Setup guide
    McAfee ePO
Advanced Suite Installer Product Guide 
McAfee ePO
Advanced Suite Installer    Page 13 
1 Click the System Tree button on the favorites bar. 
2 Highlight the SQL Servers group. 
3 Click the Assigned Policies tab. 
4 From the Product drop-down menu, select VirusScan Enterprise 8.8.0.
5 On the line that lists On-Access Default Processes Policies, click Edit Assignment. 
6 For Inherit from, select Break inheritance and assign the policy and settings below. 
7 From the Assigned Policy drop-down menu, select EASI – Default: MS SQL Servers. 
8 Click Save. 
Follow these steps to assign the Low-Risk Processes Policy to the SQL Servers group.  
1 Click the System Tree button on the favorites bar. 
2 Highlight the SQL Servers group. 
3 Click the Assigned Policies tab. 
4 From the Product drop-down menu, select VirusScan Enterprise 8.8.0.
5 On the line that lists On-Access Low-Risk Processes Policies, click Edit Assignment. 
6 For Inherit from, select Break inheritance and assign the policy and settings below. 
7 From the Assigned Policy drop-down menu, select EASI – Low: MS SQL Servers. 
8 Click Save. 
Here’s another way of looking at the type of policies you just assigned.  
•  A Low Risk Processes policy has process exclusions specific to the system type to which it is 
being deployed. In other words, VirusScan might scan little or nothing for a select group of low-
risk processes as configured, such as sqlserver.exe and sqlwriter.exe. 
•  A Default Processes policy has common file & directory exclusions specific to the system type to 
which it is being deployed. File reads and writes by any process not classified as Low-Risk will 
trigger normal file scanning, except on the database and other key files and directories, i.e., your 
standard AV exclusions. 
Quick Tip: Standard desktops and file servers might use a Default-only policy, as process exclusions 
are not typically required. You can get additional information on Risk-Based Scanning from the McAfee 
Knowledgebase articles 
KB55139 and KB66036, and the McAfee Quick Tips video What is Risk Based 
Scanning?.  
Host IPS policies 
Please note that McAfee Host IPS has two main components: kernel-level IPS protection and a firewall. 
The McAfee EPS suite contains the firewall only, while the EPA suite contains both components. If you 
are evaluating the EPS suite, skip to the section entitled Host IPS Firewall.
The main function of McAfee Host IPS is to protect systems against known and unknown attacks. This is 
often achieved without an update to the software, by use of patented buffer overflow and other 
behavioral protection. It has the additional benefit reducing the urgency and frequency of patching by 
protecting vulnerabilities from exploit even before a patch has been applied. Consider the time spent on 
patching within your organization. By deploying Host IPS, many of those vulnerabilities would be 
protected from exploit, allowing you to patch on a more reasonable schedule. For example, McAfee Host 
IPS protected against 60% of all exploits against Microsoft vulnerabilities, and nearly 75% of all exploits 
against Adobe vulnerabilities, disclosed between 2006 and 2011. Also consider the Host IPS ability to 
protect systems against exploit on those occasions when a new vulnerability exists but the corresponding 
patch is not yet available.  










