McAfee Policy Auditor Administration


Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.

McAfee Policy Auditor Administration
  • 4 päivän kurssi
    Network Security

    Classroom + Online

    Course Details


    The McAfee® Policy Auditor Administration course from McAfee University provides attendees with in-depth training on the full benefits of this product. This course provides a firm foundation and hands-on experience in the installation, configuration, maintenance and troubleshooting of the McAfee Policy Auditor solution. This training also focuses on understanding the internal Policy Auditor architecture and how to build custom remedies. At the end of this course, attendees should understand the capabilities of the McAfee solution and have the capability of installing McAfee Policy Auditor.


    • Learn how to install and administer policies.
    • Create and edit benchmark checks.
    • Use the new Content Creator Tool to create and edit benchmark checks.
    • Import checks, create scripts, and set auditing periods.
    • Configuring file integrity monitoring.
    • View & customize dashboards and queries.
    • McAfee Vulnerability Manager and Policy Auditor Integration.
    • McAfee Risk Advisor and Policy Auditor Integration.


    Module 1: Introduction to Security Connected and Policy Auditor

    • Introduction to Security Risk Management
    • Introduction to Policy Auditor
    • Summary of Differences From Version 3

    Module 2: ePolicy Orchestrator Administrative Overview

    • Function
    • Components
    • Architecture and Communication
    • Repositories

    Module 3: ePO Server Installation

    • Requirements
    • Tips and Best Practices
    • Installation
    • Post Installation
    • Product Documentation

    Module 4: ePO Navigation and Policies

    • Navigation
    • System Tree
    • Policies

    Module 5: The McAfee Agent

    • Overview
    • Components
    • Agent-Server Communication
    • Using the System Tray
    • Troubleshooting
    • SuperAgents
    • Directories and Files
    • Non-Windows Operating Systems

    Module 6: Installing the Policy Auditor Server

    • ePO Extensions
    • Policy Auditor Extension
    • Policy Auditor Installation Requirements
    • Policy Auditor Server Installation
    • Upgrading Policy Auditor
    • Removing Policy Auditor

    Module 7: Policy Auditor Server Configuration

    • What is Policy Auditor?
    • Components
    • Server Settings
    • Permission Sets
    • Tasks
    • Performance Improvements in PA 0

    Module 8: Policy Auditor Agent

    • Overview
    • Localization
    • Support Operating Systems
    • Installation
    • Log Files
    • Troubleshooting
    • Displaying System Tray Icon

    Module 9: Introduction to Audits

    • Audit Overview
    • Industry Standards
    • Policy Auditor and Standards

    Module 10: Benchmark Editor

    • Introduction
    • Viewing
    • Status Types
    • Configuration
    • Tailoring
    • Editing
    • Labels

    Module 11: Configuring Audits

    • Include Systems in an Audit
    • Choose a Benchmark
    • Activate Benchmark
    • Create a new Audit
    • McAfee Agent Role in Audits
    • Process Audit Results
    • View the Audit Results
    • Server Task Log
    • Audit Whiteout and Blackout Periods
    • Verify Audit at the System
    • Tips and Tricks

    Module 12: Creating Checks

    • Rules and Checks Introduction
    • Creating Checks
    • Creating Rules

    Module 13: Content Creator Tool

    • Introduction
    • Installation
    • GUI
    • Templates
    • Creating a Benchmark Using the PACC Tool

    Module 14: Patches and Scripts

    • Importing Benchmarks
    • Patches
    • Service Level Agreement
    • Scripts

    Module 15: Waivers

    • Waivers Introduction
    • Configuring Waivers

    Module 16: Issues and Tickets

    • Issues and Tickets
    • Managing Issues
    • Ticketing Integration

    Module 17: File Integrity Monitoring

    • What is File Integrity Monitoring
    • Defining FIM Policies
    • Reports
    • Protection
    • Maintenance
    • Basic Troubleshooting and FAQs
    • Solving Memory Discrepancies
    • Helpful Resources

    Module 18: Dashboards and Reporting

    • Dashboard Overview
    • New Queries & Reports
    • Customizing Dashboards
    • Roll-up Reporting
    • Generate a Report

    Module 19: Support and Troubleshooting

    • Support
    • Best Practices
    • PA Agent Debug Tool

    Module 20: Integration

    • Purpose of Integration
    • Example of Need
    • Compliance Solutions

    Module 21: Introduction to Vulnerability Manager

    • Overview
    • Components
    • Architecture
    • Communication
    • Installation

    Module 22: Vulnerability Manager and Policy Auditor Integration

    • Integration Architecture
    • Configuration
    • Performing an Audit Using Vulnerability Manager

    Module 23: Introduction to Risk Advisor

    • Overview
    • Product Integration
    • Architecture
    • Installation

    Module 24: Risk Advisor and Policy Auditor Integration

    • Configuration
    • Permissions
    • Integration


    • System and network administrators, security personnel, auditors, and/or consultants concerned with network and system security should take this course.



    • It is recommended that the students have a working knowledge of Microsoft Windows administration, system Administration concepts, a basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.