MAC w/ ePO

From ESS-WIKI
Jump to: navigation, search

Overview

Today’s IT departments face tremendous pressure to ensure that their endpoints comply with many different security policies, operating procedures, corporate IT standards, and regulations. Extending the viability of fixed function devices such as point‑of‑sale (POS) terminals, customer service terminals, and legacy Windows NT platforms has become critical.
Application Control uses dynamic whitelisting to ensure that only trusted applications run on devices, servers and desktops. This provides IT with the greatest degree of visibility and control over clients, and helps enforce software license compliance. Here are some product features.

  • Protects your organization against malware attacks before they occur by proactively controlling the applications executing on your desktops, laptops, and servers.
  • Locks down the protected endpoints against threats and unwanted changes, with no file system scanning or other periodic activity that could impact system performance.
  • Augments traditional security solutions and enables IT to allow only approved system and application software to run. Blocks unauthorized or vulnerable applications that may compromise endpoints without imposing operational overhead. This ensures that end‑users cannot accidentally introduce software that poses a risk to the business.
  • Uses dynamic whitelisting to ensure that only trusted applications run on devices, servers, and desktops. McAfee’s dynamic whitelisting trust model eliminates the labor and cost associated with other whitelisting technologies, thereby reducing overhead and increasing continuity.
  • Provides IT control over endpoints and helps enforce software license compliance. With Application Control, IT departments can eliminate unauthorized software on endpoints, while providing employees greater flexibility to use the resources they need to get their jobs done.
  • Eliminates the need for IT administrators to manually maintain lists of approved applications. This enables IT departments to adopt a flexible approach where a repository of trusted applications can run on endpoints. This prevents execution of all unauthorized software scripts and dynamic link libraries (DLLs), and further defends against memory exploits.
  • Works effectively when integrated with McAfee ePO and in standalone mode without network access. The product is designed to operate in a variety of network and firewall configurations.
  • Runs transparently on endpoints. It can be set up quickly with very low initial and ongoing operational overhead and minimal impact on CPU cycles.

Features

ePO : ePolicy-Orchestrator McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.

  • Get a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks.
  • Simplify security operations with streamlined workflows for proven efficiencies.
  • Flexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.
  • Leverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.

For MAC features, Please refer to: MAC w/o ePO Features

Supported Operating Systems

For client system please refer to: MAC w/o ePO Version & Supported Operating Systems
For ePO server:

Operating System ePO 5.1.0 ePO 5.3.0
Windows Server 2008 x64 Y Y
Windows Server 2008 R2 Y Y
Windows Server 2012 Y Y
Windows Server 2012 R2 Y Y

Documents

Quick Start Guides

Item Document Download
1 McAfee ePO install introduction 1 Download
2 McAfee ePO install introduction 2 Download
3 MAC w/ePO Download