Difference between revisions of "MEC"
(→Features) |
|||
Line 8: | Line 8: | ||
=Features= | =Features= | ||
McAfee Application Control, please refer to [[MAC w/o ePO#Features|McAfee Application Control Features]] <br> | McAfee Application Control, please refer to [[MAC w/o ePO#Features|McAfee Application Control Features]] <br> | ||
− | McAfee Change Control: | + | McAfee Change Control: Change Control allows you to monitor and prevent changes to the file system, registry, and user accounts. You can view details of who made changes, which files were changed, and when and how the changes were made. You can write protect critical files and registry keys from unauthorized tampering. You can read protect sensitive files. To ease maintenance, you can define trusted programs or users to allow updates to protected files and registry keys |
=Supported Operating Systems= | =Supported Operating Systems= | ||
=Documents= | =Documents= |
Revision as of 08:21, 31 May 2016
Overview
McAfee Embedded Control (MEC) blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including retail, medical and gaming devices, industrial control systems, office equipment, automotive, and military and aerospace devices. It provides simple, lightweight embedded antivirus technology to make devices resilient to malware attacks.
- Viable security for fixed-function and legacy systems, including point-of-service terminals, ATMs, and medical imaging systems.
- Low-overhead footprint does not impact system performance and is equally effective in standalone mode, without network access. McAfee Embedded Control runs transparently on systems.
- Continuous change detection prevents unauthorized, out-of-policy changes, and supports compliance standards, including PCI, SOX, and healthcare and energy industry requirements.
Features
McAfee Application Control, please refer to McAfee Application Control Features
McAfee Change Control: Change Control allows you to monitor and prevent changes to the file system, registry, and user accounts. You can view details of who made changes, which files were changed, and when and how the changes were made. You can write protect critical files and registry keys from unauthorized tampering. You can read protect sensitive files. To ease maintenance, you can define trusted programs or users to allow updates to protected files and registry keys