes.
Schedule task daily every 1 day(s).
Click ok.
- 22 -
McAfee
Different Task Settings For all the NIC Operating Office’s Servers and Machines as shown below ( Fig-20 to 37) :-
Fig-20
- 23 -
McAfee
Fig-21
Click on settings.
- 24 -
McAfee
Fig-22
Click ok.
- 25 -
McAfee
Fig-23
Click on schedule.
The modified schedule has been made as per NIC architecture.
Click ok.
- 26 -
McAfee
Fig-24
- 27 -
McAfee
Fig-25
- 28 -
McAfee
Fig-26
Click on schedule.
The schedule is defined as per NIC architecture.
Click ok.
Immediate Update of DAT and Patches settings as defined below (fig-27 to 28) :-
- 29 -
McAfee
Fig-27
- 30 -
McAfee
Fig-28
- 31 -
McAfee
Fig-29
Click on settings.
- 32 -
McAfee
Fig-30
Click on detection.
- 33 -
McAfee
Fig-31
Click on Advanced.
- 34 -
McAfee
Fig-32
Click on Actions.
- 35 -
McAfee
Fig-33
- 36 -
McAfee
Fig-34
Click on reports.
- 37 -
McAfee
Fig-35
Click on task.
- 38 -
McAfee
Fig-36
Click ok.
- 39 -
McAfee
Fig-37
- 40 -
McAfee
Fig-38
- 41 -
McAfee
Fig-39
- 42 -
McAfee
Fig-40
- 43 -
McAfee
Fig-41
- 44 -
McAfee
Fig-42
The above settings are modified as per NIC architecture.
The repositories will be different for each and every sites as per NIC Architecture.
Click on updates.
Normally we have selected four repositories for each RO’S . Here for HO we have selected four repository. The first
preference will be that particular RO. In HO the first repository is ePO_NIC-800000-EPO1 . Other selected
repositories are from East region. By this way the first repository will be the particular RO office and rest of the
repositories will be from that region.
- 45 -
McAfee
Fig-43
- 46 -
McAfee
Fig-44
- 47 -
McAfee
Fig-45
- 48 -
McAfee
Fig-46
Click on scriptscan.
The above settings are modified as per NIC architecture.
- 49 -
McAfee
Fig-47
Click on blocking.
The above settings are modified as per NIC architecture.
- 50 -
McAfee
Fig-48
Click on Messages.
The above settings are modified as per NIC architecture.
- 51 -
McAfee
Fig-49
Click on Reports.
The above settings are modified as per NIC architecture.
Click on apply.
Click close.
- 52 -
McAfee
Fig-50
- 53 -
McAfee
Fig-51
- 54 -
McAfee
Fig-52
- 55 -
McAfee
Fig-53
- 56 -
McAfee
Fig-54
- 57 -
McAfee
Fig-55
- 58 -
McAfee
Fig-56
- 59 -
McAfee
Fig-57
- 60 -
McAfee
Fig-58
- 61 -
McAfee
Fig-59
The above settings are modified as per NIC architecture.
Click on Unwanted Programs.
- 62 -
McAfee
Fig-60
- 63 -
McAfee
Fig-61
- 64 -
McAfee
Fig-62
- 65 -
McAfee
Fig-63
- 66 -
McAfee
Fig-64
- 67 -
McAfee
Fig-65
- 68 -
McAfee
Fig-66
- 69 -
McAfee
Alert Manager Policy Settings:-
Fig-67
- 70 -
McAfee
Fig-68
- 71 -
McAfee
Fig-69
- 72 -
McAfee
Fig-70
- 73 -
McAfee
Fig-71
- 74 -
McAfee
On-Access Process Policy Settings:-
Fig-72
- 75 -
McAfee
Fig-73
- 76 -
McAfee
Fig-74
- 77 -
McAfee
Fig-75
- 78 -
McAfee
Fig-76
- 79 -
McAfee
On-Access General Policy Settings:-
Fig-77
- 80 -
McAfee
Fig-78
- 81 -
McAfee
Fig-79
- 82 -
McAfee
Fig-80
The above settings are modified as per NIC architecture.
Click on Repots.
- 83 -
McAfee
Fig-81
- 84 -
McAfee
User Interface Policy Settings:-
Fig-82
The above settings are modified as per NIC architecture.
Click on password options.
- 85 -
McAfee
Fig-83
- 86 -
McAfee
Unwanted Programs Policy Settings:-
Fig-84
- 87 -
McAfee
Fig-85
- 88 -
McAfee
TASKS FOR THE LAPTOPS
Fig-86
Expand Directory.
Expand HO.
Click on Laptops and select Tasks.
The Task’s names are also same like machines and servers. Only the schedule type is different.
Open the Deployment tasks.
- 89 -
McAfee
Fig-87
- 90 -
McAfee
Fig-88
- 91 -
McAfee
Fig-89
Expand Directory.
Expand HO.
Click on Laptops and select policies.
Click on HO laptop agent.
Only Agent Policy setting for laptop is different from the all machines and servers ePO Agent Policy settings. We
have taken HO laptop policy as for example.the ePO
- 92 -
McAfee
Fig-90
- 93 -
McAfee
Fig-91
- 94 -
McAfee
Fig-92
- 95 -
McAfee
Fig-93
- 96 -
McAfee
Fig-94
- 97 -
McAfee
Fig-95
Expand NIC-800000-EPO1.
Right click on Directory.
Click on Search
- 98 -
McAfee
Fig-96
- 99 -
McAfee
Fig-97
We can find out particular machine details and all the machines of a particular site.
- 100 -
McAfee
Fig-98
Select Computers in specific group or site from “search for”.
Select Group Name as “starts with”.
Write any site name or group name in the “Value” column.
Click on search.
We can find out all the machines in a particular site or group by this method.
- 101 -
McAfee
Fig-99
- 102 -
McAfee
Fig-100
By selecting duplicate computer names from “Search for” ,we can search the duplicate machines.
Check the last connection time.
Delete the older one.
- 103 -
McAfee
Fig-101
- 104 -
McAfee
Fig-102
We can get all the details of that particular machine by this method.
- 105 -
McAfee
Fig-103
- 106 -
McAfee
Fig- A
Expand NIC-800000-EPO1 .
Right click on Directory and click on Search.
- 107 -
McAfee
Fig- B
- 108 -
McAfee
Fig- C
Here the client was in Inactive Agents group. But normally it should be in ARO’s Desktops group.
- 109 -
McAfee
Fig-104
- 110 -
McAfee
Fig-105
- 111 -
McAfee
We can also send Agent Wakeup Call to any particular machine by this method.
Fig-106
- 112 -
McAfee
Fig-107
Expand NIC-800000-EPO1.
Expand Directory.
Select particular site .
Right click on it and select Send Agent Install.
- 113 -
McAfee
Fig-108
Select “Only install on computers that do not have an agent” and “Force install over existing version” both.
Type password.
- 114 -
McAfee
We can do Send Agent Install by the same method.
Fig-109
- 115 -
McAfee
Installation process of New Packages
Fig-110
Expand NIC-800000-EPO1.
Click on Repository.
Click on Check in package.
- 116 -
McAfee
Fig-111
Click on next.
- 117 -
McAfee
Fig-112
- 118 -
McAfee
Fig-113
Browse the particular downloaded package form the server and enter the full path of that file.
Click on next.
- 119 -
McAfee
Fig-114
Click on finish.
- 120 -
McAfee
Fig-115
- 121 -
McAfee
Fig-116
- 122 -
McAfee
Fig-117
Browse the .nap file from the same folder of the packager file.
Select and open the file.
Wait for few minutes .
- 123 -
McAfee
Fig-118
Expand Repository.
Expand Software Repositories
Click on Master.
Check the Version of the particular package.
- 124 -
McAfee
Fig-119
Expand NIC-800000-EPO1.
Click on Repository.
Click on Pull now in the right side.
Select the NAIHttp.
Click next.
- 125 -
McAfee
Fig-120
Select current.
Select finish.
- 126 -
McAfee
Replicate the Latest Updates to The Particular site manually :-
Fig-121
Click on next.
- 127 -
McAfee
Fig-122
- 128 -
McAfee
Fig-123
- 129 -
McAfee
Fig-124
Click on close.
- 130 -
McAfee
Fig-125
Click on configure proxy .
Select don’t use proxy.
Click on ok.
- 131 -
McAfee
Checking Repository Status from ePo Console :-
Fig-126
Expand Repository.
Expand Software Repositories.
Click on Distributed.
Select any distributed repository.
Click on edit.
- 132 -
McAfee
Fig-127
Click on option.
Check the URL http://10.X.0.3/epo
Port will be 80.
Replicate UNC will be \\10.X.0.3\eposhare
Domain will be nic-X0000-av1
Username will be the admin login username of the particular antivirus server.
Type the password.
- 133 -
McAfee
Fig-128
Expand Reporting.
Expand ePO Databases.
Right click on ePO NIC-800000-EPO1(NIC-800000-EPO1)
Click on connect.
- 134 -
McAfee
Fig-129
User name will be console log in id.
Type password.
Authentication type must be ePO authentication.
HTTPS port number willl be 8443.
Click ok.
- 135 -
McAfee
Fig-130
Expand Reports.
Expand Anti-Virus.
Expand Detection.
Click on Action Summary By Top 10 Threat.
Check the Detection List. Select any detection and expand it.
- 136 -
McAfee
Fig-131
- 137 -
McAfee
Fig-132
- 138 -
McAfee
Fig-133
Expand Reporting.
Expand ePO Database.
Click on ePO_NIC-800000-EPO1(NIC-800000-EPO1).
Login into ePO Database.
Click ok.
- 139 -
McAfee
Fig-134
Click on Events.
Select Removal option.
Select days of “All events that occurred more than”.
Click on start.
Wait for few minutes.
- 140 -
McAfee
Fig-135
- 141 -
McAfee
Fig-136
Go to start > programs > Microsoft SQL Server > Enterprise Manager.
- 142 -
McAfee
Fig-137
Expand Microsoft SQL Server Group.
Expand NIC-800000-EPO1.
Expand Databases.
- 143 -
McAfee
Fig-138
- 144 -
McAfee
Fig-139
- 145 -
McAfee
Fig-140
The above settings are modified as per NIC architecture.
Plan name will be Weekly ePO Backup.
Select these database and ePO_NIC-800000-EPO1 .
- 146 -
McAfee
Fig-141
The above settings are modified as per NIC architecture.
Open Optimization.
Select Update the statistics used by the query optimizer.
Shrink database when it grows beyond will be as per requirement.
Time Schedule will be weekly on Sunday.
- 147 -
McAfee
Fig-142
The above settings are modified as per NIC architecture.
Open integrity.
Select Check database integrity.
Select perform these tests before backing up the database or transaction log.
- 148 -
McAfee
Fig-143
The above settings are modified as per NIC architecture.
Set the directory path.
Select subdirectory for each database.
The time period of Remove file older than will be variable as per requirement.
- 149 -
McAfee
Fig-144
- 150 -
McAfee
Fig-145
END
- 151 -