Solved

McAfee non-compliance report

Posted on 2008-10-11
1
543 Views
Last Modified: 2013-12-09
Hello everyone

We are using McAfee for our AV protection, using EPO 3.6

I am worried about 'rogue' machines on our network without anti-virus clients.

Is there a way to run a report to find machines without a McAfee client?
0
Comment
Question by:bruce_77
1 Comment
 
LVL 16

Accepted Solution

by:
legalsrl earned 500 total points
ID: 22697401
Hiya

Why don't you use Rogue System Detection ?

It's built in to 3.6.1

Thanks
Simon
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
I need to purchase BitCoins 4 111
latest list of viruses / malware signatures for F-Secure 5 74
bit defender blocks good applications 2 93
Dealing with Locky ransomware... 13 106
Change your password...do it now!. Probably the easiest point of access to your account is through guessing your password. If your password is guessable, do change it now. If not for your sake but for everyone else in your friends list. Remember …
PREFACE The purpose of this guide is to provide information to successfully install the MS SQL client tools for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technology…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

805 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question