The McAfee® ePolicy Orchestrator® Administration course from McAfee Education Services provides in-depth training on the benefits of the centralized management and deployment of McAfee products using McAfee ePolicy Orchestrator (McAfee® ePO™) software. Enabling administrators to fully understand the capabilities of their security solution not only reduces the risks of misconfiguration, it also helps an organization get maximum protection from the installation.
Become familiar with McAfee information and support resources and feedback mechanisms.
Security Solutions and McAfee ePolicy Orchestrator Overview
Describe the connected security model, McAfee ePO software features and functionality, and solution components and architecture.
Planning a McAfee ePolicy Orchestrator Deployment
Identify deployment considerations, describe deployment scenarios and solutions, identify McAfee ePO platform requirements, and discuss database sizing considerations.
Installing McAfee ePolicy Orchestrator Software
Identify installation requirements, recommendations, and best practices, distinguish between a new installation and a recovery installation, identify and distinguish between the different deployment options for a new installation, install McAfee ePO software, perform post-installation tasks, and identify configuration tools for the initial setup of the McAfee ePO software environment.
Managing Permission Sets and Users
Configure settings for personal settings, users, and permission sets, create a custom permission set, create users and assign permission sets, verify rights and access granted with permission sets, configure McAfee ePO and Microsoft Active Directory user accounts, and configure user autocreation.
Creating and Populating the System Tree
Provide an overview of the McAfee ePO system tree, use different methods for creating the system tree, describe the various methods of organizing the system tree, and create permission sets to let user accounts manage the System Tree.
Using the Tag Catalog
Learn the difference between tags without criteria (applied manually) and criteria-based tags (applied automatically and on demand), how to create new tags, how to edit, delete and move tags between tag groups, and how to enable permissions for other administrative users.
Sorting the System Tree
Learn how to dynamically sort your machines into your McAfee ePO system tree using a combination of system criteria, how to dynamically move machines into their appropriate group in your system tree, and how to verify IP integrity to ensure IP address sorting criteria does not overlap between different groups.
Define the McAfee Agent, explain its purpose and key characteristics and functions, and navigate the McAfee Agent interface.
View and interpret detailed information about your managed elements, customize your view, and view and customize System Monitors.
- Security Solutions and McAfee ePolicy Orchestrator
- Planning a McAfee ePolicy Orchestrator Deployment
- Installing McAfee ePolicy Orchestrator Software
- Managing Permission Sets and Users
- Creating and Populating the System Tree
- Using the Tag Catalog
- Sorting the System Tree
- McAfee® Agent
- System Information
- Client Tasks
- Managing Policies
- Policy and Client Task Approval
- Deploying Software for Managed Systems
- Product and Server Maintenance with Repositories
- Managing Dashboards and Monitors
- Working with Queries and Reports
- Automatic Responses and Notifications
- Database Maintenance and Server Utilities
- Disaster Recovery
- Agent Handlers
- Rogue System Detection
- Configuring Rogue System Detection
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security
- Solid knowledge of Microsoft Windows and system administration, network technologies
- Basic understanding of computer security concepts