Red Hat NETWORK 4.0.5 - CHANNEL MANAGEMENTT GUIDE Guide d'installation

Naviguer en ligne ou télécharger Guide d'installation pour Logiciel de base de données Red Hat NETWORK 4.0.5 - CHANNEL MANAGEMENTT GUIDE. Red Hat NETWORK 4.0.5 - CHANNEL MANAGEMENTT GUIDE Installation guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - Installation Guide

McAfee Policy Auditor 5.2.0Installation Guide

Page 2

NotesAgentless auditing systemMcAfee Vulnerability Manager 6.8 • Works with the ePolicy Orchestrator 4.0 Patch 5environment and the ePolicy Orchestrat

Page 3 - Contents

Policy Auditor database considerationsUsing Policy Auditor with a databaseYou need to install a database before you install Policy Auditor. If no data

Page 4 - Introduction

NotesRequirementsDatabaseYou must acquire and install .NET Framework 2.0 SP2.SQL Server 2005Express• .NET Framework 2.0• .NET Framework 2.0Service Pac

Page 5 - KnowledgeBase

SQL Server• Dedicated server and network connection — Use a dedicated server and networkconnection if managing more than 5,000 client computers.• SQL

Page 6 - Product installation overview

Windows agent plug-in requirementsHardware and network requirements• Processor — Intel Pentium-class, Celeron, or compatible processor; 166 MHz proces

Page 7

Distributed repositories• Free disk space — 100 MB on the drive where the repository is stored.• Memory — 256 MB minimum.Common Criteria consideration

Page 8 - Domain controllers

employing ePolicy Orchestrator authentication only. McAfee is recommends that the networkIT administrator assign passwords that meet the following req

Page 9 - Agentless audit support

Installation of McAfee Policy AuditorThis chapter provides instructions for installing the Policy Auditor extension on a system whereePolicy Orchestra

Page 10

1 Stop these ePolicy Orchestrator services, then change their startup type to Manual.• McAfee ePolicy Orchestrator Application Server.• McAfee ePolicy

Page 11

9 Verify that all information is correct, then start the installation.10 When the installation is complete, click Finish.NOTE: After installing Policy

Page 12

COPYRIGHTCopyright © 2008 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrie

Page 13 - Browsers supported

3 Follow the instructions in the Setup and the documentation for Foundstone ePO DataIntegration Extension to complete the installation.Policy Auditor

Page 14 - System Requirements

IndexAagent plug-in, supported platforms 8AIX 5.3 and 6.1, supported operating systems 14Bbrowsers supported 13bypass proxy for browsers 13Ccommon cri

Page 15 - Distributed repositories

WWindows agent plug-in requirements 14McAfee Policy Auditor 5.2.0 Installation Guide22Index

Page 16

ContentsIntroduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 17

IntroductionThis guide describes installing McAfee®Policy Auditor 5.2.0 for use with ePolicy Orchestrator®version 4.0 Patch 5, or version 4.5. The Set

Page 18 - Installing Policy Auditor on

• Analyzing the system for the presence of the specified machine state (vulnerability,configuration, patch state, and so on).• Reporting the results o

Page 19

• Compliant — A message displayed when the system complies with the audit.• Incomplete — A message displayed when the results gathered are not complet

Page 20 - Policy Auditor configuration

System RequirementsBefore you install McAfee Policy Auditor, verify that each component meets the minimum systemrequirements.Server requirementsPolicy

Page 21

• Windows Server 2003 Web with Service Pack 2 or later• Windows Server 2003 R2 Enterprise with Service Pack 2 or later• Windows Server 2003 R2 Standar

Page 22

NotesOther processorsX64 supportX86 supportOperating systemNative 32- and 64-bitagentXXWindows XPProfessionalNative 32- and 64-bitagentXXWindows Serve

Commentaires sur ces manuels

Pas de commentaire