Product guide
file integrity monitoring (continued)
apply a policy to systems 65
baselines 60
built-in query reports 67
compare file versions 62, 65
concept 59
configuring number of versions stored 61
create a policy 63
entitlement reporting 62
excluding paths and files 60
file information monitored 60
file validation 60
file versions 61
frequency 59
including paths and files 60
purge events 62, 66
reset baseline 67
wildcard characters 60
file version comparison 62, 65
file versions, file integrity monitoring 61
findings
violations 42
Findings results, hide and unhide 75
Findings, enhancements
hide or unhide Findings results 75
import third-party Findings content 75
Findings, information
compliant 74
incomplete 74
violations 74
Findings, settings
creating an audit 75
Findings data retention 75
threads for Findings processing 75
violation limit 75
Findings, types of violations
actual and expected values 74
instance data 74
positive feedback 74
flat scoring model, Policy Auditor 50
flat unweighted scoring model, Policy Auditor 50
frequency (how often data is gathered) 40
H
hide Findings results 75
I
installation repair
Policy Auditor 37, 38
M
Maintain Foundstone audits server tasks 28
managed systems, Policy Auditor 14
McAfee ServicePortal, accessing 9
O
OVAL
export audit results 47
use in audits 39
OVAL implementation 90
P
per audit data maintenance 40
permission sets, Policy Auditor
default 19
edit 21
how they work 18
Policy Auditor
activate benchmarks 42
agent plug-in, concept 22
components installed 12
Data Collection Scan 28
import Asset Discovery Scan results 28
using ePolicy Orchestrator features 13
Vulnerability Manager ePO Extension 28
Vulnerability Manager integration 27
Policy Auditor agent plug-in
about 12
agent-server communication 25
concept 22
deploying 24
managing content 24
overview 22
supported platforms 22
uninstall 25
Policy Auditor permission sets
default 19
edit 21
how they work 18
Policy Auditor Product Guide audience 8
Policy Auditor server settings
edit 18
what they control 16
Policy Auditor, dashboards
default provided by Policy Auditor 77
PA:Compliance Summary dashboard 80
PA:MS Patch Status Summary dashboard 80
PA:Operations 80
PA:PCI Summary 81
queries as dashboard monitors 82
Policy Auditor, file integrity monitoring
accept events 62, 66
apply a policy to systems 65
baselines 60
built-in query reports 67
compare file versions 62, 65
configuring number of versions stored 61
create a policy 63
entitlement reporting 62
excluding paths and files 60
file information monitored 60
file validation 60
file versions 61
including paths and files 60
purge events 62, 66
reset baseline 67
wildcard characters 60
Policy Auditor, rollup reporting
built-in rollup reports 71
configure 72
rollup capabilities 68
Rollup Data - PA:Audit Benchmark Results 69
Rollup Data - PA:Audit Patch Check Result 71
Rollup Data - PA:Audit Rule Result 70
rollup reporting considerations 68
rollup server tasks 69
Policy Auditor, waivers
deleting 57
exception waivers 52
Index
95McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6