Solved

Setting exclusions in McAfee

Posted on 2009-07-01
3
789 Views
Last Modified: 2013-12-09
Hi All

We are running McAfee 8.5i clients and EPO 4.0. Let's say the default on-access scan policy is to scan everything.

I have a server that needs exclusions set. I guess I can either:

i) create a container in the EPO console, apply a policy that has these exclusions, then move the server to the container
ii) set the exclusions on the server

Is one method preferred over the other?

Cheers
Dilan
0
Comment
Question by:kam_uk
  • 2
3 Comments
 
LVL 16

Accepted Solution

by:
legalsrl earned 500 total points
ID: 24761012
Morning Dilan

If it's just one machine, then I would create a new policy with the exclusions and then assign that policy to the single machine.  You can do this from within the machine details page from within Systems

If it's more than one machine, I would create the container and assign the policy to the container

If you only set the exclusions on the server, then each time the McAfee agent enforces the policies, then you will need to reset them

Does that make sense ?

Cheers
Si
0
 
LVL 3

Author Comment

by:kam_uk
ID: 24761418
Hello

"If you only set the exclusions on the server, then each time the McAfee agent enforces the policies, then you will need to reset them"

How often does the McAfee agent 'enforce' the policies? I'm not sure  by what you mean by enforcing them?

Thanks for the advise!
0
 
LVL 16

Expert Comment

by:legalsrl
ID: 24761432
No worries :-)

The ePO Agent normally enforces policies every 5 minutes, so if you set a manual exclusion on the client, ePO will override it with it's policy settings every 5 mins

Cheers
Si
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question