?
Solved

McAfee ePo 4.6.6 Export Policies and Audit Settings

Posted on 2013-11-14
5
Medium Priority
?
4,183 Views
Last Modified: 2013-11-18
I start at my company six months ago and took over there ePo 4.6.6 enviroment which wasn't documented.

Here are my questions.
1) Is it possible to run a report to view all active policies and there settings to make sure they meet the companie security requirements.

2) Is it possible to export the policies not McAfee groups into a test enviroment which runs a seperate server?

In a nutshell I am trying to find the best way to audit / view all current policies and a way to keep our test epo enviromen semi in sync policy wise
0
Comment
Question by:compdigit44
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 39650564
1) yes, it is called "Policy Catalog", pick ones that have reference count >0
2) yes, but it does not migrate to new version that way
0
 
LVL 64

Expert Comment

by:btan
ID: 39651034
Also best practices, can catch
- Main section on
a) "Managing endpoint security with policies and packages"
> By default all policies are inherited from the "My Organization" level, the highest point in the System Tree. This means all policies for all products flow downward into the groups and subgroups below it. Always set your policies at the My Organization level and let your policies flow downward. Probably from the "Menu | Policy | Policy Catalog", you can catch more of the overall Agent policy deployed to various assets/groups

b) "Reporting on your managed environment with Queries"
> The Query Builder and Report Builder creates and runs queries and reports that result in user-configured data in user-configured charts and tables. The data for these queries and reports can be obtained from any registered internal or external database in your ePolicy Orchestrator system.
> also on "Creating custom event queries" fro managed systems

http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/23000/PD23051/en_US/epo_450_best_practices_guide_en-us.pdf.pdf?searchid=1384520006363

also  - Settings for an existing policy are overwritten by an imported policy in ePO 4.x
https://kc.mcafee.com/corporate/index?page=content&id=KB71780&actp=search&viewlocale=en_US&searchid=1384520006363

and for DLP policy - https://kc.mcafee.com/corporate/index?page=content&id=KB60758&actp=search&viewlocale=en_US&searchid=1384520006363

including
- How to migrate ePO from a 32-bit system to a 64-bit system (or to a different installation path)
https://kc.mcafee.com/corporate/index?page=content&id=KB71078
 - How to back up the ePO databases using OSQL commands
https://kc.mcafee.com/corporate/index?page=content&id=KB59562
- How to back up and restore the ePO database using SQL Server Management Studio
https://kc.mcafee.com/corporate/index?page=content&id=KB52126


Another ref worth looking is from commoncriteria portal - see the section 7 on "TOE
Summary Specification", specifically for policy, see "7.3.8 Product Policy Management" and "7.3.11 Benchmark Management"

http://www.commoncriteriaportal.org/files/epfiles/st_vid10484-st.pdf
0
 
LVL 20

Author Comment

by:compdigit44
ID: 39652025
thank you for the replies. I am not the greatest at ePO but learning. I do know wht policy catalog stores all of the policies for ePO. What I am looking for is a way to dump all active policies to a spread sheet or another format so I can view the setting of all policies at once.

i am asking this question because my manager asked me to produce a report for all active polices in ePO and there settings.
0
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 39652643
0
 
LVL 20

Author Comment

by:compdigit44
ID: 39656775
thanks, it to bad McAfee doesn have a tool that could do this....
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
Check out the latest tech news, community articles, and expert highlights in August's newsletter.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question