Solved

Deploying McaFee Vulnerability Manager 7

Posted on 2011-09-21
3
819 Views
Last Modified: 2013-12-09
Hi Experts,

Can anyone provide me with a step by step doc in how to deploy McAfee Vulnerability Manager 7 on Windows 2008 R2 servers?

Thank you in advance
0
Comment
Question by:Jerry Seinfield
  • 2
3 Comments
 
LVL 117

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 500 total points
ID: 36576395
System Requirements

Vulnerability Manager Software
Deploy Vulnerability Manager as software on your own hardware or in a virtualized environment. Software deployment has the following minimum requirements:

    Hardware
        CPU: x86 multi-core, 2 GHz or higher (quad-core recommended)
        RAM: 2 GB minimum (4 GB recommended)
        Disk space: 80 GB minimum (200 GB for database)
    Virtual host
        VMware Virtual Infrastructure 3, vSphere (ESX/ESXi)
        VMware Workstation
    Operating system
        Microsoft Windows 2003 Server (32-bit) with Service Pack 2 (SP2) or higher
    Database
        Microsoft SQL Server 2005 with SP2 or higher (any edition)
        All SQL hotfixes and patches


Tutorials:- Quick Tip: Vulnerability Manager Web Application Assessment Module

http://www.mcafee.com/us/resources/tutorials/vulnerability-manager-waam-quicktips-video.html

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Quick Tips for Vulnerability Manager (formerly McAfee Foundstone Enterprise)

This collection of Quick Tips videos details some of the key features of McAfee Vulnerability Manager, including custom reports, asset discovery, and remediation workflow.

http://www.mcafee.com/us/resources/tutorials/vulnerability-manager-quicktips-video.html
0
 

Author Comment

by:Jerry Seinfield
ID: 36576428
Any other comments?
0
 

Author Comment

by:Jerry Seinfield
ID: 36576478
I was looking for a PDF or doc file in how to deploy this tool rather than videos

Thanks
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
Teach the user how to install log collectors and how to configure ESXi 5.5 for remote logging Open console session and mount vCenter Server installer: Install vSphere Core Dump Collector: Install vSphere Syslog Collector: Open vSphere Client: Config…
This video shows you how easy it is to boot from ISO images for virtual machines with the ISO images stored on a local datastore on the ESXi host.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now