Solved

Deploying McaFee Vulnerability Manager 7

Posted on 2011-09-21
3
822 Views
Last Modified: 2013-12-09
Hi Experts,

Can anyone provide me with a step by step doc in how to deploy McAfee Vulnerability Manager 7 on Windows 2008 R2 servers?

Thank you in advance
0
Comment
Question by:Jerry Seinfield
  • 2
3 Comments
 
LVL 118

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 500 total points
ID: 36576395
System Requirements

Vulnerability Manager Software
Deploy Vulnerability Manager as software on your own hardware or in a virtualized environment. Software deployment has the following minimum requirements:

    Hardware
        CPU: x86 multi-core, 2 GHz or higher (quad-core recommended)
        RAM: 2 GB minimum (4 GB recommended)
        Disk space: 80 GB minimum (200 GB for database)
    Virtual host
        VMware Virtual Infrastructure 3, vSphere (ESX/ESXi)
        VMware Workstation
    Operating system
        Microsoft Windows 2003 Server (32-bit) with Service Pack 2 (SP2) or higher
    Database
        Microsoft SQL Server 2005 with SP2 or higher (any edition)
        All SQL hotfixes and patches


Tutorials:- Quick Tip: Vulnerability Manager Web Application Assessment Module

http://www.mcafee.com/us/resources/tutorials/vulnerability-manager-waam-quicktips-video.html

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Quick Tips for Vulnerability Manager (formerly McAfee Foundstone Enterprise)

This collection of Quick Tips videos details some of the key features of McAfee Vulnerability Manager, including custom reports, asset discovery, and remediation workflow.

http://www.mcafee.com/us/resources/tutorials/vulnerability-manager-quicktips-video.html
0
 

Author Comment

by:Jerry Seinfield
ID: 36576428
Any other comments?
0
 

Author Comment

by:Jerry Seinfield
ID: 36576478
I was looking for a PDF or doc file in how to deploy this tool rather than videos

Thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This Micro Tutorial steps you through the configuration steps to configure your ESXi host Management Network settings and test the management network, ensure the host is recognized by the DNS Server, configure a new password, and the troubleshooting…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now