[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 851
  • Last Modified:

Deploying McaFee Vulnerability Manager 7

Hi Experts,

Can anyone provide me with a step by step doc in how to deploy McAfee Vulnerability Manager 7 on Windows 2008 R2 servers?

Thank you in advance
0
Jerry Seinfield
Asked:
Jerry Seinfield
  • 2
1 Solution
 
Andrew Hancock (VMware vExpert / EE MVE^2)VMware and Virtualization ConsultantCommented:
System Requirements

Vulnerability Manager Software
Deploy Vulnerability Manager as software on your own hardware or in a virtualized environment. Software deployment has the following minimum requirements:

    Hardware
        CPU: x86 multi-core, 2 GHz or higher (quad-core recommended)
        RAM: 2 GB minimum (4 GB recommended)
        Disk space: 80 GB minimum (200 GB for database)
    Virtual host
        VMware Virtual Infrastructure 3, vSphere (ESX/ESXi)
        VMware Workstation
    Operating system
        Microsoft Windows 2003 Server (32-bit) with Service Pack 2 (SP2) or higher
    Database
        Microsoft SQL Server 2005 with SP2 or higher (any edition)
        All SQL hotfixes and patches


Tutorials:- Quick Tip: Vulnerability Manager Web Application Assessment Module

http://www.mcafee.com/us/resources/tutorials/vulnerability-manager-waam-quicktips-video.html

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Quick Tips for Vulnerability Manager (formerly McAfee Foundstone Enterprise)

This collection of Quick Tips videos details some of the key features of McAfee Vulnerability Manager, including custom reports, asset discovery, and remediation workflow.

http://www.mcafee.com/us/resources/tutorials/vulnerability-manager-quicktips-video.html
0
 
Jerry SeinfieldAuthor Commented:
Any other comments?
0
 
Jerry SeinfieldAuthor Commented:
I was looking for a PDF or doc file in how to deploy this tool rather than videos

Thanks
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now