McAfee Security for Microsoft SharePoint 2.5.
COPYRIGHT Copyright © 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
Contents Introducing McAfee Security for Microsoft SharePoint. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 New Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Settings and Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Detected Items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 User Interface Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Diagnostics. . . . . . . . . . . . . . .
Contents Creating Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Enforcing Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Scheduling an On-Demand Scan Task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Configuring Reports. . . . . . . . . . . . .
Introducing McAfee Security for Microsoft SharePoint McAfee Security for Microsoft SharePoint 2.5 (previously known as McAfee PortalShield) provides comprehensive security for data stored on the following Microsoft SharePoint products: • Microsoft SharePoint Server 2003/Windows SharePoint Services 2.0 • Microsoft Office SharePoint Server 2007/Windows SharePoint Services 3.
Introducing McAfee Security for Microsoft SharePoint New Features Features Description Consolidated support for Microsoft SharePoint Server 2003, 2007, and 2010 Support for Microsoft SharePoint Server versions 2003, 2007, and 2010 through a single installer. Integration with McAfee Artemis McAfee's latest Artemis Technology safeguards your SharePoint Server by providing real-time security from the ever-evolving threats.
Introducing McAfee Security for Microsoft SharePoint How McAfee Security for Microsoft SharePoint Works Features Description Support for custom port Support for customizing the Internet Information Services port during installation, where the web interface must be hosted. Support for magnifying graph You can magnify the graphical reports of your detected items on your dashboard.
Installation Installing McAfee Security for Microsoft SharePoint is very simple. Following sections include important information to be considered before installation, detailed installation instructions, and post installation tasks.
Installation Microsoft SharePoint Server Credentials for Installing McAfee Security for Microsoft SharePoint General • SharePoint Server 2010/SharePoint Foundation 2010 (64-bit). • A CD-ROM drive (if installing from a CD). • Internet Explorer 7.0 browser or later. • 1024X768 resolution or higher (recommended). Pre-installation Configuration To install McAfee Security for Microsoft SharePoint, you MUST log on to Microsoft Windows operating system as an administrator.
Installation Installing McAfee Security for Microsoft SharePoint You can use "SetSQLAct.exe" to modify your credentials in case of an incorrect entry while installing McAfee Security for Microsoft SharePoint. This utility is located in the following location: \bin TIP: Usage is as follows: SetSqlAct.
Installation Installing McAfee Security for Microsoft SharePoint 6 McAfee Security for Microsoft SharePoint is installed on the default port 45900. Specify a custom port on which the Microsoft Internet Information Server must host McAfee Security for Microsoft SharePoint, then click Next. The Destination Folder dialog box appears. 7 Click Next to install McAfee Security for Microsoft SharePoint in the default location.
Installation Installing McAfee Security for Microsoft SharePoint NOTE: Setting database account information applies only to: • Microsoft SharePoint Server 2003 and Windows SharePoint Services installations that use a remote SQL database server. • Microsoft Office SharePoint Server 2007 (Local and Remote SQL installation). • Microsoft SharePoint Server 2010 (Local and Remote SQL installation). 8 Type your account name (domain or workgroup\username) and password, then click Next.
Installation Post-installation Tasks and Maintenance Usage is as follows: SetSqlAct.exe /USER= /PASSWORD= /DOMAIN= The Ready to Install the Application dialog box appears. 9 Click Next. The installation process begins. A progress bar appears indicating the status of the installation process.
Installation Post-installation Tasks and Maintenance Testing the On-Access Scanner 1 Launch the Microsoft SharePoint server. 2 Copy the following line into its own file, then save the file with the name EICAR.TXT: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* The file size will be 68 or 70 bytes. NOTE: If you have any other security software installed on your server (such as McAfee VirusScan Enterprise), you must disable its scanner during this process.
Installation Post-installation Tasks and Maintenance Contents Repairing the McAfee Security for Microsoft SharePoint Installation Uninstalling McAfee Security for Microsoft SharePoint Repairing the McAfee Security for Microsoft SharePoint Installation Repairing the McAfee Security for Microsoft SharePoint installation detects the presence of McAfee Security for Microsoft SharePoint on your system, replaces all binaries and configuration file settings with the original files without changing the McAfee Sec
Installation Post-installation Tasks and Maintenance 6 Modify the Account Information as required. If the user credentials cannot be resolved by the server, a warning dialog box appears prompting you to check your credentials. Verify if you have entered correct credentials. If you are sure that the user credentials are correct, click OK, then click Next to override the warning and proceed with the repair process with unresolved account information. The Ready to repair the Application dialog box appears.
Getting Started with the User Interface It is important for administrators to know how well their data on the SharePoint Server is being protected in real-time from viruses and banned content. The McAfee Security for Microsoft SharePoint user interface has an integrated dashboard that provides administrators with the latest statistics of detected items, scan and update event items, and the product version and license information.
Getting Started with the User Interface Dashboard Contents Statistics and Information Scheduling a New On-demand Scan Graphical Reports Statistics and Information This is the default section that appears on launching the user interface. The Statistics & Information screen is further divided into three sections namely: Statistics Versions and Updates Reports Statistics Statistics displays the number and percentage of: • Items that are clean (not infected).
Getting Started with the User Interface Dashboard You can also use the following options: • Reset — Click to reset the statistics of all detected items on your dashboard. • — Click the icon of the corresponding detected item to see its statistics in the graph. Clicking it again hides the statistics in the graph. • Magnify Graph — Select an option from the drop-down list to view the magnified graph. • Time Range — Select a time range from the drop-down list from the time you want to view the statistics.
Getting Started with the User Interface Dashboard 4 Select the desired folder(s) and click >> to move the folder(s) from Available folders to Folders to scan. 5 Select one of the following options: • Scan all folders — All folders in Folders to scan will be scanned. • Scan selected folders — Selected folders in Folders to scan will be scanned. • Scan all except selected folders — Folders except the selected ones in Folders to scan will be scanned. 6 Click Next.
Getting Started with the User Interface Detected Items 3 Select at least one filter; you can select up to three of the following filters: • Subject • Recipient • Reason • Ticket Number • Deleted Items 4 Select All Dates to include all the dates, else select Date Range and select the required date range from the drop-down menus. 5 Select Bar Graph or Pie Chart as required. 6 Click Search. NOTE: Click Clear Filter to return to the default filter values.
Getting Started with the User Interface Detected Items 4 Click Search. A list of viruses matching your search criteria is displayed in the View Results pane. NOTE: Click Clear Filter to return to the default search filter settings. Potentially Unwanted Programs Potentially Unwanted Programs are the software programs written by legitimate companies which, if installed, may alter the security state or the privacy posture of your system. 1 Click Detected Items | Potentially Unwanted Programs.
Getting Started with the User Interface Detected Items Unwanted Content 1 Click Detected Items | Unwanted Content. 2 From the Unwanted Content screen, select up to three search filters: • Filename • Folder • Detection Name • Ticket Number • Scanned By • Policy Name 3 Select All Dates to include all entries or select Date Range and the desired date range from the drop-down lists. 4 Click Search. A list of files containing unwanted content is displayed in the View Results pane.
Getting Started with the User Interface Policy Manager • Submit a quarantined item to Avert if the option is enabled. Select a record from the View Results pane, then click Submit to Avert. NOTE: All quarantined items are stored in a new database called PostgreSQL. Policy Manager You can use Policy Manager to specify policies that determine actions taken on different types of threats when detected. Master policy is the default policy for both on-access and on-demand policies.
Getting Started with the User Interface Policy Manager Advanced View Advanced View enables you to use the arrows in the Move column to change the order in which any subpolicies are applied. You can use: • The Name of the policy — to edit its settings. • Create Sub-Policy — to create a subpolicy. • Enabled — to enable or disable a subpolicy. If you select this option, the subpolicy is enabled. • Delete — to delete a subpolicy that is no longer required.
Getting Started with the User Interface Policy Manager Policy Settings You can set up policies that determine how different types of threats are treated for different groups of users or databases stored on the server. Each policy specifies the settings and actions that are used by the policy and the actions taken when a detection is triggered in the SharePoint environment. The settings are given names and can be used by many policies at the same time.
Getting Started with the User Interface Policy Manager Specify Users The Specify Users tab allows you to specify policy rules for specific users. To create a new rule for a specific user: 1 In Specify Users tab, click New Rule. You can select from the following policy rule templates: • The file name is file name • The file name is not the file name TIP: If you do not want to perform instructions in step 7, you can just copy rules from an existing policy by selecting it in the drop-down list.
Getting Started with the User Interface Policy Manager • Weekdays • Weekends • Working hours 7 If you select Create a new time slot, specify a name for the new time slot and select the desired day(s) and time. 8 Click Save, then Apply. Scanners and Filters Policy Manager has core scanners, filters and miscellaneous options. Each of them are explained in detail below.
Getting Started with the User Interface Policy Manager 6 In Actions to take, you can view/edit a summary of the actions that will be taken in different circumstances. To change those actions, click Edit. NOTE: For information on editing anti-virus scanner actions, refer to the Editing anti-virus scanner actions section.
Getting Started with the User Interface Policy Manager • Find unknown macro viruses — to find unknown viruses in macros. • Enable Artemis technology — to enable McAfee's Artemis technology for safeguarding your SharePoint server from the ever-evolving threats. You can select a sensitivity level from the drop-down list. Sensitivity Level Description Disabled Artemis technology is turned off. Very Low Equivalent to next days DATs. Get tomorrow's protection today. Recommended initial configuration.
Getting Started with the User Interface Policy Manager 11 In PUPs, you can enable the PUP detection. Click on the disclaimer link and read the disclaimer before enabling PUP detection option. You can also enable detection for the following PUPs: • Spyware • Adware • Remote Administration Tools • Dialers • Password Crackers • Joke programs • Cookies • Other potentially unwanted programs not included in the above categories.
Getting Started with the User Interface Policy Manager • PUPs NOTE: If you select the primary action as Replace item with an alert, you get an option to create your Alert message. Primary and Secondary Actions Primary actions for on-access scan • Allow through — Allows the item to continue to the next scanning phase or to its final destination. • Prevent Upload/Download of the Item — Prevents the item from being uploaded to or downloaded from the server.
Getting Started with the User Interface Policy Manager • Add rule — to create a new content rule for this policy. NOTE: For more information about creating a new content rule, refer to the Adding a new content rule section. • Edit — to change the action associated with a content rule. • Delete — to delete the content rule. Tasks Creating a New Alert Adding a New Content Rule Creating a New Alert 1 From Policy Manager, select a submenu item On-Access or On-Demand.
Getting Started with the User Interface Policy Manager • Insert Image — to insert an image where the cursor is currently positioned. In Image URL, type the location of the image. In Alternative text, type the text you want to use in place of the image when images are suppressed, or the alert message is displayed in a text-only browser. If you want to give the image a title, type the title name in Use this text as the image title. Click Insert Image.
Getting Started with the User Interface Policy Manager 4 In Activation, select Enable to enable the file filtering scanner settings for the policy. TIP: For a true file type filtering, enable Content Scanning too. 5 In Alert selection, specify which alert will be used when an infected document triggers a filtering rule. You can also select an existing alert or click Create to create a new alert. NOTE: For more information about creating a new alert, refer to the Creating a New Alert section.
Getting Started with the User Interface Policy Manager 10 In Take action when the file category is, specify the type of files that are affected by this rule. NOTE: File types are divided into categories and subcategories. 11 In File Categories, click on a file type. An asterisk appears next to the file type to indicate that the selected file type will be filtered. 12 In Subcategories, click on the subcategory you want filtered. NOTE: To select more than one subcategory, use Ctrl+Click, or Shift+Click.
Getting Started with the User Interface Policy Manager 5 In Actions, click Edit to configure the actions that must be taken when corrupt content is detected. TIP: For information on the available actions that can be taken when corrupt content is detected, refer to the Primary and Secondary Actions section. Protected Content The content of some documents can designated to be protected, which means such content cannot be scanned.
Getting Started with the User Interface Policy Manager digital signature is 'broken'. You cannot rely on the contents of the document because the contents might have also been altered in other ways. Signed content policy specifies how documents with digital signatures are handled. 1 From Policy Manager, select a submenu item On-Access or On-Demand. The policy page for the selected submenu item appears. 2 Click on a policy. 3 Click Signed Content.
Getting Started with the User Interface Policy Manager • Core Scanner Control Settings — to view a summary of the scanner control option set that is used by default when no alternative scanner control option sets are available. • Create new set of options — to create a new option set for this policy. 6 If you select Create new set of options, type a unique name for the scanner control filter setting instance.
Getting Started with the User Interface Policy Manager 6 If you select Create new set of options, enter a unique instance name. This field is mandatory. 7 In Alert Options, use: • Alert format — to specify whether the alert must be in HTML format or plain text format. • Character encoding — to specify which type of character encoding is required. • Alert filename — to specify the file name for this alert, including the appropriate HTML (.htm) or plain text (.txt) file extension.
Getting Started with the User Interface Policy Manager • Create New — to create a new shared resource for a selected category. NOTE: For detailed information on Create New, refer to the sections Creating a new shared resource for Anti-Virus Scanner, Creating a new shared resource for Scanner Control, and Creating a new shared resource for Alert Settings. • Delete — to delete a resource that is no longer used by any of the policies. Some resources cannot be deleted. • Edit — to change the resource settings.
Getting Started with the User Interface Policy Manager 7 Enter the Maximum scan time (minutes). 8 Click Save. 9 In the Alerts pane, select a Category. 10 Click Create New and perform steps 5 - 9 of the Creating a new alert section. Creating a New Shared Resource for Alert Settings 1 In Policy Manager, click Shared Resource. The Shared Resources page appears. 2 In Scanners & Alerts tab, select Alert Settings from the Category drop-down menu. 3 In the Scanners pane, click Create New.
Getting Started with the User Interface Policy Manager Tasks Creating a New Content Scanner Rule Creating New File Filtering Rule Creating a New Content Scanner Rule 1 In Policy Manager, click Shared Resource. The Shared Resources page appears. 2 Click Filter Rules tab. 3 In Content Scanner Rules pane, click Create New. The New Content Scanner Rule page appears. 4 Type a unique rule name. 5 In Details, type a brief description for the rule.
Getting Started with the User Interface Settings and Diagnostics • View — to view the time slot of All the time. • Delete — to delete a time slot that is not used by any of the policies. • Edit — to change the name or times associated with a specific time slot. • Create New — to create a new time slot. Creating a New Time Slot 1 In Policy Manager, click Shared Resource. The Shared Resources page appears. 2 Click Time Slots tab. 3 Click Create New. The Time Slot page appears.
Getting Started with the User Interface Settings and Diagnostics 3 In Maximum item size (MB), specify the maximum size in megabytes an item stored in the database can be. 4 In Maximum query size (records), specify the maximum number of records that can be returned when the local quarantine database receives a query. 5 In Maximum item age (days), specify the maximum number of days an item will be held in the local quarantine database before being marked for deletion.
Getting Started with the User Interface Settings and Diagnostics 2 Click the Graph and Chart Settings tab. 3 Select 3D to specify whether you want the graph on the dashboard to be displayed as a three-dimensional graph. 4 Select or deselect Draw transparent to specify whether the bars in a three-dimensional bar graph must appear transparent or solid. NOTE: A solid bar will hide part of any bar behind it. A transparent bar allows you to look through it and see other transparent bars behind it.
Getting Started with the User Interface Settings and Diagnostics 8 Select Report exceptions to user to specify that the exceptions should be reported to the administrator. 9 Click the Event Logging tab. 10 In Product Log, select Write information events, Write warning events, and Write error events to include these events in the product log. 11 In Event Log, select Write information events, Write warning events, and Write error events to include these events in the event log.
Getting Started with the User Interface Settings and Diagnostics 2 From the Product Log section, select at least one of the following filters: • ID — Enter the ticket id which identifies a specific product log entry. • Level — Select Information, Warning or Error from the drop-down in the second field depending on the type of log you want to see. • Description — Select the relevant description. NOTE: You can select up to three search filters.
Getting Started with the User Interface Settings and Diagnostics 2 Click Export. 3 Specify the location where the configuration file McAfeeConfigXML.cgf must be stored. 4 Click Save. 5 To import this configuration, browse to locate the configuration file, then click Open. 6 Click Import. NOTE: Click Restore Default if you are not sure of the configuration changes you made and want to restore to the default configuration of your McAfee Security for Microsoft SharePoint software.
Getting Started with the User Interface Settings and Diagnostics 2 From the On Scan Failure drop-down menu, choose Allow Through to allow the documents to get uploaded to the server or Prevent Upload to prevent the uploading of the documents which failed to get scanned. 3 In Retrieve SharePoint AV Settings Every (minutes), enter the time (in minutes) to retrieve the anti-virus settings as and when required.
Integration with McAfee ePolicy Orchestrator 4.0 This chapter describes how to configure and manage McAfee Security for Microsoft SharePoint using McAfee ePolicy Orchestrator management software version 4.0. To use this chapter effectively, you need to be familiar with ePolicy Orchestrator 4.0. McAfee ePolicy Orchestrator 4.0 provides a scalable platform for centralized policy management and enforcement on your McAfee security products and systems on which they reside.
Integration with McAfee ePolicy Orchestrator 4.0 Deploying McAfee Security for Microsoft SharePoint using ePolicy Orchestrator 4.0 Checking in the McAfee Security for Microsoft SharePoint Package to ePolicy Orchestrator 4.0 You can check in the McAfee Security for Microsoft SharePoint package from the Repository page of ePolicy Orchestrator 4.0. Repository is the central location for all McAfee updates residing on the ePolicy Orchestrator server.
Integration with McAfee ePolicy Orchestrator 4.0 Sending an Agent Wake-up Call • REMOTESQLPWD="password" • IISPORT=45900 (Optional) 7 Schedule the task to run immediately or as required, then click Next to view a summary of the task. 8 Click Save, then send an agent wake-up call. TIP: Refer to the Sending an Agent Wake-up Call section for instructions. Sending an Agent Wake-up Call All systems in the network are managed in the Systems tab.
Integration with McAfee ePolicy Orchestrator 4.0 Scheduling an On-Demand Scan Task Enforcing Policies Creating Policies Using ePolicy Orchestrator 4.0, you can create, edit, delete, or assign a policy to specific group(s) or system(s) in the System Tree. 1 Log on to the ePolicy Orchestrator server as an administrator. 2 Click Systems | System Tree and select the required group(s)/system(s). 3 Select Product as McAfee Security for Microsoft SharePoint 2.5.0.
Integration with McAfee ePolicy Orchestrator 4.0 Scheduling an On-Demand Scan Task 4 Click New Task. The Client Task Builder page appears. 5 In Description, type a name, notes (optional) for the on-demand scan task. 6 Select On Demand Scan (McAfee Security for Microsoft SharePoint 2.5.0) as the Type of the task, then click Next. 7 In Choose what to scan, type the Web Application Name and Target Folder Path and click >> to move the folder(s) to Folders to scan.
Integration with McAfee ePolicy Orchestrator 4.0 Configuring Reports Configuring Reports Reports are pre-defined queries which query the ePolicy Orchestrator database and generate a graphical output. McAfee ePolicy Orchestrator 4.0 includes a set of default queries on the left pane. However, you can create a new query, edit, and manage all the queries related to McAfee Security for Microsoft SharePoint.
Integration with McAfee ePolicy Orchestrator 4.0 Uninstalling McAfee Security using ePolicy Orchestrator 4.0 Uninstalling McAfee Security for Microsoft SharePoint from Managed Nodes Removing the McAfee Security for Microsoft SharePoint Package from ePolicy Orchestrator 4.0 You can remove the McAfee Security for Microsoft SharePoint package using the Master Repository page. 1 Log on to the ePolicy Orchestrator server as an administrator. 2 Click Menu | Software | Master Repository.
Integration with McAfee ePolicy Orchestrator 4.5 This chapter describes how to configure and manage McAfee Security for Microsoft SharePoint using McAfee ePolicy Orchestrator management software version 4.5. To use this chapter effectively, you need to be familiar with ePolicy Orchestrator 4.5. McAfee ePolicy Orchestrator 4.5 provides a scalable platform for centralized policy management and enforcement on your McAfee security products and systems on which they reside.
Integration with McAfee ePolicy Orchestrator 4.5 Deploying McAfee Security for Microsoft SharePoint using ePolicy Orchestrator 4.5 Installing Extensions Installing McAfee Security for Microsoft SharePoint on Managed Nodes Checking in the McAfee Security for Microsoft SharePoint Package to ePolicy Orchestrator 4.5 You can check in McAfee Security for Microsoft SharePoint package using the Master Repository page of ePolicy Orchestrator 4.5.
Integration with McAfee ePolicy Orchestrator 4.5 Sending an Agent Wake-up Call 6 In Configuration, select Windows as Target Platforms, McAfee Security for Microsoft SharePoint 2.5.0 as Products and components, and Install as Action, then click Next. NOTE: If you are using Microsoft Office SharePoint Server 2007 or SharePoint 2010, please type the credentials for the system that has the SharePoint server installed in ePolicy Orchestrator command line.
Integration with McAfee ePolicy Orchestrator 4.5 Setting Policies using ePolicy Orchestrator 4.5 Setting Policies using ePolicy Orchestrator 4.5 ePolicy Orchestrator 4.5 allows you to enforce policies across multiple managed nodes. These policies override configurations set individually on nodes. For information regarding policies and how they are enforced, see the McAfee ePolicy Orchestrator product documentation. You can create, edit, delete, or assign a policy to a specific group/system.
Integration with McAfee ePolicy Orchestrator 4.5 Scheduling an On-Demand Scan Task 7 Configure settings for detected items, user interface preferences, diagnostics, DAT, and user (on-access scanner), then click Save. TIP: For option definitions, click ? in the ePolicy Orchestrator user interface. 8 Click Save. Enforcing Policies Using ePolicy Orchestrator 4.5, you can enforce a policy to multiple managed nodes within a group. 1 Log on to the ePolicy Orchestrator server as an administrator.
Integration with McAfee ePolicy Orchestrator 4.5 Scheduling an On-Demand Scan Task 6 In Choose what to scan, type the Web Application Name and Target Folder Path and click >> to move the folder(s) to Folders to scan. Example 1: Web Application Name — SharePoint - 80 Target Folder Path — http://hostname/default/foldername Example 2: Web Application Name — STS_WFESPS2003 Target Folder Path — / NOTE: Select SharePoint 2003 to specify the scan target folder path.
Integration with McAfee ePolicy Orchestrator 4.5 Configuring Reports 9 Select one of the following options: • Off — To schedule a normal on-demand scan task without resumable and incremental scan options. • Resumable Scanning — To save the last scan so that it can resume from where it has stopped, when started later. You can also select the option Restart scan if DAT changed so that, in the event of a DAT update, the scan can be restarted with the updated DATs.
Integration with McAfee ePolicy Orchestrator 4.5 Configuring Reports Running a Query Creating a New Query 1 Log on to the ePolicy Orchestrator server as an administrator. NOTE: If the pre-defined queries on the left side do not serve your purpose, ePolicy Orchestrator enables you to create your own queries. 2 Click Reporting | New Query. The Result Type page appears. 3 On the left pane, select a data type that the query should retrieve, then click Next. The Chart page appears.
Integration with McAfee ePolicy Orchestrator 4.5 Uninstalling McAfee Security for Microsoft SharePoint using ePolicy Orchestrator 4.5 Uninstalling McAfee Security for Microsoft SharePoint using ePolicy Orchestrator 4.5 You can remove the product package and extensions from ePolicy Orchestrator 4.5 and uninstall McAfee Security for Microsoft SharePoint from the managed nodes. Tasks Removing the McAfee Security for Microsoft SharePoint Package from ePolicy Orchestrator 4.
Integration with McAfee ePolicy Orchestrator 4.5 Uninstalling McAfee Security for Microsoft SharePoint using ePolicy Orchestrator 4.5 7 Schedule the task to run immediately or as required, then click Next to view a summary of the task. 8 Click Save, then send an agent wake-up call. TIP: Refer to the Sending an Agent Wake-up Call section for instructions. 68 McAfee Security for Microsoft SharePoint version 2.
Appendix A — A Typical Scenario of Creating and Using File Filtering Rule and Actions This section provides a real-time scenario where you might want to create a file filtering rule in Shared Resource and use this rule to specify actions such as notify the administrator, log, and quarantine all Microsoft PowerPoint files being uploaded to your SharePoint server. Task 1 From Policy Manager, click Shared Resource. The Shared Resources page appears. 2 Click the Filter Rules tab.
Appendix A — A Typical Scenario of Creating and Using File Filtering Rule and Actions • To select more than one subcategory, use Ctrl+Click or Shift+Click. • To select all of the subcategories, select All. • To undo selections in subcategories, click Clear selections. 11 Click Save, then Apply to return to the Shared Resources page. 12 From Policy Manager, a submenu item On-Access or On-Demand. The policy page for the selected submenu item appears. 13 Click on a policy, then click File Filtering.
Appendix B — Recommended Configurations This section gives some recommendations you can follow to configure and use your McAfee Security for Microsoft SharePoint software effectively. • Enable the anti-virus settings for on-access policy. • Select the Quarantine option always so that you can retrieve your files later when required. • Time for retrieving the SharePoint anti-virus settings on McAfee Security for Microsoft SharePoint dashboard must be less. Default value is 5.
Index A action taken 22 activation 29, 33, 39, 40 add application pools 50 add scanner/filter 28 Add/Remove Programs 16 advanced 30 advanced view 25, 26 adware 30 agent wake-up call 54, 61 send 54, 61 alert editor 34 alert name 34 alert selection 35 alert settings 27, 40, 43 alerts 41, 42 all dates 22, 24, 48 all items 24 allow through 50 anti-alias 46 anti-virus scanner 29 appendix file filter rule 69 arent policy 26 Artemis technology 6 av settings 50 B banned file types 8, 22 banned file types/messages
Index ePolicy Orchestrator 4.
Index pie angle 46 pie-chart 19 policies ePolicy Orchestrator 4.0 54 ePolicy Orchestrator 4.5 62 policy enforcement ePolicy Orchestrator 4.