McAfee FIREWALL 2.10 Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Hardwarové brány firewall McAfee FIREWALL 2.10. McAfee FIREWALL 2.10 Product guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 75
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Product Guide
McAfee Endpoint Protection for Mac
2.1.0
Zobrazit stránku 0
1 2 3 4 5 6 ... 74 75

Shrnutí obsahu

Strany 1 - Product Guide

Product GuideMcAfee Endpoint Protection for Mac2.1.0

Strany 2 - License Agreement

Threat category Potential threatBotnet breakdowns Infects your system or network and controls it from remotely to spreadmalware.Network threat Slows d

Strany 3 - Contents

• Regular mode — When the network packet adheres to a rule’s condition, the associated actiondefined in the rule is executed. If no matching rule is f

Strany 4

Desktop firewall• Regular mode — When the network packet adheres to a rule’s condition, the associated actiondefined in the rule is executed. If no ma

Strany 5 - Index 73

General• Self protection — Allows ePolicy Orchestrator administrators to enable password protection in theclient interface to prevent local users from

Strany 6

1IntroductionProduct features14McAfee Endpoint Protection for Mac 2.1.0 Product Guide

Strany 7 - About this guide

2Installation and deploymentInstall McAfee Endpoint Protection for Mac on a standalone (unmanaged) Mac, or deploy from ePolicyOrchestrator on a manage

Strany 8 - Find product documentation

Package contentsThe software package contains these files that are necessary for installation.Package DescriptionEPM<version>‑<release‑type&g

Strany 9

4Type the following command, then press return.sudo installer -pkg EPM<version>‑<release‑type>‑<build‑number> .pkg –target /5Type th

Strany 10 - Desktop firewall

• McAfee Security for Mac 1.1 and later to McAfee Endpoint Protection for Mac 2.1When the software is upgraded, only the Anti-malware and Application

Strany 11 - Product features

Default settingsOnce installed, McAfee Endpoint Protection for Mac starts protecting the Mac immediately based on thedefault configurations defined. R

Strany 12 - Interface

COPYRIGHTCopyright © 2013 McAfee, Inc. Do not copy without permission.TRADEMARK ATTRIBUTIONSMcAfee, the McAfee logo, McAfee Active Protection, McAfee

Strany 13 - Introduction

Desktop FirewallFeature Default settingsDesktop firewall• Regular Mode — Enabled• Trust Local Subnet — SelectedFor default firewall rules, see Desktop

Strany 14

Task DescriptionAnti-malwareprotectionMcAfee Endpoint Protection for Mac comes with the default settings foranti-malware protection. Verify that the d

Strany 15 - Installation and deployment

TaskFor option definitions, click ? in the interface.1Log on to the ePolicy Orchestrator as an administrator.2Click Menu, Software, then click Softwar

Strany 16 - Package contents

Install the extensions manuallyInstall McAfee Endpoint Protection for Mac extensions using ePolicy Orchestrator.You must install these extensions to e

Strany 17 - Upgrade the software

Test the installationWhen you have completed the installation, we recommend that you test it to make sure that thesoftware is installed properly and c

Strany 18

4Click to prevent further changes.5From the Dock, click Finder, Go | Applications | then double-click iTunes to display this message. For more info

Strany 19 - Default settings

7In the Transport Protocol section, select All Protocols.8Open the browser, type the website name, then press return.Make sure no McAfee ePO rule allo

Strany 20 - Application Protection

Remove the software from a managed MacRemove McAfee Endpoint Protection for Mac from the managed Mac and remove the extensions fromthe ePolicy Orchest

Strany 21

Remove the software extensionsRemove the McAfee Endpoint Protection for Mac extensions from the ePolicy Orchestrator server.Remove only the extensions

Strany 22 - Check in the package manually

3Using the software on a standalone MacYou can use the McAfee Endpoint Protection for Mac console to view the dashboard, events details, thehistory of

Strany 23 - Orchestrator

ContentsPreface 7About this guide ... 7Audience ... 7Conventions ...

Strany 24 - Test the installation

•Application Protection•Desktop FirewallRecent events summaryYou can view the summary of recent five events in Dashboard.The events summary includes:•

Strany 25

Quarantine malwareThe quarantine feature isolates dangerous or suspicious malware that could harm your Mac otherwise.To view the quarantined items, fr

Strany 26 - Uninstall the software

Perform a system scanPerform an on-demand scan on specific files, folders, and local or network-mounted volumesimmediately.Task1Click the McAfee menul

Strany 27 - Remove the software

6In the When to scan section, select a schedule for the scan task, then click Schedule Scan.• Immediately — Starts a scan task immediately. If you sel

Strany 28

3Using the software on a standalone MacConfigure custom scan tasks34McAfee Endpoint Protection for Mac 2.1.0 Product Guide

Strany 29 - Dashboard

4Configuring protection preferences on astandalone MacUse McAfee Endpoint Protection for Mac preferences to enable or disable anti-malware, applicatio

Strany 30 - History of events

• Application Protection — Define rules for applications, to run with full network access, restrictednetwork access, or deny application execution.• D

Strany 31 - Quarantine malware

• Delete — To delete the item that contains spyware.• Notify — To notify you when spyware is detected. No other action is taken.7From the Also scan dr

Strany 32 - Configure custom scan tasks

6From the Also scan drop-down list, select where you want to enable scanning:•Archives & Compressed Files•Apple Mail Messages•Network VolumesWhen

Strany 33 - Modify an existing scan task

On-demand scan preferences• Always enable the scan for Archives & Compressed Files while performing on-demand scan. This isrecommended because you

Strany 34

Remove or restore the quarantined item ... 31Update the anti-malware and DAT files ... 31Perform a system s

Strany 35 - General preferences

3On the Rules tab, you can:• Select or deselect Allow All Apple Signed Binaries.• Select Allow, Deny, or Prompt from the Unknown/Modified Applications

Strany 36

Modify an existing application protection ruleYou can modify the existing application protection rule's definition that is in force, according to

Strany 37

5From the list, add the path of the applications you want to exclude, then click Open.6Click to prevent further changes.To delete an exclusion, sele

Strany 38 - On-access scan preferences

Recommended application protection configuration• Add basic rules to allow or block certain applications based on the checklist prepared earlier. Duri

Strany 39

• FTP inspection — Desktop firewall automatically creates dynamic rules for FTP data connections,by actively monitoring the FTP commands on the contro

Strany 40

To change the desktop firewall protection from Regular mode to Adaptive mode, click | McAfeeEndpoint Protection for Mac Preferences | Desktop Firewa

Strany 41

To change the desktop firewall protection from Adaptive mode to Regular mode, click | McAfeeEndpoint Protection for Mac Preferences | Desktop Firewa

Strany 42

Desktop firewall monitors the PORT, EPRT, PASV, and EPSV commands on the control channel, anddetermines which dynamic rules must be created for subseq

Strany 43

How desktop firewall rules are organizedRules are categorized as ePO Rules, Client Rules, and Adaptive Rules.Rules are displayed in tree view. The ePO

Strany 44 - How stateful filtering works

• These rules allow the Mac to:• Obtain an IP address using DHCP.• Perform DNS queries.• Perform DAT updates.• Allow communication with ePolicy Orches

Strany 45

Run a query ...696 Troubleshooting 71Run the repairMSC utility ... 71Index 73ContentsMcAfee E

Strany 46 - How DNS blocking works

For thisfield...Configure these options...Rule NameType a name for the rule.Status• Enabled — To enable the firewall rule.• Disabled — To disable the

Strany 47

For thisfield...Configure these options...Network ProtocolIPv4Define the configuration for Local Mac using:•Single•Fully Qualified Domain Name•Subnet•

Strany 48

• Action — Allow • Select UDP, Local, then type the Port Noas 68• Direction — Outgoing • Select UDP, Remote, then type the PortNo as 67Create a rule t

Strany 49 - Create a firewall rule

• Allow outgoing for POP3, IMAP, SMTP• Allow outgoing for RDP• Allow outgoing for Idap• Allow bi-directional for AFP/SMB, if you are using file sharin

Strany 50

Configure an update scheduleConfigure the repository list that needs to be accessed to update the anti-malware, the proxyconnection settings, and the

Strany 51

4Select whether to use a proxy.•Do not use a proxy•Configure proxy settings manually5Select Use these settings for all proxy types to specify the same

Strany 52

4Configuring protection preferences on a standalone MacConfigure an update schedule56McAfee Endpoint Protection for Mac 2.1.0 Product Guide

Strany 53

5Managing the software with ePolicyOrchestratorIntegrate and manage McAfee Endpoint Protection for Mac using ePolicy Orchestrator managementsoftware.M

Strany 54 - Configure an update schedule

Configure these policies with your preferences, then assign them to groups of the managed Mac. Forgeneric information about policies, see the product

Strany 55

Create a self-protection policySelf-protection allows ePolicy Orchestrator administrators to enable password protection forpreferences in the client i

Strany 56

Contents6McAfee Endpoint Protection for Mac 2.1.0 Product Guide

Strany 57

4On the General tab of the policy page, select these options:• General policies controlling overall functioning of Anti-malware — To enable or disable

Strany 58 - Assign policies

In.. Define..On-demand Scanpolicies• Scan contents of Archives and compressed files — To scan archived and compressedfiles.• Scan Apple Mail Messages

Strany 59 - Create an anti-malware policy

TaskFor option definitions, click ? in the interface.1Log on to the ePolicy Orchestrator server as an administrator.2Click Menu | Systems | System Tre

Strany 60

5Define these parameters, then click Next.•Schedule status•Start time•Schedule type•Task runs according to•Effective period•Options6In the Summary pag

Strany 61

10Type the application name with its path, then click OK.For example, to exclude the application Calculator, type /Applications/Calculator.app in theN

Strany 62 - Schedule an on-demand scan

4Select the options, then click Save.From... Set these options...Firewall statusEnabled — To enable desktop firewall protection on managed Mac.• Regul

Strany 63

From.. Configure these options..Networkprotocol1Select• Any Protocol — To allow any IP Protocol.• IP Protocol — To select IPv4 Protocol.McAfee Endpoin

Strany 64 - Desktop firewall policy

3Click New Policy, type a name for the policy, then click OK.4On the Firewall Rules page, click New Group, type a name for the group, select Direction

Strany 65 - Create firewall rules

TaskFor option definitions, click ? in the interface.1Log on to the ePolicy Orchestrator server as an administrator.2From the Policy Catalog, select H

Strany 66

Queries and reportsRun predefined queries to generate reports, or modify them to generate custom reports.Query DisplaysEPM: Anti-malware ComplianceThe

Strany 67 - Create a DNS blocking policy

PrefaceThis guide provides the information you need for all phases of product use, from installation toconfiguration to troubleshooting.Contents Ab

Strany 68

5Managing the software with ePolicy OrchestratorQueries and reports70McAfee Endpoint Protection for Mac 2.1.0 Product Guide

Strany 69 - Queries and reports

6TroubleshootingIdentify and troubleshoot issues when using McAfee Endpoint Protection for Mac.Run the repairMSC utilityUse the repairMSC utility to t

Strany 70

6TroubleshootingRun the repairMSC utility72McAfee Endpoint Protection for Mac 2.1.0 Product Guide

Strany 71 - Troubleshooting

IndexAabout this guide 7adaptive mode 43adaptive rules 45anti-malwarebest practices 38configuring anti-malware 38defining exclusions 38testing the fea

Strany 72 - Run the repairMSC utility

installation (continued)using wizard 16introduction 9Mmalwarequarantine 31removing quarantined items 31restoring quarantined items 31McAfee ServicePor

Strany 74

Find product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and trou

Strany 75

1IntroductionMcAfee® Endpoint Protection for Mac offers scalable security solution that minimizes the risk ofexposing your Mac to vulnerabilities.The

Komentáře k této Příručce

Žádné komentáře