See how Insoft Services is responding to COVID-19

McAfee Policy Auditor Administration

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Upcoming Courses

Jan 25 - Jan 28, 2021
09:00 - 17:00 (CEST)
Online

May 4 - May 7, 2021
09:00 - 17:00 (CEST)
Online

Aug 2 - Aug 5, 2021
09:00 - 17:00 (CEST)
Online

Oct 18 - Oct 21, 2021
09:00 - 17:00 (CEST)
Online

McAfee Policy Auditor Administration
4 days  (Instructor Led Online)  |  Network Security

Course Details

The McAfee Policy Auditor Administration course provides attendees with in-depth training on the full benefits of this product. This course provides a firm foundation and hands-on experience in the installation, configuration, maintenance and troubleshooting of the McAfee Policy Auditor solution.

This training also focuses on understanding the internal Policy Auditor architecture and how to build custom remedies. At the end of this course, attendees should understand the capabilities of the McAfee solution and have the capability of installing McAfee Policy Auditor.

 

See other McAfee courses

Objectives

  • Learn how to install and administer policies.
  • Create and edit benchmark checks.
  • Use the new Content Creator Tool to create and edit benchmark checks.
  • Import checks, create scripts and set auditing periods.
  • Configuring file integrity monitoring.
  • View & customize dashboards and queries.
  • McAfee Vulnerability Manager and Policy Auditor Integration.
  • McAfee Risk Advisor and Policy Auditor Integration.

Outline

Module 1: Introduction to Security Connected and Policy Auditor

  • Introduction to Security Risk Management
  • Introduction to Policy Auditor
  • Summary of Differences From Version 3

Module 2: ePolicy Orchestrator Administrative Overview

  • Function
  • Components
  • Architecture and Communication
  • Repositories

Module 3: ePO Server Installation

  • Requirements
  • Tips and Best Practices
  • Installation
  • Post Installation
  • Product Documentation

Module 4: ePO Navigation and Policies

  • Navigation
  • System Tree
  • Policies

Module 5: The McAfee Agent

  • Overview
  • Components
  • Agent-Server Communication
  • Using the System Tray
  • Troubleshooting
  • SuperAgents
  • Directories and Files
  • Non-Windows Operating Systems

Module 6: Installing the Policy Auditor Server

  • ePO Extensions
  • Policy Auditor Extension
  • Policy Auditor Installation Requirements
  • Policy Auditor Server Installation
  • Upgrading Policy Auditor
  • Removing Policy Auditor

Module 7: Policy Auditor Server Configuration

  • What is Policy Auditor?
  • Components
  • Server Settings
  • Permission Sets
  • Tasks
  • Performance Improvements in PA 0

Module 8: Policy Auditor Agent

  • Overview
  • Localization
  • Support Operating Systems
  • Installation
  • Log Files
  • Troubleshooting
  • Displaying System Tray Icon

Module 9: Introduction to Audits

  • Audit Overview
  • Industry Standards
  • Policy Auditor and Standards

Module 10: Benchmark Editor

  • Introduction
  • Viewing
  • Status Types
  • Configuration
  • Tailoring
  • Editing
  • Labels

Module 11: Configuring Audits

  • Include Systems in an Audit
  • Choose a Benchmark
  • Activate Benchmark
  • Create a new Audit
  • McAfee Agent Role in Audits
  • Process Audit Results
  • View the Audit Results
  • Server Task Log
  • Audit Whiteout and Blackout Periods
  • Verify Audit at the System
  • Tips and Tricks

Module 12: Creating Checks

  • Rules and Checks Introduction
  • Creating Checks
  • Creating Rules

Module 13: Content Creator Tool

  • Introduction
  • Installation
  • GUI
  • Templates
  • Creating a Benchmark Using the PACC Tool

Module 14: Patches and Scripts

  • Importing Benchmarks
  • Patches
  • Service Level Agreement
  • Scripts

Module 15: Waivers

  • Waivers Introduction
  • Configuring Waivers

Module 16: Issues and Tickets

  • Issues and Tickets
  • Managing Issues
  • Ticketing Integration

Module 17: File Integrity Monitoring

  • What is File Integrity Monitoring
  • Defining FIM Policies
  • Reports
  • Protection
  • Maintenance
  • Basic Troubleshooting and FAQs
  • Solving Memory Discrepancies
  • Helpful Resources

Module 18: Dashboards and Reporting

  • Dashboard Overview
  • New Queries & Reports
  • Customizing Dashboards
  • Roll-up Reporting
  • Generate a Report

Module 19: Support and Troubleshooting

  • Support
  • Best Practices
  • PA Agent Debug Tool

Module 20: Integration

  • Purpose of Integration
  • Example of Need
  • Compliance Solutions

Module 21: Introduction to Vulnerability Manager

  • Overview
  • Components
  • Architecture
  • Communication
  • Installation

Module 22: Vulnerability Manager and Policy Auditor Integration

  • Integration Architecture
  • Configuration
  • Performing an Audit Using Vulnerability Manager

Module 23: Introduction to Risk Advisor

  • Overview
  • Product Integration
  • Architecture
  • Installation

Module 24: Risk Advisor and Policy Auditor Integration

  • Configuration
  • Permissions
  • Integration

Target Audience

  • System and Network Administrators
  • Security Personnel
  • Auditors, and/or Consultants concerned with Network and System Security

 

Prerequisites

  • It is recommended that the students have a working knowledge of Microsoft Windows administration, system Administration concepts, a basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.