Product Guide
Page 61
...systems is providing the correct certificate. • Check the audit log for authentication messages. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 61 These settings control important behavior, including: • Whether... functions: • They specify the time-frame that specify the method and location used by systems connecting to edit the matching settings for Rogue System Detection. These...System Detection These server settings allow you to customize Rogue System Detection to meet the specific needs of your network. • Editing Rogue System Sensor ...
...systems is providing the correct certificate. • Check the audit log for authentication messages. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 61 These settings control important behavior, including: • Whether... functions: • They specify the time-frame that specify the method and location used by systems connecting to edit the matching settings for Rogue System Detection. These...System Detection These server settings allow you to customize Rogue System Detection to meet the specific needs of your network. • Editing Rogue System Sensor ...
Product Guide
Page 127
... they exist elsewhere in the System Tree. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 127 You may not want to deploy agents automatically to groups. When systems or containers are added, moved, or removed in the corresponding locations of the System Tree. When to set ...containers from an Active Directory container, including those in non-excluded subcontainers, as a flat list. If the organization of Active Directory meets your security management needs and you are carried over into your Active Directory structure. You can then move these systems in the ...
... they exist elsewhere in the System Tree. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 127 You may not want to deploy agents automatically to groups. When systems or containers are added, moved, or removed in the corresponding locations of the System Tree. When to set ...containers from an Active Directory container, including those in non-excluded subcontainers, as a flat list. If the organization of Active Directory meets your security management needs and you are carried over into your Active Directory structure. You can then move these systems in the ...
Product Guide
Page 129
... You can be placed during a sort action. Also, you select systems on the page (even ones with your needs, consider McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 129 If enabled on a system, that system will sort this setting is taken. If you want to...8226; Disable System Tree sorting - If criteria-based sorting does not meet your systems, select this feature to view where systems would be sorted again at agent-server communication, as long as geographical location or job function. Organizing the System Tree Criteria-based sorting 12 Sorting...
... You can be placed during a sort action. Also, you select systems on the page (even ones with your needs, consider McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 129 If enabled on a system, that system will sort this setting is taken. If you want to...8226; Disable System Tree sorting - If criteria-based sorting does not meet your systems, select this feature to view where systems would be sorted again at agent-server communication, as long as geographical location or job function. Organizing the System Tree Criteria-based sorting 12 Sorting...
Product Guide
Page 166
... assignments rules reduce the overhead of managing numerous policies for individual users or systems that meet specific criteria, while maintaining more generic policies across your System Tree. This provides you ...locations. As a result, the user has unrestricted access to internet content. Therefore, if you wish to managed systems, be prioritized to simplify maintenance of policy assignment management. Policies that no one user specific criteria. Rule B has priority level 2, and heavily restricts the same user's access to internet content. 166 McAfee® ePolicy Orchestrator...
... assignments rules reduce the overhead of managing numerous policies for individual users or systems that meet specific criteria, while maintaining more generic policies across your System Tree. This provides you ...locations. As a result, the user has unrestricted access to internet content. Therefore, if you wish to managed systems, be prioritized to simplify maintenance of policy assignment management. Policies that no one user specific criteria. Rule B has priority level 2, and heavily restricts the same user's access to internet content. 166 McAfee® ePolicy Orchestrator...
Product Guide
Page 233
Customize the default dashboard to an appropriate location. Task For option definitions, click ? McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 233 in the interface. 1 Click Menu | Configuration | Server Settings. 2 Click Dashboards | Edit. 3 Click next... drop-down list. 7 Click Save. Your browser attempts to download an XML file according to your browser settings. 3 Save the exported XML file to meet your organization's needs. in the interface. 1 Click Menu | Reporting | Dashboards, then select a dashboard from the Dashboard drop-down lists, choose a ...
Customize the default dashboard to an appropriate location. Task For option definitions, click ? McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 233 in the interface. 1 Click Menu | Configuration | Server Settings. 2 Click Dashboards | Edit. 3 Click next... drop-down list. 7 Click Save. Your browser attempts to download an XML file according to your browser settings. 3 Save the exported XML file to meet your organization's needs. in the interface. 1 Click Menu | Reporting | Dashboards, then select a dashboard from the Dashboard drop-down lists, choose a ...