Endpoint Security 10.2.0 Migration Guide
Transcription
Endpoint Security 10.2.0 Migration Guide
Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee ePolicy Orchestrator COPYRIGHT © 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, McAfee Evader, Foundscore, Foundstone, Global Threat Intelligence, McAfee LiveSafe, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee TechMaster, McAfee Total Protection, TrustedSource, VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Endpoint Security 10.2.0 Migration Guide Contents 1 Preface 5 About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Find product documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 5 6 Migration overview 7 Settings that migrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What happens to policies during migration . . . . . . . . . . . . . . . . . . . . . . . . Overview of the migration process . . . . . . . . . . . . . . . . . . . . . . . . . . . Overview of the deployment process . . . . . . . . . . . . . . . . . . . . . . . . . . Choosing a migration path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Preparing to migrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install the Migration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3 Migrating settings automatically 13 Automatic migration workflow . . . . Migrate settings automatically . . . . Verify automatically migrated objects . How repeated automatic migrations are 13 15 16 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . handled . . . . . . . . . . . . . . . . . . . . . Migrating settings manually 19 Manual migration workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migrate policies manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migrate client tasks manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migrate the Host IPS Catalog manually . . . . . . . . . . . . . . . . . . . . . . . . . Verify manually migrated objects . . . . . . . . . . . . . . . . . . . . . . . . . . . How repeated manual migrations are handled . . . . . . . . . . . . . . . . . . . . . . 4 7 8 9 10 11 12 12 How migration updates product settings 25 McAfee Default policy and product default settings . . . . . . . . . . . . . . . . . . . . Policy names and notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multiple-instance policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multiple-platform and single-platform policies . . . . . . . . . . . . . . . . . . . . . . How policies are merged during migration . . . . . . . . . . . . . . . . . . . . . . . . Migrating legacy settings to the Common Options policy . . . . . . . . . . . . . . . Migrating VirusScan Enterprise policies to Threat Prevention . . . . . . . . . . . . . . . . Migration notes for VirusScan Enterprise settings . . . . . . . . . . . . . . . . . . Merging on-access scan settings from Windows, Mac, and Linux . . . . . . . . . . . Migrating IPS Rules to Threat Prevention . . . . . . . . . . . . . . . . . . . . . . . . Migration notes for IPS Rules settings . . . . . . . . . . . . . . . . . . . . . . Merging Access Protection and Buffer Overflow Protection settings . . . . . . . . . . . Migrating Host IPS Firewall policies to Endpoint Security Firewall . . . . . . . . . . . . . . . Migration notes for McAfee Host IPS Firewall settings . . . . . . . . . . . . . . . . Migrating SiteAdvisor Enterprise policies to Web Control . . . . . . . . . . . . . . . . . . McAfee Endpoint Security 10.2.0 19 20 22 23 23 24 25 25 26 27 28 30 31 32 35 36 36 37 39 40 42 Migration Guide 3 Contents Migration notes for SiteAdvisor Enterprise settings . . . . . . . . . . . . . . . . . Migrating legacy Mac policies to Threat Prevention . . . . . . . . . . . . . . . . . . . . Migration notes for McAfee Endpoint Protection for Mac settings . . . . . . . . . . . . Migrating legacy Linux policies to Threat Prevention . . . . . . . . . . . . . . . . . . . . Migration notes for VirusScan Enterprise for Linux settings . . . . . . . . . . . . . . A Troubleshooting 49 Error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B IPS Rules migration 51 52 53 55 Creating Firewall rules to replace predefined Access Protection port-blocking rules 57 Create Create Create Create D 49 51 Signature-level settings in migrated IPS Rules . . . . . . . . . . . . . . . . . . . . . . Subrule-level settings in migrated IPS Rules . . . . . . . . . . . . . . . . . . . . . . . Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Application Protection Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C 42 44 44 46 46 rule rule rule rule to to to to prevent prevent prevent prevent mass mailing worms from sending mail . IRC communication . . . . . . . . . FTP communication . . . . . . . . . HTTP communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Maps of migrated policies 57 59 59 61 63 Policy maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 E Changes to migrated settings Changes Changes Changes Changes Changes Changes to to to to to to Index 4 71 VirusScan Enterprise settings . . . . . . . . . . . . . . . . . . . . . . . . IPS Rules settings in Host Intrusion Prevention . . . . . . . . . . . . . . . . . Firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SiteAdvisor Enterprise settings . . . . . . . . . . . . . . . . . . . . . . . McAfee Endpoint Protection for Mac settings . . . . . . . . . . . . . . . . . . McAfee VirusScan Enterprise for Linux settings . . . . . . . . . . . . . . . . . McAfee Endpoint Security 10.2.0 71 78 81 84 88 90 93 Migration Guide Preface This guide provides the information you need to work with your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: • Administrators — People who implement and enforce the company's security program. Conventions This guide uses these typographical conventions and icons. Italic Title of a book, chapter, or topic; a new term; emphasis Bold Text that is emphasized Monospace Commands and other text that the user types; a code sample; a displayed message Narrow Bold Words from the product interface like options, menus, buttons, and dialog boxes Hypertext blue A link to a topic or to an external website Note: Extra information to emphasize a point, remind the reader of something, or provide an alternative method Tip: Best practice information Caution: Important advice to protect your computer system, software installation, network, business, or data Warning: Critical advice to prevent bodily harm when using a hardware product McAfee Endpoint Security 10.2.0 Migration Guide 5 Preface Find product documentation Find product documentation On the ServicePortal, you can find information about a released product, including product documentation, technical articles, and more. Task 6 1 Go to the ServicePortal at https://support.mcafee.com and click the Knowledge Center tab. 2 In the Knowledge Base pane under Content Source, click Product Documentation. 3 Select a product and version, then click Search to display a list of documents. McAfee Endpoint Security 10.2.0 Migration Guide 1 Migration overview ® ® When you upgrade your legacy products to McAfee Endpoint Security, McAfee Endpoint Security for Mac, and McAfee Endpoint Security for Linux, you can also migrate your custom settings and assignments. ® The Endpoint Migration Assistant walks you through the migration process. You can let the Migration Assistant migrate all your settings and assignments automatically, based on your current settings and new product defaults, or you can select and configure them manually. ® ® The Migration Assistant migrates settings in environments managed with McAfee ePolicy Orchestrator (McAfee ePO ) version 5.1.1 or later. ™ Contents Settings that migrate What happens to policies during migration Overview of the migration process Overview of the deployment process Choosing a migration path Preparing to migrate Install the Migration Assistant Settings that migrate Endpoint Security enables you to migrate settings for the most recent versions of supported McAfee legacy products installed on your Windows, Mac, and Linux platforms. Migration requires a Threat Prevention License extension for the operating system platform. The Migration Assistant checks for a Mac and Linux License extension before enabling the option to migrate Mac and Linux settings. • • Automatic migration — Migrates these settings and retains assignments: • Host IPS Catalog • Policies and client tasks for all supported Windows products • (Optional) Some policy settings for supported Mac products • (Optional) Some policy settings and client tasks for supported Linux products Manual migration — Lets you select the Host IPS Catalog, policies, or client tasks to migrate. You can edit policies during the migration process, if needed. Best practice: Migrate the Host IPS Catalog immediately before the McAfee Host IPS Firewall policies to ensure that they remain synchronized. You can migrate these objects for the following legacy products. McAfee Endpoint Security 10.2.0 Migration Guide 7 1 Migration overview What happens to policies during migration Products that migrate (all patch levels) Settings that migrate McAfee VirusScan Enterprise 8.8 • Policies — Migrate workstation and server policies separately if you have both defined. • Client tasks McAfee Host Intrusion Prevention Firewall 8.0 • Host IPS Catalog — Renamed Firewall Catalog in Endpoint Security. • Firewall and General policies McAfee Host Intrusion Prevention 8.0 • IPS Rules policy: • Excluded Application Protection Rules • IPS Exceptions • Custom signatures • IPS Protection policy McAfee SiteAdvisor Enterprise 3.5 • Policies • Client tasks McAfee Endpoint Protection for Mac 2.3 McAfee VirusScan for Mac 9.8 McAfee VirusScan Enterprise for Linux 2.0.2 • Anti-malware policy: • On-access Scan • Exclusions: On-access Scan • On-Access Scanning policy • On-Demand Scanning client tasks If unsupported product versions are installed, upgrade them to supported versions before proceeding with migration. See the legacy product documentation for upgrade instructions. What happens to policies during migration Endpoint Security optimizes and consolidates legacy products into an integrated, efficient new platform. In addition to new and enhanced features that leverage the latest developments in security technology, a new McAfee Endpoint Security Common module centralizes the shared protection features so they are easily accessible by all product modules. As a result, some of the policy settings you are familiar with in legacy products have changed. ® The Endpoint Migration Assistant ensures that the settings in your legacy policies are moved to the correct policies in Endpoint Security. In some cases, they are merged with other Endpoint Security settings, and in others, new default settings are applied to support updated technologies. 8 • New and revised categories reflect new and shared features. • New settings represent new functionality. • Some settings are removed, moved to a different category or policy, or merged with settings for other features. • Some settings for multiple operating system platforms can be migrated to separate single-platform policies or one multi-platform policy. McAfee Endpoint Security 10.2.0 Migration Guide Migration overview Overview of the migration process • Settings shared by multiple product modules and features are moved to the Options policy in the Common module. • In some cases, settings are duplicated in multiple policies for use by functionality that is split across modules. 1 See Appendix E, Changes to migrated settings, for details about settings that are removed, moved, renamed, or merged. Figure 1-1 Source and target policies Overview of the migration process Use the Endpoint Migration Assistant to migrate product settings where a supported legacy version of a product module is installed. 1 Check that your legacy products are supported for migration. 2 Install the Migration Assistant extension on the McAfee ePO server. McAfee Endpoint Security 10.2.0 Migration Guide 9 1 Migration overview Overview of the deployment process 3 Open the Migration Assistant, select an automatic or manual path, then follow the instructions on the screen. • Automatic migration — Migrates all supported legacy settings for all supported Windows products installed on your managed systems. Optionally migrates all supported settings for supported Mac and Linux products. Retains assignments. • Manual migration — Lets you select the settings to migrate, then edit the policies if needed. Does not retain assignments. 4 (Manual migration only) Repeat step 3 to select and migrate additional settings. 5 Verify that your settings were migrated successfully. See also Install the Migration Assistant on page 12 Settings that migrate on page 7 How repeated automatic migrations are handled on page 17 Choosing a migration path on page 11 Overview of the deployment process Migration is only one task in the process of installing and deploying Endpoint Security. This deployment overview shows where migration fits into the overall process. See the McAfee ePolicy Orchestrator documentation for more information about installing the product components and creating assignments. 1 10 Check that the environment and managed systems where you want to install Endpoint Security meet the requirements described in: • Windows — KB82761 and the McAfee Endpoint Security Installation Guide • Macintosh — KB84934 and the McAfee Endpoint Security for Mac Product Guide • Linux — KB87073 and the McAfee Endpoint Security for Linux Product Guide 2 Check in and install the product package extension files and the McAfee Agent package files to the McAfee ePO server. 3 Create a client task to deploy the correct version of the McAfee Agent to managed systems. 4 Migrate legacy product settings. 5 (Manual migration only) Assign the migrated policies and client tasks to managed groups and systems. 6 Deploy Endpoint Security to managed systems. McAfee Endpoint Security 10.2.0 Migration Guide Migration overview Choosing a migration path 1 Choosing a migration path Decide which migration path to follow by considering the characteristics of your network or managed systems and your migration goals. 1 2 Decide whether you need to migrate. Do you want to retain any current settings or assignments for your legacy products? • No — Install Endpoint Security without migrating. See the product installation guide for instructions. • Yes — Use the Endpoint Migration Assistant to migrate your settings before deploying the Endpoint Security Client to systems. If you want to migrate your settings, decide whether to migrate automatically or manually. • Automatic migration is a "hands-off" process. The Migration Assistant makes most migration decisions "behind the scenes." Recommended if you: • • Have a network with fewer than 250 managed systems • Use default policy settings or a minimum number of custom policies Manual migration is a "hands-on" process. You make most of the migration decisions by selecting the objects to migrate and editing their settings, if needed. Recommended if you: • Have a network with more than 250 managed systems • Use multiple custom policies • Want to fine-tune existing policy settings during the migration process • Want to fine-tune assignments • Want to migrate settings to single-platform policies • Want to personally supervise and approve each step of the migration process Table 1-1 Choosing a migration path Automatic migration Pros Cons • Requires minimal input from you. • You can't select specific objects to migrate. • Migrates all policies, client tasks, and the Host IPS Catalog for Windows products. • You can't edit target policies. • Optionally migrates policies for Mac and Linux products. • You can't create single-platform target policies. • Optionally migrates Linux on-demand scan client tasks. • Does not migrate unassigned policies. • Creates multi-platform target policies combining Windows, Mac, and Linux settings. • Retains policy and client task assignments. Manual migration • Lets you select objects to migrate. • Requires input from you. • Lets you edit policies before migrating. • Does not retain assignments. You need to assign policies and client tasks to managed systems. • Lets you create both single-platform and multi-platform target policies. McAfee Endpoint Security 10.2.0 Migration Guide 11 1 Migration overview Preparing to migrate Preparing to migrate To streamline the migration process and minimize conflicts or duplication in migrated settings, follow these best practices before migrating. • Install the Endpoint Migration Assistant — The Migration Assistant is a self-contained McAfee ePO extension that you need to install on the McAfee ePO server. • Review and revise objects you plan to migrate — Review legacy settings and assignments. Consolidate them where possible. Remove duplicates and unused objects. • Notify others not to make changes to the Policy Catalog, Client Task Catalog, and Host IPS Catalog during migration — If objects change while you're migrating them, the migrated objects don't reflect those changes. • Locate unassigned policies and client tasks for migration — (Automatic migration only) During automatic migration, only policies and client tasks that are assigned to at least one group or managed system are migrated. Use manual migration to migrate unassigned policies or client tasks. What to do next Once you install the Migration Assistant and review the settings you want to migrate, you are ready to begin migration. See Appendix D, Maps of migrated policies, for illustrations of how legacy policies are migrated to Endpoint Security policies. These illustrations are also available for reference from the Endpoint Migration Assistant by clicking View Endpoint Security policy mapping at the top of the manual policy selection pane. See Appendix E, Changes to migrated settings, for details about settings that are removed, moved, renamed, or merged. See also Policy maps on page 63 Install the Migration Assistant The Migration Assistant extension is required only for migrating legacy settings to Endpoint Security. It is not part of the Endpoint Security product extension package. You must install it on your McAfee ePO server as a separate extension if you plan to migrate. Task For details about product features, usage, and best practices, click ? or Help. 12 1 In McAfee ePO, select Menu | Software Manager | Software Not Checked In. 2 On the left side of the Software Manager screen, under Product Categories, select Licensed, then: a In the Software Not Checked In table, select McAfee Endpoint Security Migration Assistant. The description and the extension for the Migration Assistant are displayed in the table at the bottom of the screen. b Click Check In to check in the Migration Assistant extension to your McAfee ePO. When installation is complete, the Migration Assistant is listed on the Extensions screen. McAfee Endpoint Security 10.2.0 Migration Guide 2 Migrating settings automatically Automatic migration migrates all the supported settings for all the supported products you have installed on your Windows, Mac, and Linux systems. This migration path requires minimal input from you. Use automatic migration to migrate all the policies and client tasks for the legacy products on your Windows systems. It also migrates the entries in your legacy Host IPS Catalog to the new Endpoint Security Firewall Catalog. Optionally, you can migrate Linux on-demand scan client tasks and Mac and Linux on-access scan policy settings. The Endpoint Migration Assistant creates and assigns the new Endpoint Security policies and client tasks automatically, based on your current product settings. Contents Automatic migration workflow Migrate settings automatically Verify automatically migrated objects How repeated automatic migrations are handled Automatic migration workflow Here's a high-level overview of the automatic migration process. 1 Run the Endpoint Migration Assistant and select Automatic migration. 2 If Mac or Linux products are installed, specify whether to migrate them. 3 If there are VirusScan Enterprise policies to migrate, specify whether to migrate workstation or server policies. 4 Preview and save the proposed policies. A server task runs and completes the policy migration. It also migrates client tasks and the Host IPS Catalog. McAfee Endpoint Security 10.2.0 Migration Guide 13 2 Migrating settings automatically Automatic migration workflow Automatic migration retains assignments for migrated policies and client tasks. After automatic migration completes, you can deploy Endpoint Security 10.2 to managed systems. Figure 2-1 Migrating automatically 14 McAfee Endpoint Security 10.2.0 Migration Guide Migrating settings automatically Migrate settings automatically For these objects... The Migration Assistant... Policies Creates the new policies, adds them to the Endpoint Security Policy Catalog, and assigns them to the same managed systems. You can preview the new policies before they are created. 2 • Policies for Windows products are migrated automatically. • If Mac or Linux products are installed, you can specify whether to migrate their supported policies. When similar settings for Windows and non-Windows products are migrated, Windows settings take precedence. On-access scan exclusions are merged. If you don't like the previewed policies, you can cancel the migration and begin a manual migration instead. Client Tasks (Windows and Linux) Creates new tasks, adds them to the Endpoint Security Client Task Catalog, and assigns them to the same managed systems. • Client tasks for Windows products are migrated automatically. • If VirusScan Enterprise for Linux is installed, you can specify whether to migrate its on-demand scan client tasks. Host IPS Catalog Migrates legacy catalog entries to the Endpoint Security Firewall Catalog. Migrate settings automatically Use automatic migration to migrate your currently assigned policies and client tasks and the Host IPS Catalog with minimal interaction. Before you begin • Verify that the products to migrate are supported. • Install the Endpoint Migration Assistant extension on the McAfee ePO server. • Do not allow others to make changes to the objects you are migrating until migration is complete. Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Endpoint Migration Assistant. 2 For Mode, select Automatic migration. 3 If VirusScan Enterprise is installed, select either Workstation or Server. Select one to migrate now, then use manual migration to migrate the other at a later time. Threat Prevention does not support separate policies for workstation and server settings. 4 If supported non-Windows products are installed, select whether to migrate them. • Mac — Migrates on-access scan policy settings from McAfee Endpoint Protection for Mac. • Linux — Migrates on-access scan policy settings and on-demand scan client tasks from VirusScan Enterprise for Linux. McAfee Endpoint Security 10.2.0 Migration Guide 15 2 Migrating settings automatically Verify automatically migrated objects Automatic migration creates multi-platform policies shared by all operating system platforms. If you want to migrate at a later time, or create single-platform policies, use manual migration to migrate these products. 5 Click Next to generate a preview of the new Endpoint Security policies. A progress bar appears and lets you know how many policies are being included in the preview. 6 7 Review the new policies. a Under New Categories in the left pane, select a category, then preview the new policies for that category in the right pane. b (Optional) For every new policy that is created under Endpoint Security, click Rename and Edit Notes to rename the policy or edit the policy notes, if needed. Click Save to run a server task to complete the migration. The Migration Assistant runs a server task in the background to migrate your policies. Client tasks and the Host IPS Catalog are also migrated. You can check its status in the Server Task Log. You must wait for the server task to complete before starting another migration session. See also Policy names and notes on page 25 Settings that migrate on page 7 Multiple-platform and single-platform policies on page 27 Install the Migration Assistant on page 12 Verify automatically migrated objects Check that objects were migrated successfully before deploying Endpoint Security to managed systems. Before you begin You have used the Endpoint Migration Assistant to manually migrate legacy product settings to Endpoint Security. Task For details about product features, usage, and best practices, click ? or Help. 1 2 16 Verify migrated policies. a In McAfee ePO, select Menu | Policy | Policy Catalog. b Select each product module, then check that the migrated policies were created. Verify migrated policy assignments. a In McAfee ePO, select Menu | Systems Section | System Tree. b View the Assigned Policies for the groups and systems where the source policies were assigned. c Verify that the new Endpoint Security policies are assigned to those groups and systems. McAfee Endpoint Security 10.2.0 Migration Guide 2 Migrating settings automatically How repeated automatic migrations are handled 3 4 5 Verify migrated client tasks. a In McAfee ePO, select Menu | Policy | Client Task Catalog. b Select each product module where you migrated client tasks, then select the category for each task you migrated, and verify that the migrated client task was created. Verify migrated client task assignments. a In McAfee ePO, select Menu | Systems Section | System Tree. b Review the Client Task Assignments for the groups and systems where the source client tasks were assigned. c Verify that the migrated client tasks have the same schedule and settings as the source client tasks. Verify the migrated Firewall Catalog. a In McAfee ePO, select Menu | Policy | Firewall Catalog. b Verify that the migrated entries appear in the migrated Firewall Catalog. How repeated automatic migrations are handled Running automatic migration after you have already migrated some or all of your settings affects the new objects created during the previous migration session. When you run automatic migration after migrating previously, the Migration Assistant: • Deletes objects created during a previous automatic migration session. For example, if you migrate your policies automatically, then run automatic migration again, only the new policies created in the most recent migration session are listed in the Policy Catalog when you complete the second migration. • Retains objects created during a previous manual migration, but does not retain their assignments. • Assigns the new policies to managed systems. For example, if you have assigned policies that you migrated manually to managed systems, the new policies are assigned instead. These actions also apply to the Common Options policies created during previous migrations. McAfee Endpoint Security 10.2.0 Migration Guide 17 2 Migrating settings automatically How repeated automatic migrations are handled 18 McAfee Endpoint Security 10.2.0 Migration Guide 3 Migrating settings manually Manual migration migrates selected settings for the supported products you have installed on your Windows, Mac, and Linux systems. This is an interactive migration path that requires your input. Use manual migration to migrate selected policies, client tasks, or the Host IPS Catalog for your legacy products. The Endpoint Migration Assistant lets you select specific objects to migrate and edit the policies if needed. Manual migration does not retain assignments for migrated objects. Contents Manual migration workflow Migrate policies manually Migrate client tasks manually Migrate the Host IPS Catalog manually Verify manually migrated objects How repeated manual migrations are handled Manual migration workflow Here's a high-level overview of the manual migration process. 1 Run the Endpoint Migration Assistant and select Manual migration. 2 Select the type of objects to migrate. • If you select the Host IPS Catalog, a server task runs and completes the Catalog migration. • If you select Policies or Client Tasks, select what you want to migrate from the categories, then save your selections. You can edit policies, if needed. You can also edit notes for policies and client tasks. Your selections are migrated in the background. Best practice: Migrate the Host IPS Catalog immediately before the McAfee Host IPS Firewall policies to ensure that they remain synchronized. 3 Run the Migration Assistant again to migrate additional objects. McAfee Endpoint Security 10.2.0 Migration Guide 19 3 Migrating settings manually Migrate policies manually After manual migration, you must assign the new policies and client tasks to managed systems as part of product deployment. See the McAfee ePolicy Orchestrator Installation Guide for more information. Figure 3-1 Migrating settings manually Migrate policies manually Use manual migration to select the policies to migrate, then edit them if needed. Once the new policies are created, you need to assign them to managed systems. Before you begin 20 • Verify that the products to migrate are supported. • Install the Endpoint Migration Assistant extension on the McAfee ePO server. • Do not allow others to make changes to the objects you are migrating until migration is complete. McAfee Endpoint Security 10.2.0 Migration Guide Migrating settings manually Migrate policies manually 3 Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Endpoint Migration Assistant. 2 For Mode, select Manual migration. 3 For Objects to Migrate, select Policies, then click Next. Only the objects that you have permission to view are listed. 4 Under Available Policies in the left pane, select policy categories for your products. The legacy policies within those categories are listed on the right side of the screen. Best practice: Click View Endpoint Security policy mapping, located at the top of the page, to view policy maps that show where legacy policies migrate in Endpoint Security. a If you select VirusScan Enterprise policies, the Workstation settings are listed by default. To display Server policy settings instead, click Edit, then select Server. b If a category contains multiple policies, select the name of the policy to migrate from the drop-down list that appears next to the category name. c If settings in a selected policy are merging with policies from other categories, the Migration Assistant displays the other categories. For each of these categories: d 5 • Select the name of the policy to migrate. • If you don't want to migrate settings in that category now, select None. If you select None for all the merging categories, no new policy is created for these categories. If you're migrating similar products from multiple operating system platforms, select or deselect Create Multi-Platform Policy. This checkbox appears only when migrating two or more of these products: VirusScan Enterprise, McAfee Endpoint Protection for Mac or McAfee VirusScan for Mac, and VirusScan Enterprise for Linux. • Selected — The Migration Assistant creates one On-Access Scan policy that can be shared by Windows, Mac, and Linux systems. If product settings conflict, Windows settings take precedence over all others, and Mac settings take precedence over Linux. On-Access Scan exclusions are merged. This is the default setting. • Deselected — The Migration Assistant creates up to three On-Access Scan policies: migrated VirusScan Enterprise settings for the Windows platform, migrated McAfee Endpoint Protection for Mac or McAfee VirusScan for Mac settings, and migrated VirusScan Enterprise for Linux settings. Click Next. The Migration Assistant displays the source policies on the left side of the screen. At the top of the screen, you see tabs for each Endpoint Security policy to be created. Each tab gives a preview of the new policies created when the selected source policies are migrated. The left pane shows the selected source policies. 6 Click Next to start the manual migration wizard. 7 On the open tab, type a name for the policy, type notes to describe it, and configure its options, then click Next to proceed to the next tab. Repeat this step until you have configured all the selected policies, then click Next. 8 Review the summary of changes, then click Save to create the new policies and add them to the Policy Catalog. McAfee Endpoint Security 10.2.0 Migration Guide 21 3 Migrating settings manually Migrate client tasks manually 9 Select whether to migrate more objects. • Yes — Displays the screen where you can select additional objects to migrate. • No — Displays the first screen with default settings. See also Policy names and notes on page 25 Settings that migrate on page 7 Multiple-platform and single-platform policies on page 27 Install the Migration Assistant on page 12 Policy maps on page 63 Migrate client tasks manually Use manual migration to select the client tasks to migrate. Once the new client tasks are created, assign them to managed systems. Only client tasks for Windows and Linux products are migrated. Before you begin • Verify that the products to migrate are supported. • Install the Endpoint Migration Assistant extension on the McAfee ePO server. • Do not allow others to make changes to the objects you are migrating until migration is complete. Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Endpoint Migration Assistant. 2 For Mode, select Manual migration. 3 For Objects to Migrate, select Client Tasks, then click Next. Only the objects that you have permission to view are listed. 4 Under Available Tasks in the left pane, select the task types to migrate. The legacy tasks of that type are listed on the right side of the screen. You can type a name or partial name in the Filter list box at the top of the left pane to filter the listing. 5 a If you have created multiple tasks of the same type, a drop-down list appears next to the task type name. Select the name of the task to migrate. b (Optional) To migrate another task of the same type, click + and select the task from the new drop-down list, then repeat for all the tasks to migrate. This option is available only when another task of the same type exists. Click Next to start the manual migration wizard. At the top of the screen, you see tabs for each Endpoint Security client task to be created. Each tab gives a preview of the new tasks when the selected source tasks are migrated. The left pane shows the selected source task. 6 22 (Optional) For each new task to create, type a new name and edit settings, if needed. McAfee Endpoint Security 10.2.0 Migration Guide Migrating settings manually Migrate the Host IPS Catalog manually 7 Click Next, review the summary of changes, then click Save to create the new client tasks and add them to the Client Task Catalog. 8 Select whether to migrate more objects. • Yes — Displays the screen where you can select additional objects to migrate. • No — Displays the first screen with default settings. 3 See also Policy names and notes on page 25 Settings that migrate on page 7 Install the Migration Assistant on page 12 Migrate the Host IPS Catalog manually Use manual migration to select and migrate the Host IPS Catalog. Migrate the Catalog immediately before migrating the associated policies, to ensure that they remain synchronized. Before you begin • Verify that the products to migrate are supported. • Install the Endpoint Migration Assistant extension on the McAfee ePO server. • Do not allow others to make changes to the objects you are migrating until migration is complete. Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Endpoint Migration Assistant. 2 For Mode, select Manual migration. 3 For Objects to Migrate, select Catalog, then click Next. All the items in the Catalog will be migrated. 4 Click Next to start the migration. The Migration Assistant displays a message that a server task is migrating the Catalog. When the migration is complete, the selection screen appears for you to select additional objects to migrate. Verify manually migrated objects Check that objects were migrated successfully before deploying Endpoint Security to managed systems. Before you begin You have used the Endpoint Migration Assistant to manually migrate legacy product settings to Endpoint Security. McAfee Endpoint Security 10.2.0 Migration Guide 23 3 Migrating settings manually How repeated manual migrations are handled Task For details about product features, usage, and best practices, click ? or Help. 1 2 3 Verify migrated policies. a In McAfee ePO, select Menu | Policy | Policy Catalog. b Select each product module where you migrated policies, then check that the migrated policies were created. Verify migrated client tasks. a In McAfee ePO, select Menu | Policy | Client Task Catalog. b Select each product module where you migrated client tasks. c Select the category for each task you migrated, and verify that the migrated client task was created. Verify the migrated Firewall Catalog. a In McAfee ePO, select Menu | Policy | Firewall Catalog. b Verify that the migrated entries appear in the migrated Firewall Catalog. How repeated manual migrations are handled Manual migration has no effect on objects migrated during a previous migration session. For example, if you migrate some policies for a product module, then migrate the same policies again: • The new policies are created in the Policy Catalog. If the target policy name already exists, the Migration Assistant appends a digit to the newer policy name (for example, My Policy, My Policy-1, My Policy-2). • The previously migrated policies still appear in the Policy Catalog. • If you migrate McAfee Host IPS Firewall policies again, you need to migrate the Host IPS Catalog again. (The Migration Assistant shows the date and time when the Catalog was last migrated, if applicable.) Best practice: Migrate the Host IPS Catalog immediately before the McAfee Host IPS Firewall policies to ensure that they remain synchronized. Manual migration does not retain assignments for migrated objects. You must assign the migrated objects manually. You also must manually delete the objects created during the previous migration session that you no longer want. If you have assigned objects that you created during a previous manual migration session, these assignments are not affected if you migrate the same objects again. 24 McAfee Endpoint Security 10.2.0 Migration Guide 4 How migration updates product settings Changes to Endpoint Security policies include new policies, categories, options, and default settings that are designed to leverage the latest protection technologies and optimize product performance. During the migration process, legacy settings for policies, options, rules, and tasks might be renamed, removed, or reset to default values, depending on how the features work in Endpoint Security. Some settings are moved to new categories or policies, or merged with other settings. Similar settings from products running on multiple operating system platforms can be migrated to separate, single-platform policies or shared multi-platform policies. Contents McAfee Default policy and product default settings Policy names and notes Multiple-instance policies Multiple-platform and single-platform policies How policies are merged during migration Migrating VirusScan Enterprise policies to Threat Prevention Migrating IPS Rules to Threat Prevention Migrating Host IPS Firewall policies to Endpoint Security Firewall Migrating SiteAdvisor Enterprise policies to Web Control Migrating legacy Mac policies to Threat Prevention Migrating legacy Linux policies to Threat Prevention McAfee Default policy and product default settings The McAfee Default policy does not migrate. If you currently use the McAfee Default policy for legacy products, the Migration Assistant assigns the new Endpoint Security McAfee Default policy. If a source policy with default settings (McAfee Default, My Default (unedited), or Typical Corporate Environment) is assigned to any group or managed system, the Migration Assistant assigns the new Endpoint Security McAfee Default policy during automatic migration. Policy names and notes The Endpoint Migration Assistant uses these general conventions for naming migrated Endpoint Security policies and creating policy notes. You can edit the policy names and notes before saving the new policies or after they are created. Policy names • Automatic migration McAfee Endpoint Security 10.2.0 Migration Guide 25 4 How migration updates product settings Multiple-instance policies Migrated policy type Target policy name Examples • Single product migration Migrated [legacy product abbreviation] Policy-[n] • Migrated VSE Policy • One-to-one policy migration where: • One-to-multiple policy migration • Migrated VSE Policy-1 • Legacy product abbreviation is VSE, HIPS, SAE, EPM, or VSELinux. • Migrated VSE Policy-2 • n is incremented each time a new policy is migrated for the same module. • Migrated HIPS Policy-1 • Migrated HIPS Policy • Migrated SAE Policy • Migrated EPM Policy • Migrated VSELinux Policy • Multiple product migration Merged Policy-[n] (includes multi-platform where n is incremented each time a new policy of the same type is policies) migrated. • Multiple-to-one policy migration • Merged Policy Common Options Merged Policy-[n] • Merged Policy where n is incremented each time a new Common Options policy is created. • Merged Policy-1 • Merged Policy-1 • Merged Policy-2 • Merged Policy-2 • Manual migration Migrated policy type Target policy name Examples One-to-one or one-to-multiple policy migration Same as the source name. • My Policy If the target policy name already exists, the Migration Assistant appends a digit that is incremented each time a new policy is created using that name. You can type a different policy name before saving the new policy. Multiple-to-one policy migration You must specify a name for the target policy. Multi-platform policy You must specify a name for the target policy. • My Policy-1 • My Policy-2 Policy notes During migration, the Migration Assistant creates policy notes that include the name (and type, if applicable) of the source policy or policies, the migration date and time, and the name of the user who migrated the policy. For example: Source: VirusScan Enterprise 8.8.0 - Access Protection Policies > My Default; Type: Server; 6/20/16 3.34 PM - Automatic Migration; User: admin Multiple-instance policies Multiple-instance policies, also known as multi-slot policies, allow you to assign more than one policy instance to a client, resulting in one combined, effective policy. When migrating legacy policies to Endpoint Security, multiple-instance policies from one or more source policies are merged into one target policy for the respective policy type. 26 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Multiple-platform and single-platform policies 4 Table 4-1 How multiple-instance policies are migrated Source product Source policies Target product module Target policy McAfee Host IPS IPS Rules Threat Prevention Access Protection and Exploit Prevention McAfee Host IPS General (Trusted Applications) Firewall Options (Trusted Applications) Web Control Block and Allow List SiteAdvisor Enterprise Prohibit List and Authorize List Content Actions Content Actions Multiple-platform and single-platform policies During manual migration, you can select whether to migrate settings from different operating system platforms to separate policies or merge them into one policy for multiple platforms. Table 4-2 Migration for settings from multiple operating system platforms When you select these products to migrate... The Migration Assistant creates these Threat Prevention policies... Create Multi-Platform Policy selected Create Multi-Platform Policy deselected • VirusScan Enterprise • One On-Access Scan policy for Windows and Mac systems • Two On-Access Scan policies: • McAfee Endpoint Protection for Mac • Merged on-access scan exclusions • VirusScan Enterprise • One On-Access Scan policy for Windows and Linux systems • One for Mac systems For duplicate or conflicting settings, Windows settings take precedence over • Separate on-access scan exclusions Mac settings. • VirusScan • One Options policy for Windows and Enterprise for Linux Linux systems • Merged on-access scan exclusions For duplicate or conflicting settings, Windows settings take precedence over Linux settings. McAfee Endpoint Security 10.2.0 • One for Windows systems • Two On-Access Scan policies: • One for Windows systems • One for Linux systems • Two Options policies: • One for Windows systems • One for Linux systems • Separate on-access scan exclusions Migration Guide 27 4 How migration updates product settings How policies are merged during migration Table 4-2 Migration for settings from multiple operating system platforms (continued) When you select these products to migrate... The Migration Assistant creates these Threat Prevention policies... Create Multi-Platform Policy selected Create Multi-Platform Policy deselected • VirusScan Enterprise • One On-Access Scan policy for Windows, Mac, and Linux systems • Three On-Access Scan policies: • McAfee Endpoint Protection for Mac • One Options policy for Windows and Linux systems • One for Windows systems • One for Mac systems • One for Linux systems • VirusScan • Merged on-access scan exclusions • Two Options policies: Enterprise for Linux For duplicate or conflicting settings, • One for Windows systems Windows settings take precedence over other settings. • One for Linux systems • Separate on-access scan exclusions • McAfee Endpoint Protection for Mac • One On-Access Scan policy for Mac and Linux systems • VirusScan • One Options policy for Linux systems Enterprise for Linux • Merged on-access scan exclusions For duplicate or conflicting settings, Mac settings take precedence over Linux settings. • Two On-Access Scan policies: • One for Mac systems • One for Linux systems • One Options policy for Linux systems • Separate on-access scan exclusions Automatic migration creates multi-platform target policies. You must use manual migration to create single-platform policies. How policies are merged during migration Sometimes, source policies from one or more legacy products are merged into a single target policy. Table 4-3 Policies merged during migration to Threat Prevention Source product module Source policies Threat Prevention policy VirusScan Enterprise • Quarantine Manager Options • Unwanted Programs VirusScan Enterprise for Linux • On-Access Scanning VirusScan Enterprise • High-Risk Processes On-Access Scan • Low-Risk Processes • On-Access Default Processes • On-Access General McAfee Endpoint Protection for Mac • Anti-malware (on-access scan settings) VirusScan Enterprise for Linux • On-Access Scanning 28 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings How policies are merged during migration 4 Table 4-3 Policies merged during migration to Threat Prevention (continued) Source product module Source policies Threat Prevention policy VirusScan Enterprise • Access Protection Access Protection • Buffer Overflow Protection McAfee Host IPS • IPS Rules • IPS Protection VirusScan Enterprise • Buffer Overflow Protection McAfee Host IPS • IPS Rules Exploit Prevention • IPS Protection Table 4-4 Policies merged during migration to Firewall Source product module Source policies Firewall policy McAfee Host IPS Options • Firewall (Options and DNS Blocking) • General (Trusted Applications, Trusted Networks, and Client UI) Table 4-5 Policies merged during migration to Web Control Source product module Source policies Web Control policy SiteAdvisor Enterprise Content Actions • Content Actions • Rating Actions • Authorize List • Enable or Disable • Hardening • Event Tracking • Content Actions • General (some settings) Options • Rating Actions • Authorize List Block and Allow List • Prohibit List McAfee Endpoint Security 10.2.0 Migration Guide 29 4 How migration updates product settings How policies are merged during migration Migrating legacy settings to the Common Options policy Features shared by multiple product modules reside in the Common module, which is installed with other Endpoint Security product modules. Settings for these shared features are defined in the Options policy for the Common module. Figure 4-1 Legacy settings migrated to the Common Options policy The Migration Assistant migrates legacy settings for these policy categories to the Common Options policy. Table 4-6 Legacy settings migrated to the Common Options policy Source settings Migrated Common Options policy categories VirusScan Enterprise Alert policy Client Logging VirusScan Enterprise Access Protection policy, Common Standard Protection category Self Protection VirusScan Enterprise General Options policy, Display Options category • Client Interface Language (Windows only) Host Intrusion Prevention General policy, Client UI category: • Client Interface Language (Windows only) • Client UI language setting • Managed Tasks (Windows only) • Client Logging • Firewall logging SiteAdvisor Enterprise General policy, Proxy Server • Proxy Server for McAfee GTI (Windows only) tab • Enable HTTP proxy authentication 30 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating VirusScan Enterprise policies to Threat Prevention 4 Migrating VirusScan Enterprise policies to Threat Prevention This overview shows where migrated policy settings for McAfee VirusScan Enterprise appear in Endpoint Security policies. Figure 4-2 Where VirusScan Enterprise settings migrate McAfee Endpoint Security 10.2.0 Migration Guide 31 4 How migration updates product settings Migrating VirusScan Enterprise policies to Threat Prevention Migration notes for VirusScan Enterprise settings During the migration process to Endpoint Security 10.2, the Endpoint Migration Assistant adjusts the migrated settings in your target policies to address differences between the legacy product and the new product. Therefore, some of the target policy settings don't match your legacy settings. Workstation and server settings In VirusScan Enterprise, policies include settings for servers and workstations. This is not the case for Threat Prevention policies. Therefore, you must specify to migrate either the workstation settings or the server settings. The default is Workstation. If you use automatic migration, you must select one type of settings for automatic migration, then migrate the other type of settings manually. Quarantine folder The path for the quarantine folder is limited to 190 characters, but VirusScan Enterprise allowed 256 characters. During client migration, if the migrated quarantine folder path contains more than 190 characters, the path automatically reverts to the default location, <SYSTEM_DRIVE>\Quarantine. Access Protection port-blocking rules Endpoint Security Firewall provides more advanced port-blocking capabilities than the predefined Access Protection rules for VirusScan Enterprise 8.8. Access Protection port-blocking rules, either predefined or user-defined, are not migrated. User-added inclusions and exclusions for predefined rules are also not migrated. If you want to continue using legacy rules that don't migrate from VirusScan Enterprise, you can create firewall rules in Endpoint Security Firewall to replicate their behavior. You can create firewall rules to: • Define the same behavior as one or more of the predefined Access Protection port-blocking rules. • Block the same ports as one or more custom Access Protection port-blocking rules. See Appendix C, Creating Firewall rules to replace Access Protection port-blocking rules, for more information. Self Protection settings When you migrate Access Protection rules (except port-blocking rules): 32 • Self Protection settings move from the Access Protection policies to the Common Options policy. • Self Protection is enabled by default, regardless of the legacy setting. McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating VirusScan Enterprise policies to Threat Prevention 4 • User-defined exclusions configured for each legacy product module are migrated as global exclusions for Endpoint Security. • User-defined exclusions for three predefined rules in the Common Standard Protection category are migrated as global Self Protection exclusions in the Common Options policy: User-defined exclusions for this legacy rule Migrate to the Self Protection exclusions for Prevent modification of McAfee files and settings Processes Prevent termination of McAfee processes Processes Prevent hooking of McAfee processes Processes Best practice: Review your exclusions after migration, then revise or remove them as needed. Also review exclusions configured for any third-party applications to access VirusScan Enterprise registry or file locations, because these locations have changed in Endpoint Security. Exploit Prevention (Buffer Overflow Protection) In Endpoint Security, Buffer Overflow Protection settings are renamed Exploit Prevention. After migration, the protection level for Exploit Prevention is set to the default Standard Protection, which detects and blocks only high-severity buffer overflow exploits identified in the Exploit Prevention content file and stops the detected threat. Best practice: Use this setting for a limited time only, then review the log file during that time to determine whether to change to Maximum Protection. Scan exclusions for root-level folders VirusScan Enterprise supports the exclusion of root-level folders from scans if the path starts with wildcard characters such as "?" or '"/". No drive identifier is required. However, Threat Prevention does not support the same syntax for leading wildcard characters in on-access scan and on-demand scan exclusions. The Migration Assistant converts unsupported syntax by changing the leading characters to "**\". Best practice: If you plan to migrate root-level scan exclusions that include wildcard characters, revise the legacy exclusions in VirusScan Enterprise to supported syntax before migration, if needed. • Supported exclusion patterns — Threat Prevention supports the following exclusion patterns, and the Migration Assistant does not change them during migration: • Environmental variables — Patterns that begin with % (for example, %systemroot%\Test\ ) • UNC paths — Patterns that begin with \\ (for example, \\Test ) • Full paths — Patterns that include an absolute drive designator (for example, C:\Test\ ) • Patterns that begin with **\ McAfee Endpoint Security 10.2.0 Migration Guide 33 4 How migration updates product settings Migrating VirusScan Enterprise policies to Threat Prevention • Unsupported exclusion patterns — For all other VirusScan Enterprise exclusion patterns, the Migration Assistant: • Converts leading characters to **\ For example, converts \ • ?: ?:\ *\ *: *:\ Inserts **\ when there are no leading characters. For example, converts Test to **\Test • Appends a backslash character to the exclusion pattern, if the Also Exclude Subfolders option is selected for an exclusion and the exclusion pattern doesn't end with a backslash ( \ ) character. With the **\ syntax, Threat Prevention excludes folders at more levels in the folder structure than VirusScan Enterprise does. Best practice is to review the migrated exclusions and revise them, if needed, to duplicate the behavior of the legacy exclusions. See KB85746 for more information. The following table shows an example of how migrated exclusions are handled differently than exclusions in legacy products. Table 4-7 How non-absolute root-level exclusions are handled Legacy exclusion \test\ or ?:\test\ Migrated exclusion **\test\ Excludes: Excludes: • \test\ folder at the root level on any drive. For example: • \test\ folder at the root or any other level on any drive. For example: • c:\test\ • c:\test\ • c:\lab\test\ • d:\test\ • d:\test\ • d:\lab\project \test\ • z:\test Does not exclude: \test folder at levels other than the root level on any drive, such as: • z:\test • c:\lab\test\ To exclude only the \test folder at the root level, revise the migrated exclusion to specify an absolute path. For example: • d:\lab\project\test\ • c:\test\ • d:\test\ • z:\test See also Changes to VirusScan Enterprise settings on page 71 34 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating VirusScan Enterprise policies to Threat Prevention 4 Merging on-access scan settings from Windows, Mac, and Linux On-access scan settings from supported Mac and Linux products also migrate to the On-Access Scan and Options policies in Threat Prevention. These migrated policies can be multi-platform or single-platform. Figure 4-3 Migrating on-access scan settings from Windows, Mac, and Linux See also Migrating legacy Mac policies to Threat Prevention on page 44 Migrating legacy Linux policies to Threat Prevention on page 46 Multiple-platform and single-platform policies on page 27 McAfee Endpoint Security 10.2.0 Migration Guide 35 4 How migration updates product settings Migrating IPS Rules to Threat Prevention Migrating IPS Rules to Threat Prevention This overview shows where migrated settings for the IPS Rules and IPS Protection policies from McAfee Host IPS appear in Endpoint Security policies. Figure 4-4 Where IPS Rules settings migrate Migration notes for IPS Rules settings During the migration process to Endpoint Security, the Endpoint Migration Assistant moves your migrated IPS Rules and IPS Protection policy settings into Threat Prevention policies. See Appendix B, IPS Rules migration, for more information about how IPS Rules are migrated to Endpoint Security policies. Policy settings that are migrated These settings are migrated: • IPS custom signature subrules for files, registry, and programs • IPS Application Protection Rules • IPS Exceptions Signatures Only custom signatures migrate. McAfee-defined (canned) signatures do not migrate, even if you have modified them. Signatures with IDs in the 4001–6000 range migrate to Access Protection custom rules. 36 • Each subrule of a signature migrates as an individual Access Protection custom rule in Threat Prevention. • The same signature settings (name, severity, notes, and description) migrate to all rules created in Threat Prevention for all IPS subrules of the signature. • A signature name is required. If a signature doesn't have name, the rules using the signature don't migrate. • The Severity level and Log status settings from the IPS Rules policy merge with the Reaction setting from the IPS Protection policy to determine the Block/Report settings for migrated Rules in Threat Prevention. McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating IPS Rules to Threat Prevention 4 Application Protection Rules Excluded applications from Application Protection rules migrate to the Exploit Prevention policy as Exclusions. Exception Rules Exception Rules from the IPS Rules policy migrate to the Access Protection and Exploit Prevention policies as executables under Exclusions. Source Exception Signature type Target Endpoint Security policy Target setting Executables, Caller module, and API Kevlar signatures (IDs 6052, 428, 6012, 6013, 6014, and 6015) Exploit Protection Exclusions Executables and Parameters FILE/REGISTRY/PROGRAM signatures Access Protection Executables and subrule Parameters Executables No signature Access Protection Global Exclusions Exploit Protection GPEP (General Privilege Escalation Prevention) signature Severity/reaction signature (ID 6052) Exploit Protection Enable General Privilege Escalation Prevention Exception Rules with signatures IPS Exceptions can include custom signatures. The executables and parameters from exceptions are appended to the Endpoint Security Access Protection Rule created during signature migration. If all McAfee-defined signatures are added to a subrule exception, the exception migrates as a global exclusion in the Access Protection and Exploit Prevention policies. See also Changes to IPS Rules settings in Host Intrusion Prevention on page 78 Merging Access Protection and Buffer Overflow Protection settings Access Protection, Buffer Overflow Protection, and IPS Rules policy settings from VirusScan Enterprise and McAfee Host IPS migrate to two Threat Prevention policies and the Endpoint Security Common policy. These policy types are migrated to the Access Protection policy in Threat Prevention: • McAfee Host IPS — IPS Rules • VirusScan Enterprise — Access Protection These policy types are migrated to the Exploit Prevention policy in Threat Prevention: • McAfee Host IPS — IPS Rules • VirusScan Enterprise — Buffer Overflow Protection McAfee Endpoint Security 10.2.0 Migration Guide 37 4 How migration updates product settings Migrating IPS Rules to Threat Prevention For more information, see Appendix B, IPS Rules migration, and Appendix E, Changes to migrated settings. Figure 4-5 Migrating Access Protection and Buffer Overflow Protection settings from legacy products See also Changes to VirusScan Enterprise settings on page 71 Changes to IPS Rules settings in Host Intrusion Prevention on page 78 38 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating Host IPS Firewall policies to Endpoint Security Firewall 4 Migrating Host IPS Firewall policies to Endpoint Security Firewall This overview shows where migrated policy settings for the Firewall and General policy options from McAfee Host IPS appear in Endpoint Security policies. Only settings for the Firewall and General policies migrate to Endpoint Security Firewall. You can continue to manage McAfee Host Intrusion Prevention as a separate extension, with its remaining policy settings in effect, or you can migrate its policy settings to Threat Prevention policies. Figure 4-6 Where Host IPS Firewall settings migrate McAfee Endpoint Security 10.2.0 Migration Guide 39 4 How migration updates product settings Migrating Host IPS Firewall policies to Endpoint Security Firewall Migration notes for McAfee Host IPS Firewall settings During the migration process to Endpoint Security 10.2, the Endpoint Migration Assistant adjusts the migrated settings in your target policies to address differences between the legacy product and the new product. Therefore, some of the target policy settings don't match your legacy settings. Policy settings that are migrated Only policy types from the Firewall and General policies that apply to the Endpoint Security Firewall are migrated: • Client UI • DNS Rules • Trusted Applications • Firewall Rules • Trusted Networks • Firewall Options Multiple-instance policies Trusted Applications policies are multiple-instance policies. When you migrate them, they are merged into one target policy for the policy type. These changes occur when you migrate Trusted Applications policies: • For all the source instances that have the McAfee Host IPS Firewall enabled, trusted executables are appended to the Trusted Executables list in the target Firewall Options policy. • If there is a default policy (McAfee Default, My Default (unedited), or Typical Corporate Environment) in any instance of the source policies, the Migration Assistant adds Endpoint Security McAfee Default values to the Endpoint Security target policy. Host IPS Catalog migration When migrating manually, the best practice is to migrate the Host IPS Catalog immediately before the Host Intrusion Prevention Firewall policies. This ensures that they remain synchronized. If Firewall policy settings change after migrating the Catalog, migrate the Catalog again, then migrate the policies. The Migration Assistant displays the date and time when the catalog was last migrated, if applicable, next to the option to migrate the catalog. Firewall Rules and Trusted Networks The Trusted Networks | Trust for IPS setting in McAfee Host IPS does not correspond directly to a setting in Endpoint Security Firewall policies. 40 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating Host IPS Firewall policies to Endpoint Security Firewall 4 Table 4-8 How trusted networks are migrated Product What you need to know McAfee Host IPS Firewall How legacy feature works: IP addresses become "trusted" only after they are applied to firewall rules that "allow" them. How policy setting is migrated: IP addresses that were formerly listed under Trusted Networks | Trust for IPS migrate as Defined Networks | Not trusted in the target Firewall Options policy. You can set them to trusted there. Endpoint Security Firewall How new Defined Networks feature works: All traffic is allowed to Defined Networks that are labeled Trusted in the target Firewall Options policy. Add IP addresses that you want to treat as trusted networks. How to configure migrated policy setting: Configure traffic to the IP addresses that were migrated as Not trusted by associating them with firewall rules in the Firewall Rules policy. See the Endpoint Security Firewall Help for more information. See also Changes to Firewall settings on page 81 McAfee Endpoint Security 10.2.0 Migration Guide 41 4 How migration updates product settings Migrating SiteAdvisor Enterprise policies to Web Control Migrating SiteAdvisor Enterprise policies to Web Control This overview shows where migrated policy settings for McAfee SiteAdvisor Enterprise appear in Endpoint Security policies. Figure 4-7 Where SiteAdvisor Enterprise settings migrate Migration notes for SiteAdvisor Enterprise settings During the migration process to Endpoint Security 10.2, the Endpoint Migration Assistant adjusts the migrated settings in your target policies to address differences between the legacy product and the new product. Therefore, some of the target policy settings don't match your legacy settings. Multiple-instance policies The Authorize List, Prohibit List, and Content Actions policies are multiple-instance policies. When you migrate them, multiple instances are merged into one target policy for each policy type. If any instance of a source policy is a default policy (My Default (unedited) or McAfee Default), the Endpoint Security McAfee Default instance is used for the target policy instead of merging. • Block and Allow List All instances of SiteAdvisor Enterprise Authorize List and Prohibit List source policies are merged into one Endpoint Security Block and Allow List target policy. 42 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating SiteAdvisor Enterprise policies to Web Control 4 Each source policy instance has these settings: • Track events and request information from the McAfee SiteAdvisor server. • Configure access to individual file downloads based on their rating. • Give this Authorize List precedence over the Prohibit List. For each of these settings, if the value of the setting is the same for all instances of the source policies, the value is migrated. Otherwise, the target policy uses the Endpoint Security McAfee Default settings. Site entries from the Authorize List and Prohibit List migrate to a target Block and Allow List. • Content Actions All instances of source policies that have the Enable Categorization option selected are evaluated during migration. When merging policies that have different actions defined for categories, the most stringent action from the Action for green column is applied to each category in the target policy. Actions specified for yellow, red, and unrated content are ignored when creating the target policy. For the following special categories, both Action for green and Action for unrated columns are considered: • Anonymizers • Phishing • Anonymizing Utilities • Personal Network Storage • Potential Hacking/Computer Crime • Spam URLs • Malicious Sites • Interactive Web Applications • P2P/File Sharing • Parked Domain • Remote Access • Residential IP Addresses • Resource Sharing • Browser Exploits • Shareware/Freeware • Malicious Downloads • Spyware/Adware/Keyloggers • PUPs For all instances of source policies where the Enable Categorization option is not selected, the option is deselected in the target policy. The Endpoint Security McAfee Default settings are added for all categories. See also Changes to SiteAdvisor Enterprise settings on page 84 McAfee Endpoint Security 10.2.0 Migration Guide 43 4 How migration updates product settings Migrating legacy Mac policies to Threat Prevention Migrating legacy Mac policies to Threat Prevention This overview shows where migrated policy settings for McAfee Endpoint Protection for Mac appear in Endpoint Security policies. The On-access Scan settings and exclusions configured in the Anti-malware policy migrate to the Threat Prevention On-AccessScan policy. You can migrate the settings to a single-platform Mac policy or a multi-platform policy shared by Windows, Mac, and Linux systems. Figure 4-8 Where McAfee Endpoint Protection for Mac settings migrate See also Merging on-access scan settings from Windows, Mac, and Linux on page 35 Migration notes for McAfee Endpoint Protection for Mac settings During the migration process to Endpoint Security for Mac, the Endpoint Migration Assistant moves your migrated settings into a Threat Prevention policy. Policy settings that are migrated Only On-access Scan settings and exclusions from the Anti-malware policy are migrated. They are migrated to the On-Access Scan policy in Threat Prevention. 44 • On-Access Scan exclusions are always migrated. • If you are migrating VirusScan Enterprise settings, they take precedence over McAfee Endpoint Protection for Mac settings. Duplicate Mac settings are not migrated. • If you are not migrating VirusScan Enterprise settings, additional settings are migrated from McAfee Endpoint Protection for Mac. McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating legacy Mac policies to Threat Prevention 4 License check The Migration Assistant checks for a Threat Prevention Mac License extension. If the license is absent, Mac migration options are not available for automatic or manual migration. Multiple-platform or single-platform policies When you migrate McAfee Endpoint Protection for Mac along with Windows or Linux products, the target Threat Prevention On-Access Scan policy can define settings for one or more operating system platforms. • During automatic migration — One merged (multi-platform) policy is created for all the platforms being migrated. • During manual migration — Specify whether to create one merged (multi-platform) policy or separate (single-platform) policies. • Select Create Multi-Platform Policy to create one policy that contains settings for all the platforms being migrated (for example, Mac, Windows, and Linux). • Deselect Create Multi-Platform Policy to create separate On-Access Scan policies: one with migrated McAfee Endpoint Protection for Mac settings for the Mac platform, and others with settings for Windows or Linux. Responses to detections In response to threat and unwanted program detections, McAfee EPM lets you specify these actions: Clean, Quarantine, and Delete. You can specify a primary action and a secondary action (to perform only if the primary action fails). However, the Quarantine option isn't available in Threat Prevention. Therefore, these changes occur to the response settings during migration to the On-Access Scan policy in Threat Prevention. • The Quarantine option migrates to Delete. • Exception: If Quarantine and Delete are selected as the primary and secondary actions in McAfee EPM, the secondary response migrates to Deny. See also Changes to McAfee Endpoint Protection for Mac settings on page 88 McAfee Endpoint Security 10.2.0 Migration Guide 45 4 How migration updates product settings Migrating legacy Linux policies to Threat Prevention Migrating legacy Linux policies to Threat Prevention This overview shows where migrated policy settings for McAfee VirusScan Enterprise for Linux appear in Endpoint Security policies. The on-access scan exclusions and other settings configured in the On-Access Scanning policy migrate to the Threat Prevention On-Access Scan and Options policies. You can migrate the settings to a single-platform Linux policy or a multi-platform policy shared by Windows, Mac, and Linux systems. Figure 4-9 Where McAfee VirusScan Enterprise for Linux settings migrate See also Merging on-access scan settings from Windows, Mac, and Linux on page 35 Migration notes for VirusScan Enterprise for Linux settings During the migration process to Endpoint Security for Linux, the Endpoint Migration Assistant moves your migrated settings into a Threat Prevention policy. You can manage systems running Endpoint Security for Linux with the Endpoint Security Threat Prevention extension in McAfee ePO. Endpoint Security Firewall and Web Control are not supported for Linux. 46 McAfee Endpoint Security 10.2.0 Migration Guide How migration updates product settings Migrating legacy Linux policies to Threat Prevention 4 Policy settings that are migrated Only settings from the On-Access Scanning policy are migrated. • On-Access Scan exclusions are always migrated. • If you are migrating VirusScan Enterprise or McAfee Endpoint Protection for Mac settings, they take precedence over VirusScan Enterprise for Linux settings. Duplicate Linux settings are not migrated. • If you are not migrating VirusScan Enterprise or McAfee Endpoint Protection for Mac settings, additional settings are migrated from VirusScan Enterprise for Linux. Client tasks that are migrated Custom scheduled on-demand scan client tasks are migrated to the Client Task Catalog. License check The Migration Assistant checks for a Threat Prevention Linux License extension. If the license is absent, Linux migration options are not available for automatic or manual migration. Multiple-platform or single-platform policies When you migrate VirusScan Enterprise for Linux with Windows or Mac products, the target Threat Prevention policies can define settings for one or more operating system platforms. • • During automatic migration — Two merged (multi-platform) policies are created for all platforms being migrated. • One On-Access Scan for Windows, Mac, and Linux systems. • One Options policy for Windows and Linux systems. During manual migration — Specify whether to create merged (multi-platform) policies or separate (single-platform) policies. • Select Create Multi-Platform Policy to create one On-Access Scan policy and one Options policy that contain settings for all platforms being migrated (for example, Windows and Linux). • Deselect Create Multi-Platform Policy to create an On-Access Scan policy and an Options policy with only migrated VirusScan Enterprise for Linux settings, then create separate policies with settings for Windows or Mac. Scan exclusions Endpoint Security for Linux does not support regular expressions as scan exclusions. If regular expressions do migrate successfully from VirusScan Enterprise for Linux, Endpoint Security for Linux ignores them. See also Changes to McAfee VirusScan Enterprise for Linux settings on page 90 McAfee Endpoint Security 10.2.0 Migration Guide 47 4 How migration updates product settings Migrating legacy Linux policies to Threat Prevention 48 McAfee Endpoint Security 10.2.0 Migration Guide A Troubleshooting Use this information to resolve problems during the migration process. Error messages Error messages are displayed by programs when an unexpected condition occurs that can't be fixed by the program itself. Use this list to find an error message, an explanation of the condition, and any action you can take to correct it. Table A-1 Migration Assistant error messages Message Description Solution There are no products installed that can be migrated. You can migrate only the settings that you have permission to view. Check your permissions and update them if needed. An Endpoint Security Migration server task is running and must be completed before continuing. You can't begin another migration until the server task is complete. Wait until the server task is complete, then begin another migration. McAfee Endpoint Security 10.2.0 Migration Guide 49 A Troubleshooting Error messages 50 McAfee Endpoint Security 10.2.0 Migration Guide B IPS Rules migration Endpoint Security uses the logic described in this appendix to configure migrated settings from the IPS Rules and IPS Protection policies in McAfee Host IPS. Settings migrate to the Access Protection and Exploit Prevention policies in Threat Prevention. Contents Signature-level settings in migrated IPS Rules Subrule-level settings in migrated IPS Rules Exceptions Application Protection Rules Signature-level settings in migrated IPS Rules Signature-level settings migrate to Access Protection Rules according to these guidelines. Signature-level settings include Block and Report, Notes, and Rule Name. Migrated Block and Report settings Endpoint Security uses these legacy settings in McAfee Host IPS to determine the Block and Report settings under Rules in the target Access Protection policies: • IPS Rules: Signature tab — Severity and Log status • IPS Protection — Reaction To determine the Block setting for the migrated target policy, the Migration Assistant: 1 Reads the source signature Severity setting from the IPS Rules policy. The possible values are High, Medium, Low, Informational, and Disabled. 2 From the IPS Protection policy, reads the Reaction setting for the corresponding severity. For example, if Severity is set to Medium, it reads the Reaction setting value for Medium. 3 If the Reaction value is Prevent, the Block setting is Enabled. Otherwise, it is Disabled. 4 If Severity is Disabled, both Report and Block settings are Disabled. Endpoint Security determines the migrated Report setting as follows: Source IPS Rules policy: Log status setting Source IPS Protection policy: Reaction setting Target Access Protection policy: Report setting Enabled Prevent or Log Enabled Enabled Ignore Disabled Disabled N/A Disabled McAfee Endpoint Security 10.2.0 Migration Guide 51 B IPS Rules migration Subrule-level settings in migrated IPS Rules Notes Source Notes and Description data merges and migrates to the Notes section of the Endpoint Security Rule, using this format: Notes: <IPS Notes section>; Description: <IPS Description section> Rule Name The source signature name and subrule name merge and migrate to the Endpoint Security Rule name, using this format: <IPS Signature name>_<IPS Subrule name> Settings that don't migrate Settings for Signature ID, Type, and Client rules don't migrate. Subrule-level settings in migrated IPS Rules Subrules migrate to Access Protection policies according to these guidelines. General migration guidelines • Only Standard subrules migrate. Expert subrules don't migrate. • The signature subrule name is required. It migrates to the subrule name. • Subrules with these Rule types migrate: Files, Registry, and Programs. • Subrules with a Rule type of Registry can have a parameter for Registry (Key) and Registry (Value). Its value determines where these subrules migrate in the Access Protection policy. • • Rules with a Registry (Key) parameter migrate to a Registry Key type rule. • Rules with a Registry (Value) parameter migrate to a Registry Value type rule. • Rules with both parameters do not migrate. Most operations migrate directly to the corresponding equivalent for their type. Special cases are described in the following sections. If source data is null or missing, it doesn't migrate. Files subrules 52 • File parameter data is required. Subrules must have at least one parameter to migrate. • The Destination file parameter migrates only when Rename Operation is enabled. • The User name parameter from the IPS subrule migrates to the User Names section in the target Rule. • The Drive type parameter migrates to the target subrule parameters list Drive Type as follows: • CD or DVD migrates to CD/DVD. • Floppy migrates to Floppy. • OtherRemovable or USB migrates to Removable. • HardDrive migrates to Fixed. • Network migrates to Network. McAfee Endpoint Security 10.2.0 Migration Guide IPS Rules migration Exceptions B Registry subrules • Registry parameter data is required. Subrules must have a least one parameter to migrate. • If one subrule has parameters for both Registry (Key) and Registry (Value), the subrule doesn't migrate. • The User name parameter from the IPS subrule migrates to the User Names section in the target Rule. • Endpoint Security doesn't support the Registry Value Operation setting for Enumerate. If only this operation is defined for a registry subrule, the subrule doesn't migrate. Programs subrules • Program parameter data is required. Subrules must have a least one parameter to migrate. • User name moves up to the rule level in Endpoint Security. • Caller module doesn't migrate. • Target Executable migrates to Process. If the source subrule doesn't specify a value for Target Executable, it doesn't migrate. • Endpoint Security doesn't support the Operation setting for Open with Access to wait. If only this operation is defined for a program subrule, the subrule doesn't migrate. Executables Executables in Files, Registry, and Programs subrules migrate to Rule-level executables. • Fingerprint migrates to MD5 hash. • Signer migrates. • File Description doesn't migrate. • Target Executable migrates to Process. If the source subrule doesn't specify a value for Target Executable, it doesn't migrate. Exceptions IPS Exception Rules migrate to Access Protection and Exploit Prevention policies according to these guidelines. Exceptions can have custom signatures, McAfee-defined (canned) signatures, a mixture of both types, or no signature. • Custom signature exceptions migrate to the Access Protection policy. • McAfee-defined exceptions migrate to the Exploit Prevention policy. • Global exceptions migrate to both policies. Custom signature exceptions (Files/Registry/Programs) • Exceptions with custom signatures migrate to the Access Protection Rules that were created during IPS Signature migration. • Executables from IPS Exceptions that have custom Files/Registry/Programs signatures migrate to Executables in the Files/Registry/Programs Rules. If an Exception has more than one executable for a Files/Registry/Programs Rules custom signature, all executables migrate as Executables. McAfee Endpoint Security 10.2.0 Migration Guide 53 B IPS Rules migration Exceptions • Exceptions: Executables migrate to Files/Registry/Programs rules from only custom signatures. • Exceptions: Programs signature: Target executables migrate to the Target executable for the Process subrule. • For exceptions with Handler Module or Caller Module parameters, only the executables migrate. Handler Module or Caller Module parameters don't migrate. • Domain Group parameters don't migrate. • Exceptions with two or more of these parameters defined do not migrate: • • Target Executable • Files parameter (Files, dest_file, and/or drive type) • Registry (Key) • Registry (Value) Exceptions migrate to Process Rules when they: • Do have Target Executable. • Don't have Files parameter (Files, dest_file, and/or drive type). • Don't have Registry (Key). • Don't have Registry (Value). If the exceptions have executables, the executables migrate to Process Rule level, and target executables migrate to Process Rule: Subrule parameters. • Exceptions migrate to File Rules when they: • Do have the Executable OR Files parameter (Files, dest_file, and/or drive type). • Don't have Target Executable. • Don't have Registry (Key). • Don't have Registry (Value). If the exceptions have executables, the executables migrate to the File Rule level. If the exceptions have the Files parameter (Files, dest_file, and/or drive type), they migrate to File Rule: Subrule parameters. • Exceptions migrate to Registry Key Rules when they: • Do have the Executable OR Registry (Key) parameter. • Don't have Target Executable. • Don't have Files parameter (Files, dest_file, and/or drive type). • Don't have Registry (Value). If the exceptions have executables, the executables migrate to the Key Rule level. If the exceptions have the Key parameter, they migrate to Key Rule: Subrule parameters. • 54 Exceptions migrate to Registry Value Rules when they: • Do have the Executable OR Registry (Value) parameter. • Don't have Target Executable. McAfee Endpoint Security 10.2.0 Migration Guide IPS Rules migration Application Protection Rules • Don't have Files parameter (Files, dest_file, and/or drive type). • Don't have Registry (Key). B If the exceptions have executables, the executables migrate to the Value Rule level. If the exceptions have Value parameter, they migrate to Value Rule: Subrule parameters. • User name applies to all three categories, in a similar way to the executables previously described. If User name migrates with the executables to Access Protection Rules, the migrated Access Protection Rules have both the executable and user name. McAfee-defined signature exceptions • Executables from IPS Exceptions that have signature IDs 6052, 428, 6012, 6013, 6014, or 6015 migrate to Exploit Prevention exclusions in Endpoint Security. • If an exception has more than one executable, handler, or caller module, only the first executable, handler, or caller module migrates. • Exploit Prevention doesn't support exclusion name, so Executable name doesn't migrate to Exploit Prevention. • Domain Group parameters don't migrate. Global exceptions Global exceptions migrate to both the Access Protection and Exploit Prevention policies as global exclusions in a similar way to the exceptions previously described. An exception is considered global if it has no signatures added or has all the McAfee-defined signatures added but no custom signatures. • Exceptions with two or more of these parameters defined don't migrate: • Target Executable • Files parameter (Files, dest_file, and/or drive type) • Registry (Key) • Registry (Value) Application Protection Rules Application Protection Rules migrate to Endpoint Security Exploit Prevention policies according to these guidelines. Excluded applications from Application Protection Rules migrate to Exploit Prevention exclusions. McAfee Endpoint Security 10.2.0 Migration Guide 55 B IPS Rules migration Application Protection Rules 56 McAfee Endpoint Security 10.2.0 Migration Guide C Creating Firewall rules to replace predefined Access Protection portblocking rules The Migration Assistant does not migrate predefined or user-defined Access Protection port-blocking rules from VirusScan Enterprise 8.8. However, you can create firewall rules in Endpoint Security Firewall that define behavior equivalent to the predefined VirusScan Enterprise port-blocking rules. VirusScan Enterprise 8.8 includes these four predefined port-blocking rules that are not migrated: • AVO10: Prevent mass mailing worms from sending mail • AVO11: Prevent IRC communication • CW05: Prevent FTP communication • CS06: Prevent HTTP communication Contents Create Create Create Create rule rule rule rule to to to to prevent prevent prevent prevent mass mailing worms from sending mail IRC communication FTP communication HTTP communication Create rule to prevent mass mailing worms from sending mail Use this task to create Endpoint Security 10.2 firewall rules that are equivalent to the predefined Access Protection rule AVO10 in VirusScan Enterprise 8.8. See the Endpoint Security Firewall Help for more information about creating firewall rules. Rule AVO10: Prevent mass mailing worms from sending mail Rule AVO10 G_030_AntiVirusOn { Description "Prevent mass mailing worms from sending mail" Process { Include * Exclude ${DefaultEmailClient} ${DefaultBrowser} eudora.exe msimn.exe msn6.exe msnmsgr.exe neo20.exe nlnotes.exe outlook.exe pine.exe poco.exe thebat.exe thunde*.exe winpm-32.exe MAPISP32.exe VMIMB.EXE RESRCMON.EXE Owstimer.exe SPSNotific* WinMail.exe explorer.exe iexplore.exe firefox.exe mozilla.exe netscp.exe opera.exe msn6.exe $ {epotomcatdir}\\bin\\tomcat.exe ${epotomcatdir}\\bin\\tomcat5.exe ${epotomcatdir}\\bin\ \tomcat5w.exe ${epotomcatdir}\\bin\\tomcat7.exe inetinfo.exe amgrsrvc.exe ${epoapachedir}\ \bin\\apache.exe webproxy.exe msexcimc.exe Exclude ntaskldr.exe nsmtp.exe nrouter.exe agent.exe Exclude ebs.exe firesvc.exe modulewrapper* msksrvr.exe mskdetct.exe mailscan.exe rpcserv.exe Exclude mdaemon.exe worldclient.exe wspsrv.exe } Port OTU { Include 25 Include 587 } McAfee Endpoint Security 10.2.0 Migration Guide 57 C Creating Firewall rules to replace predefined Access Protection port-blocking rules Create rule to prevent mass mailing worms from sending mail } You need to create two firewall rules to provide equivalent functionality to the VirusScan Enterprise 8.8 rule. Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Policy Catalog, then select Endpoint Security Firewall from the Product list. 2 From the Category list, select Rules. 3 Click the name of the assigned Firewall Rules policy. 4 Click Add Rule, then configure a rule with the following settings. To be effective, this rule must be positioned above any other rules that block or allow outgoing TCP traffic to remote ports 25 or 587. • Action: Block • Direction: Out • Network protocol: Any protocol • Transport protocol: TCP • Remote ports: 25 and 587 • Applications: Add executables with the file name or path* set to the Exclude section in the AVO10 rule.** * Variable names ${DefaultEmailClient}, ${DefaultBrowser}, ${epotomcatdir}, $ {epoapachedir} are not supported by Endpoint Security 10.2, so in order to add these executables, you need to add the executable file names associated with the desired default email client, default browser, McAfee ePO Tomcat Install directory before \bin\, and McAfee ePO Apache Install directory before \bin\. ** Use single backslashes instead of double backslashes. 5 Click Save. 6 Click Add Rule, then configure a second rule directly below the rule you created in step 4: 7 • Action: Block • Transport protocol: TCP • Direction: Out • Remote ports: 25 and 587 • Network protocol: Any protocol Click Save. This rule is created and enabled in Endpoint Security 10.2 for all managed systems where it is assigned. The AVO10 rule was disabled by default in VirusScan Enterprise 8.8, so the traffic was allowed. To achieve the VirusScan Enterprise default behavior in Endpoint Security, change the Block rule's Action to Allow. 58 McAfee Endpoint Security 10.2.0 Migration Guide Creating Firewall rules to replace predefined Access Protection port-blocking rules Create rule to prevent IRC communication C Create rule to prevent IRC communication Use this task to create an Endpoint Security 10.2 firewall rule that is equivalent to the predefined Access Protection rule AVO11 in VirusScan Enterprise 8.8. See the Endpoint Security Firewall Help for more information about creating firewall rules. Rule AVO10: Prevent mass mailing worms from sending mail Rule AVO11 G_030_AntiVirusOn { Description "Prevent IRC communication" Process { Include * } Port IOTU { Include 6666 6669 } } Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Policy Catalog, then select Endpoint Security Firewall from the Product list. 2 From the Category list, select Rules. 3 Click the name of the assigned Firewall Rules policy. 4 Click New Rule, then configure the following settings. 5 • Action: Block • Transport protocol: TCP • Direction: Either • Local ports: 6666-6669 • Network protocol: Any protocol • Remote ports: 6666-6669 Click Save. This rule is created and enabled in Endpoint Security 10.2 for all managed systems where it is assigned. The AVO11 rule was disabled by default in VirusScan Enterprise 8.8, so IRC traffic was allowed. To achieve the VirusScan Enterprise default behavior in Endpoint Security, change the Block rule's Action to Allow. Create rule to prevent FTP communication Use this task to create Endpoint Security Firewall 10.2 firewall rules that are equivalent to the predefined Access Protection rule CW05 in VirusScan Enterprise 8.8. See the Endpoint Security Firewall Help for more information about creating firewall rules. Rule CW05: Prevent FTP communication Rule CW05 G_070_CommonOff { Description "Prevent FTP communication" Enforce 0 Report 0 Process { Include * Exclude ${DefaultBrowser} explorer.exe iexplore.exe firefox.exe mozilla.exe netscp.exe opera.exe msn6.exe ${epotomcatdir}\\bin\\tomcat.exe ${epotomcatdir}\\bin\ \tomcat5.exe ${epotomcatdir}\\bin\\tomcat5w.exe ${epotomcatdir}\\bin\\tomcat7.exe inetinfo.exe amgrsrvc.exe ${epoapachedir}\\bin\\apache.exe webproxy.exe msexcimc.exe McAfee Endpoint Security 10.2.0 Migration Guide 59 C Creating Firewall rules to replace predefined Access Protection port-blocking rules Create rule to prevent FTP communication mcscript* frameworks* naprdmgr.exe naprdmgr64.exe frminst.exe naimserv.exe framepkg.exe narepl32.exe updaterui.exe cmdagent.exe cleanup.exe mctray.exe udaterui.exe framepkg_upd.exe mue_inuse.exe setlicense.exe mcscancheck.exe lucoms* luupdate.exe lsetup.exe idsinst.exe sevinst.exe nv11esd.exe tsc.exe v3cfgu.exe ofcservice.exe earthagent.exe tmlisten.exe inodist.exe ilaunchr.exe ii_nt86.exe iv_nt86.exe cfgeng.exe f-secu* fspex.exe getdbhtp.exe fnrb32.exe "f-secure automa*" sucer.exe ahnun000.tmp supdate.exe autoup.exe pskmssvc.exe pavagent.exe dstest.exe paddsupd.exe pavsrv50.exe avtask.exe giantantispywa* boxinfo.exe Exclude pasys* google* Exclude alg.exe ftp.exe agentnt.exe } Port OTU { Include 20 21 } } You need to create two firewall rules to provide equivalent functionality to the VirusScan Enterprise 8.8 rule. Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Policy Catalog, then select Endpoint Security Firewall from the Product list. 2 From the Category list, select Rules. 3 Click the name of the assigned Firewall Rules policy. 4 Click Add Rule, then configure a rule with the following settings. To be effective, this rule must be positioned above any other rules that block or allow outgoing TCP traffic to remote ports 20 or 21. • Action: Allow • Direction: Out • Network protocol: Any protocol • Transport protocol: TCP • Remote ports: 20 and 21 • Applications: Add executables with the file name or path* set to the Exclude section in the VirusScan Enterprise rule above.** * Variable names ${DefaultEmailClient}, ${DefaultBrowser}, ${epotomcatdir}, and$ {epoapachedir} are not supported by Endpoint Security Firewall 10.2. To add these executables, you need to add the executable file names associated with the desired default email client, default browser, McAfee ePO Tomcat Install directory before \bin\, and McAfee ePO Apache Install directory before \bin\. ** Use single backslashes instead of double backslashes. 5 Click Save. 6 Click Add Rule, then configure a second rule directly below the rule you created in step 4: 7 60 • Action: Block • Transport protocol: TCP • Direction: Out • Remote ports: 20 and 21 • Network protocol: Any protocol Click Save. McAfee Endpoint Security 10.2.0 Migration Guide Creating Firewall rules to replace predefined Access Protection port-blocking rules Create rule to prevent HTTP communication C This rule is created and enabled in Endpoint Security 10.2 for all managed systems where it is assigned. The CW05 rule was disabled by default in VirusScan Enterprise 8.8, so FTP traffic was allowed. To achieve the VirusScan Enterprise default behavior in Endpoint Security, change the Block rule's Action to Allow. Create rule to prevent HTTP communication Create Endpoint Security 10.2 firewall rules that are equivalent to the predefined Access Protection rule CW06 in VirusScan Enterprise 8.8. See the Endpoint Security Firewall Help for more information about creating firewall rules. Rule CW06: Prevent HTTP communication Rule CW06 G_070_CommonOff { Description "Prevent HTTP communication" Enforce 0 Report 0 Process { Include * Exclude ${DefaultBrowser} ${DefaultEmailClient} explorer.exe iexplore.exe firefox.exe mozilla.exe netscp.exe opera.exe msn6.exe ${epotomcatdir}\\bin\\tomcat.exe $ {epotomcatdir}\\bin\\tomcat5.exe ${epotomcatdir}\\bin\\tomcat5w.exe ${epotomcatdir}\\bin\ \tomcat7.exe inetinfo.exe amgrsrvc.exe ${epoapachedir}\\bin\\apache.exe webproxy.exe msexcimc.exe mcscript* frameworks* naprdmgr.exe naprdmgr64.exe frminst.exe naimserv.exe framepkg.exe narepl32.exe updaterui.exe cmdagent.exe cleanup.exe mctray.exe udaterui.exe framepkg_upd.exe mue_inuse.exe setlicense.exe mcscancheck.exe eudora.exe msimn.exe msn6.exe msnmsgr.exe neo20.exe nlnotes.exe outlook.exe pine.exe poco.exe thebat.exe thunde*.exe winpm-32.exe MAPISP32.exe VMIMB.EXE RESRCMON.EXE Owstimer.exe SPSNotific* WinMail.exe msiexec.exe msi*.tmp setup.exe ikernel.exe setup*.exe ?setup.exe ??setup.exe ???setup.exe _ins*._mp McAfeeHIP_Clie* InsFireTdi.exe update.exe uninstall.exe SAEuninstall.exe SAEDisable.exe Setup_SAE.exe Exclude lucoms* luupdate.exe lsetup.exe idsinst.exe sevinst.exe nv11esd.exe tsc.exe v3cfgu.exe ofcservice.exe earthagent.exe tmlisten.exe inodist.exe ilaunchr.exe ii_nt86.exe iv_nt86.exe cfgeng.exe f-secu* fspex.exe getdbhtp.exe fnrb32.exe "f-secure automa*" sucer.exe ahnun000.tmp supdate.exe autoup.exe pskmssvc.exe pavagent.exe dstest.exe paddsupd.exe pavsrv50.exe avtask.exe giantantispywa* boxinfo.exe Exclude alg.exe mobsync.exe waol.exe agentnt.exe svchost.exe runscheduled.exe pasys* google* backweb-* Exclude vmnat.exe devenv.exe windbg.exe jucheck.exe realplay.exe acrord32.exe acrobat.exe Exclude wfica32.exe mmc.exe mshta.exe dwwin.exe wmplayer.exe console.exe wuauclt.exe Exclude javaw.exe ccmexec.exe ntaskldr.exe winamp.exe realplay.exe quicktimeplaye* SiteAdv.exe McSACore.exe } Port OTU { Include 80 Include 443 } } Task For details about product features, usage, and best practices, click ? or Help. 1 In McAfee ePO, select Menu | Policy | Policy Catalog, then select Endpoint Security Firewall from the Product list. 2 From the Category list, select Rules. 3 Click the name of the assigned Firewall Rules policy. McAfee Endpoint Security 10.2.0 Migration Guide 61 C Creating Firewall rules to replace predefined Access Protection port-blocking rules Create rule to prevent HTTP communication 4 Click Add Rule, then configure a rule with the following settings. To be effective, this rule must be positioned above any other rules that block or allow outgoing TCP traffic to remote ports 80 or 443. • Action: Allow • Direction: Out • Network protocol: Any protocol • Transport protocol: TCP • Remote ports: 80 and 443 • Applications: Add executables with the file name or path* set to the Exclude section in the CW06 rule.** * Variable names ${DefaultEmailClient}, ${DefaultBrowser}, ${epotomcatdir}, $ {epoapachedir} are not supported by Endpoint Security 10.2. To add these executables, you need to add the executable file names associated with the desired default email client, default browser, McAfee ePO Tomcat Install directory before \bin\, and McAfee ePO Apache Install directory before \bin\. ** Use single backslashes instead of double backslashes. 5 Click Save. 6 Click Add Rule, then configure a second rule directly below the rule you created in step 4: 7 • Action: Block • Transport protocol: TCP • Direction: Out • Remote ports: 80 and 443 • Network protocol: Any protocol Click Save. This rule is created and enabled in Endpoint Security 10.2 for all managed systems where it is assigned. The CW06 rule was disabled by default in VirusScan Enterprise 8.8, so HTTP traffic was allowed. To achieve the VirusScan Enterprise default behavior in Endpoint Security, change the Block rule's Action to Allow. 62 McAfee Endpoint Security 10.2.0 Migration Guide D Maps of migrated policies These policy overview diagrams show where legacy policy settings appear in McAfee Endpoint Security policies. Policy maps Use these maps to see where legacy settings are moved or merged during migration to Endpoint Security policies. See Appendix E, Changes to migrated settings, for details about settings that are removed, moved, renamed, or merged. Migrating VirusScan Enterprise settings (Windows) Settings from VirusScan Enterprise migrate to multiple Threat Prevention policies and the Endpoint Security Common policy. McAfee Endpoint Security 10.2.0 Migration Guide 63 D Maps of migrated policies Policy maps Migrating on-access scan settings to Threat Prevention policies (Windows, Mac, and Linux) On-access scan settings from VirusScan Enterprise, McAfee Endpoint Protection for Mac, and VirusScan Enterprise for Linux migrate to two Threat Prevention policies. 64 • On-Access Scan exclusions are always migrated. • If you are migrating products for multiple operating system platforms: • VirusScan Enterprise settings take precedence over McAfee Endpoint Protection for Mac settings and VirusScan Enterprise for Linux settings. • McAfee Endpoint Protection for Mac settings take precedence over VirusScan Enterprise for Linux settings. McAfee Endpoint Security 10.2.0 Migration Guide Maps of migrated policies Policy maps • Duplicate settings are not migrated. • If you are not migrating VirusScan Enterprise settings, additional settings are migrated from McAfee Endpoint Protection for Mac and VirusScan Enterprise for Linux. D Migrating Access Protection and Buffer Overflow protection to Threat Prevention policies (Windows) Settings for Access Protection and Buffer Overflow Protection migrate from VirusScan Enterprise and McAfee Host IPS to two Threat Prevention policies and the Endpoint Security Common Options policy. McAfee Endpoint Security 10.2.0 Migration Guide 65 D Maps of migrated policies Policy maps Migrating Host IPS Firewall and General settings to Endpoint Security Firewall Settings from the Host IPS Firewall and General policies migrate to two Endpoint Security Firewall policies and the Endpoint Security Common Options policy. 66 McAfee Endpoint Security 10.2.0 Migration Guide Maps of migrated policies Policy maps D Migrating SiteAdvisor Enterprise settings to Web Control Settings from SiteAdvisor Enterprise policies migrate to five Web Control policies and the Endpoint Security Common Options policy. McAfee Endpoint Security 10.2.0 Migration Guide 67 D Maps of migrated policies Policy maps Migrating legacy settings to the Common Options policy Settings from VirusScan Enterprise, McAfee Host IPS, and SiteAdvisor Enterprise policies migrate to the Options policy in the Common module for use by all the Endpoint Security product modules. 68 McAfee Endpoint Security 10.2.0 Migration Guide Maps of migrated policies Policy maps D See also Changes to migrated settings on page 4 McAfee Endpoint Security 10.2.0 Migration Guide 69 D Maps of migrated policies Policy maps 70 McAfee Endpoint Security 10.2.0 Migration Guide E Changes to migrated settings Use this information to locate legacy policy settings after migrating to Endpoint Security 10.2. Contents Changes Changes Changes Changes Changes Changes to to to to to to VirusScan Enterprise settings IPS Rules settings in Host Intrusion Prevention Firewall settings SiteAdvisor Enterprise settings McAfee Endpoint Protection for Mac settings McAfee VirusScan Enterprise for Linux settings Changes to VirusScan Enterprise settings As part of the migration process from VirusScan Enterprise 8.8 to Threat Prevention, some policies are removed, moved, renamed, or merged with other settings. Removed settings These VirusScan Enterprise settings are not migrated. Access Protection Policies — Rules • Access Protection process inclusions or exclusions that the customer removed from McAfee-defined Access Protection rules • Default include and exclude processes in default rules • User-defined port-blocking rules, including user-defined inclusions and exclusions for predefined rules • Rules that are added via content updates • Prevent McAfee services from being stopped • Anti-spyware Standard Protection: Protect Internet Explorer favorites and settings • Anti-virus Standard Protection: Prevent mass mailing worms from sending mail • Anti-virus Standard Protection: Prevent IRC communication • Anti-virus Standard Protection: Prevent use of tftp.exe • Anti-virus Maximum Protection: Protect cached files from password and email address stealers • Anti-virus Maximum Protection: Prevent svchost executing non-Windows executables • Anti-virus Maximum Protection: Protect phonebook files from password and email address stealers McAfee Endpoint Security 10.2.0 Migration Guide 71 E Changes to migrated settings Changes to VirusScan Enterprise settings • Common Standard Protection: Prevent modification of McAfee Common Management Agent files and settings • Common Standard Protection: Prevent modification of McAfee Scan Engine files and settings • Common Standard Protection: Protect Mozilla & Firefox files and settings • Common Standard Protection: Disable HCP URLs in Internet Explorer • Common Maximum Protection: Prevent FTP communication • Common Maximum Protection: Prevent HTTP communication • Common Maximum Protection: Prevent programs registering as a service • Virtual Machine Protection: Prevent modification of VMWare Server files and settings • Virtual Machine Protection: Prevent modification of VMWare virtual machine files • Virtual Machine Protection: Prevent modification of VMWare Workstation files and settings • Virtual Machine Protection: Prevent Termination of VMWare Processes Alert Policies • Alert Manager Alerts: Email Scan • Alert Manager Alerts: AutoUpdate • Alert Manager Alerts: Disable alerting • Alert Manager Alerts: Enable centralized alerting • Alert Manager Alerts: Enable Alert Manager alerting • Additional Alerting Options: Send SNMP trap using SNMP service Buffer Overflow Protection Policies • Buffer Overflow Protection: Show the messages dialog box when a buffer overflow is detected • Buffer Overflow Protection: Module in Buffer overflow exclusions • Reports: all settings General Options Policies • Display Options: Show the system tray icon with all menu options • Display Options: Show the system tray icon with minimal menu options • Display Options: Do not show the system tray icon • Display Options: Allow this system to make remote console connections to other systems • Display Options: Disable default AutoUpdate task schedule • Display Options: Enable splash screen • Password Options: all settings • Global Scan Settings: Enable saving scan data across reboots • Global Scan Settings: Enable Artemis background queries On-Access Default Processes Policies • 72 Scan Items: Include files with no extension under Default + additional file types McAfee Endpoint Security 10.2.0 Migration Guide Changes to migrated settings Changes to VirusScan Enterprise settings E On-Access General Policies • General: Floppy during shutdown • ScriptScan: Process in ScriptScan exclusions • Blocking: Send the specified message to the network user when a threat is detected • Blocking: Message text settings • Blocking: Block the connection settings • Messages: Remove messages from the list • Messages: Clean files • Messages: Delete files • Reports: all settings On-Access High-Risk Processes Policies • Scan Items: Include files with no extension under Default + additional file types On-Access Low-Risk Policies • Scan Items: Include files with no extension under Default + additional file types On Delivery Email Scan Policies • All settings Unwanted Programs Policies • Scan Items: Select categories of unwanted programs to detect On-Demand Scan client tasks • Scan Locations: Registry • Scan Items: Include files with no extension under Default + additional file types • Reports: all settings • Task: Run this task on servers (migrated as part of task assignment) • Task: Run this task on workstations (migrated as part of task assignment) Moved, renamed, and merged settings These VirusScan Enterprise settings are moved, renamed, or merged with other settings during migration. Table E-1 Access Protection Rules VirusScan Enterprise settings Endpoint Security settings Anti-spyware Maximum Protection: Prevent execution of scripts from the Temp folder Executing scripts by Windows script host (CScript.exe or Wscript.exe) from common user folders* Anti-spyware Maximum Protection: Prevent installation of new CLSIDs, APPIDs and TYPELIBs Installing new CLSIDs, APPIDs, and TYPELIBs* Anti-spyware Maximum Protection: Prevent all programs from running files from the Temp folder Running files from common user folders* McAfee Endpoint Security 10.2.0 Migration Guide 73 E Changes to migrated settings Changes to VirusScan Enterprise settings Table E-1 Access Protection Rules (continued) VirusScan Enterprise settings Endpoint Security settings Anti-virus Maximum Protection: Prevent alteration of all file extension registrations Altering any file extension registrations* Anti-virus Outbreak Control: Block read and write access to all shares Remotely accessing local files or folders* Anti-virus Outbreak Control: Make all shares read-only Remotely creating or modifying files or folders* Anti-virus Standard Protection: Prevent user rights Altering user rights policies* policies from being altered Anti-virus Standard Protection: Prevent registry editor and Task Manager from being disabled Disabling Registry Editor and Task Manager * Anti-virus Standard Protection: Prevent remote creation of autorun files Remotely creating autorun files* Anti-virus Standard Protection: Prevent remote creation/modification of executable and configuration files Remotely creating or modifying Portable Executable, .INI, .PIF file types, and core system locations* Anti-virus Standard Protection: Prevent hijacking of .EXE and other executable extensions Hijacking .EXE and other executable extensions* Anti-virus Standard Protection: Prevent Windows Process spoofing Modifying core Windows Processes* Common Maximum Protection: Prevent creation of Creating new executable files in the Program new executable files in the Program Files folder Files folder* Common Maximum Protection: Prevent creation of Creating new executable files in the Windows new executable files in the Windows folder folder* Common Maximum Protection: Prevent launching of files from the Downloaded Program Files folder Internet Explorer launching files from the Downloaded Program Files folder* Common Maximum Protection: Prevent programs registering to autorun Registering of programs to autorun* Common Standard Protection: Prevent installation of Browser Helper Objects and Shell Extensions Installing Browser Helper Objects or Shell Extensions* Common Standard Protection: Protect Internet Explorer settings Modifying Internet Explorer settings* Common Standard Protection: Protect network settings Modifying network settings* Common Standard Protection: Prevent common programs from running files from the Temp folder Running files from common user folders by common programs* Common Standard Protection: Prevent modification of McAfee files and settings Common Options policy: • Self Protection: Exclude these processes** Common Standard Protection: Prevent termination Common Options policy: of McAfee processes • Self Protection: Exclude these processes** Common Standard Protection: Prevent hooking of McAfee processes Common Options policy: • Self Protection: Exclude these processes** * Report, block, and user-defined included and excluded processes are migrated. ** Only user-defined excluded processes are migrated. 74 McAfee Endpoint Security 10.2.0 Migration Guide Changes to migrated settings Changes to VirusScan Enterprise settings E Table E-2 Alert Policies VirusScan Enterprise settings Endpoint Security settings Alert Manager Alerts: On-Access Scan and Additional Alerting Options:Severity Filter Common module, Options policy: Alert Manager Alerts: On-Demand Scan and scheduled scans and Additional Alerting Options: Severity Filter Common Options policy: Alert Manager Alerts: Access Protection and Additional Alerting Options: Severity Filter Common Options policy: Additional Alerting Options: Log to local application event log Common Options policy: • Threat Prevention events to log: On-Access Scan • Threat Prevention events to log: On-Demand Scan • Threat Prevention events to log: Access Protection • Log events to Windows Application log Table E-3 Buffer Overflow Protection Policies VirusScan Enterprise settings Threat Prevention settings Warning mode Exploit Prevention policy: • Action: Report Protection mode Exploit Prevention policy: • Action: Block • Action: Report Table E-4 General Options Policies VirusScan Enterprise settings Endpoint Security and Threat Prevention settings Display Options: Console language settings Common Options policy: • Client Interface Language Display Options: Display managed tasks in the client console Common Options policy: Global Scan Settings: Allow On-Demand Scans to utilize the scan cache On-Demand Scan policy: • Display managed custom tasks • Full Scan: Use the scan cache • Quick Scan: Use the scan cache • Right-Click Scan: Use the scan cache Table E-5 On-Access General Policies VirusScan Enterprise settings Threat Prevention settings General: Processes on enable On-Access Scan policy: • Scan processes on service startup and content update General: Enable on-access scanning when the policy is enforced McAfee Endpoint Security 10.2.0 On-Access Scan policy: • Enable On-Access Scan Migration Guide 75 E Changes to migrated settings Changes to VirusScan Enterprise settings Table E-6 On-Access Default Processes Policies VirusScan Enterprise settings Threat Prevention settings Scan Items: Find unknown unwanted programs and Trojans On-Access Scan policy: Scan Items: Find unknown macro threats On-Access Scan policy: • Additional scan options: Detect unknown program threats • Additional scan options: Detect unknown macro threats Scan Items: Default + additional file types On-Access Scan policy: • What to scan: Default and specified file types Table E-7 On-Access High-Risk Processes Policies VirusScan Enterprise settings Threat Prevention settings High Risk Processes: Processes On-Access Scan policy: • Configure different settings for High Risk and Low Risk processes: Process type Scan Items: Find unknown unwanted programs and Trojans On-Access Scan policy: Scan Items: Find unknown macro threats On-Access Scan policy: Scan Items: Default + additional file types On-Access Scan policy: • Additional scan options: Detect unknown program threats • Additional scan options: Detect unknown macro threats • What to scan: Default and specified file types Table E-8 On-Access Low-Risk Processes Policies VirusScan Enterprise settings Threat Prevention settings Low-Risk Processes On-Access Scan policy: • Configure different settings for High Risk and Low Risk processes: Process type Scan Items: Find unknown unwanted programs and Trojans On-Access Scan policy: Scan Items: Find unknown macro threats On-Access Scan policy: Scan Items: Default + additional file types On-Access Scan policy: • Additional scan options: Detect unknown program threats • Additional scan options: Detect unknown macro threats • What to scan: Default and specified file types Table E-9 Quarantine Manager Policies VirusScan Enterprise settings Threat Prevention settings Quarantine Directory Options policy: • Quarantine folder Automatically delete quarantined data after the specified number of days and Number of days to keep backed-up data in the quarantine directory 76 McAfee Endpoint Security 10.2.0 Options policy: • Specify the maximum number of days to keep quarantine data Migration Guide Changes to migrated settings Changes to VirusScan Enterprise settings Table E-10 E Unwanted Programs Policies VirusScan Enterprise settings Threat Prevention settings Scan Items: Specify exclusions by detection name Options policy: • Detection Name User-Defined Items Options policy: • Potentially Unwanted Program Detections Table E-11 On-Demand Scan client tasks VirusScan Enterprise settings Threat Prevention settings Scan Locations: Include subfolders Custom On-Demand Scan client task: • Scan subfolders Scan Items: Find unknown program Custom On-Demand Scan client task: threats • Detect unknown program threats Scan Items: Find unknown macro threats Custom On-Demand Scan client task: Performance: Defer scan when using battery power Custom On-Demand Scan client task: Performance: Defer scan during presentations Custom On-Demand Scan client task: Performance: User may defer scheduled scans Custom On-Demand Scan client task: Performance: Defer at most hours Custom On-Demand Scan client task: • Detect unknown macro threats • Do not scan when the system is on battery power • Scan anytime: Do not scan when the system is in presentation mode • Scan anytime: User can defer scans • Scan anytime: User can defer scans: Maximum number of times user can defer for one hour Performance: System utilization Custom On-Demand Scan client task: • Performance: System utilization Performance: Artemis: Sensitivity level Custom On-Demand Scan client task: Scan Items: Find unknown unwanted programs and Trojans Custom On-Demand Scan client task: Scan Items: Find unknown macro threats Custom On-Demand Scan client task: Scan Items: Default + additional file types Custom On-Demand Scan client task: • McAfee GTI: Sensitivity level • Additional scan options: Detect unknown program threats • Additional scan options: Detect unknown macro threats • What to scan: Default and specified file types See also Policy maps on page 63 Migration notes for VirusScan Enterprise settings on page 32 McAfee Endpoint Security 10.2.0 Migration Guide 77 E Changes to migrated settings Changes to IPS Rules settings in Host Intrusion Prevention Changes to IPS Rules settings in Host Intrusion Prevention As part of the migration process from Host Intrusion Prevention to Endpoint Security Threat Prevention, these settings are removed, moved, renamed, or merged with other settings. Table E-12 Signatures tab Host Intrusion Prevention settings Threat Prevention settings Severity Access Protection policy: • Block and Report Type Does not migrate. Platform Does not migrate. Log status Access Protection policy: • Report Client rules Does not migrate. ID Does not migrate. Table E-13 IPS Signature Host Intrusion Prevention settings Threat Prevention settings Signature name Access Protection policy: • Rule: Options: Name Severity level Does not migrate. Version Introduced Does not migrate. Notes Access Protection policy: Description • Notes The Migration Assistant merges Notes and Description data from this signature into a single Notes field. Table E-14 Standard IPS Subrule Properties Host Intrusion Prevention settings Threat Prevention settings Name Access Protection policy: • Rule: Name The subrule name and signature name migrate to the rule name in this format: <IPS Signature name>_<IPS Subrule name>. Rule type Access Protection policy: • Custom Rule: Subrule: Properties: Subrule type Operations Access Protection policy: • Custom Rule: Subrule: Properties: Operations Parameters Access Protection policy: • Custom Rule: Subrule: Properties: Targets (as parameters) Parameters: Executables Access Protection policy: • Custom Rule: Options: Executables 78 McAfee Endpoint Security 10.2.0 Migration Guide Changes to migrated settings Changes to IPS Rules settings in Host Intrusion Prevention Table E-15 Application Protection Rules tab Host Intrusion Prevention settings Threat Prevention settings Status Does not migrate. Inclusion Status Does not migrate. Is used to determine whether to migrate executables from excluded Application Protection Rules. Table E-16 E Application Protection Rule Properties Host Intrusion Prevention settings Threat Prevention settings Name Does not migrate. Status Does not migrate. Inclusion Status Does not migrate. Is used to determine whether to migrate executables from excluded Application Protection Rules. Executables Exploit Prevention policy: • Exclusions: Process Notes Table E-17 Does not migrate. Executable Host Intrusion Prevention settings Threat Prevention settings Name Exploit Prevention policy: • Exclusions: Process: Name File description Does not migrate. File name Exploit Prevention policy: • Exclusions: Process: File name or path Fingerprint Exploit Prevention policy: • Exclusions: Process: MD5 hash Signer Exploit Prevention policy: • Exclusions: Process: Signer Note Table E-18 Does not migrate. Exception Rules tab Host Intrusion Prevention settings Threat Prevention settings Status Does not migrate. Only enabled exceptions migrate. Modified Does not migrate. Exception Name Does not migrate. First Executable Migrates to one or more of these policies, based on criteria explained in Appendix B, IPS Rules migration: • Access Protection policy: • Executable • Exploit Prevention policy: • Process Modified McAfee Endpoint Security 10.2.0 Does not migrate. Migration Guide 79 E Changes to migrated settings Changes to IPS Rules settings in Host Intrusion Prevention Table E-18 Exception Rules tab (continued) Host Intrusion Prevention settings Threat Prevention settings Notes Does not migrate. Actions Does not migrate. Table E-19 IPS Exception Host Intrusion Prevention settings Threat Prevention settings Exception name Does not migrate. Status Does not migrate. Only enabled exceptions migrate. Signatures Does not migrate directly. Is used to migrate to respective Files, Registry, and Programs Rule types. The target is based on criteria explained in Appendix B, IPS Rules migration, under Exceptions. Parameters: Executable: Type Does not migrate. Parameters: Executable: Name Migrates to both policies. The target is based on criteria explained in Appendix B, IPS Rules migration, under Exceptions. • Access Protection policy: • Executable Name or Process Name • Exploit Prevention policy: • Executable Name or Exclusions: Process Name Parameters: Executable: File name Migrates to both policies. The target is based on criteria explained in Appendix B, IPS Rules migration, under Exceptions. • Access Protection policy: • If signature is Custom — Rule: Options: Executable: File Name or Path • If signature is Global — Policy: Exclusions: File Name or Path • Exploit Prevention policy: • Executable: File Name or Path Parameters: Executable: Fingerprint Migrates to both policies. The target is based on criteria explained in Appendix B, IPS Rules migration, under Exceptions. • Access Protection policy: • If signature is Custom — Rule: Options: Executable: MD5 Hash • If signature is Global — Policy: Exclusions: MD5 Hash • Exploit Prevention policy: • Exclusions: Executable: MD5 Hash Parameters: Executable: File description 80 Does not migrate. McAfee Endpoint Security 10.2.0 Migration Guide Changes to migrated settings Changes to Firewall settings Table E-19 E IPS Exception (continued) Host Intrusion Prevention settings Threat Prevention settings Parameters: Executable: Signer Migrates to both policies. The target is based on criteria explained in Appendix B, IPS Rules migration, under Exceptions. • Access Protection policy: • If signature is Custom — Rule: Options: Executable: Signer • If signature is Global — Policy: Exclusions: Signer • Exploit Prevention policy: • Exclusions: Executable: Signer Parameters: Executable: Action Does not migrate. Parameters: Parameters: Domain Group Does not migrate. Table E-20 Edit Parameter Host Intrusion Prevention settings Threat Prevention settings Parameter name Access Protection policy: • Subrule: Properties: Targets: Name Value Access Protection policy: • Subrule: Properties: Targets: Value Table E-21 IPS Protection Host Intrusion Prevention settings Threat Prevention settings Reaction based on signature severity level: Reaction Is used with the IPS Rules Severity and Log status settings to determine the target Block/Report setting for Access Protection Rules. The target is based on criteria explained in Appendix B, IPS Rules migration, under Signature-level settings in migrated IPS Rules. See also Policy maps on page 63 Migration notes for IPS Rules settings on page 36 Signature-level settings in migrated IPS Rules on page 51 Subrule-level settings in migrated IPS Rules on page 52 Exceptions on page 53 Application Protection Rules on page 55 Changes to Firewall settings As part of the migration process from Host Intrusion Prevention 8.0 Firewall to Endpoint Security Firewall, these settings are removed, moved, renamed, or merged with other settings. Removed settings These Host Intrusion Prevention Firewall settings are not migrated. McAfee Endpoint Security 10.2.0 Migration Guide 81 E Changes to migrated settings Changes to Firewall settings Firewall Options • Learn mode Client UI • General Settings: Show tray icon • General Settings: Flash tray icon • General Settings: Play sound • General Settings: Capture trace • General Settings: Show this custom message • General Settings: Allow user to notify administrator of false positives • General Settings: SMTP server name • General Settings: Send email to • Advanced Options: Product integrity check enabled • Advanced Options: Manual creation of client rules (for all features) enabled • Advanced Options: Administrator password to unlock the UI • Advanced Options: Disabling features settings • Advanced Options: Time-based password settings • Troubleshooting: Activity log size • Troubleshooting: IPS logging settings • Troubleshooting: Enable IPS engines settings Trusted Applications • Application name • Mark trusted for IPS • Notes Trusted Networks • Trust for IPS Moved, renamed, and merged settings These Host Intrusion Prevention Firewall settings are moved, renamed, or merged with other settings during migration. Table E-22 DNS Blocking Host Intrusion Prevention settings Endpoint Security Firewall settings DNS Blocking: Blocked Domains Options policy: • DNS Blocking: Domain name 82 McAfee Endpoint Security 10.2.0 Migration Guide E Changes to migrated settings Changes to Firewall settings Table E-23 Firewall Options Host Intrusion Prevention settings Endpoint Security Firewall settings Firewall status: Enabled Options policy: • Enable Firewall Firewall status: Adaptive mode Options policy: • Tuning Options: Enable Adaptive mode Firewall status: Allow traffic for unsupported protocols Options policy: Firewall status: Allow bridged traffic Options policy: • Protection Options: Allow traffic for unsupported protocols • Protection Options: Allow bridged traffic Firewall client rules: Retain existing client rules when this policy is enforced Options policy: Startup Protection: Allow only outgoing traffic until the Host IPS service has started Options policy: • Tuning Options: Retain existing user added rules and Adaptive mode rules when this policy is enforced • Protection Options: Allow only outgoing traffic until firewall services have started Protection options: Send events to ePO for Options policy: Trusted Source violations • McAfee GTI Network Reputation: Log matching traffic Table E-24 Client UI Host Intrusion Prevention settings Endpoint Security Firewall and Endpoint Security settings Display pop-up alert Options policy: • Tuning Options: Enable firewall intrusion alerts Client UI language setting Common Options policy: • Client Interface Language Firewall logging Common Options policy: • Debug Logging: Enable for Firewall Table E-25 Trusted Applications Host Intrusion Prevention settings Endpoint Security Firewall settings Fingerprint Options policy: • Trusted Executables: MD5 Hash Table E-26 Trusted Networks Host Intrusion Prevention settings Endpoint Security Firewall settings Include local subnet automatically: Enabled Options policy: • Defined Networks: Local subnet entry is added Trusted networks Options policy: • Defined Networks: Trusted McAfee Endpoint Security 10.2.0 Migration Guide 83 E Changes to migrated settings Changes to SiteAdvisor Enterprise settings See also Policy maps on page 63 Migration notes for McAfee Host IPS Firewall settings on page 40 Changes to SiteAdvisor Enterprise settings As part of the migration process from SiteAdvisor Enterprise 3.5 to Web Control, these settings are removed, moved, renamed, or merged with other settings. Removed settings These SiteAdvisor Enterprise settings are not migrated. Authorize List • Block phishing pages Enable/Disable • SiteAdvisor menu option: Enable • SiteAdvisor menu option: Only allow with password Enforcement Messaging • Site: Allow message (all languages) • Site: Enter explanation messages to display when users attempt to access sites you have configured content filtering actions for: Warn explanation (all languages) • Authorize and Prohibit Lists: Allow message (all languages) • Authorize and Prohibit Lists: Allow explanation (all languages) • Zero Day Protection: Allow message (all languages) Event Tracking • Domains and downloads: Track • Capture logged-on user name in events General • Action Enforcement: Allow Warn sites • Action Enforcement: Enable Artemis scan • Control Panel Option: Enable Hardening • Self Protection: Protect SiteAdvisor resources: all settings Moved, renamed, and merged settings These SiteAdvisor Enterprise settings are moved, renamed, or merged with other settings during migration. 84 McAfee Endpoint Security 10.2.0 Migration Guide Changes to migrated settings Changes to SiteAdvisor Enterprise settings Table E-27 E Authorize List SiteAdvisor Enterprise settings Web Control settings Test Site Patterns Block and Allow List policy: • Test Pattern button Track events and request information from the SiteAdvisor server Block and Allow List policy: • Enforce actions for file downloads based on their rating Options policy: • Log events for allowed sites configured in the Block and Allow List Give this Authorize list precedence over Prohibit lists Block and Allow List policy: • Enable allowed sites to take precedence over blocked sites Table E-28 Content Actions SiteAdvisor Enterprise settings Web Control settings Action for Green and Action for Unrated Content Actions policy: • Block rating action Phishing Content Actions policy: • Phishing web category Options policy: • Block phishing pages for all sites Table E-29 Enable/Disable SiteAdvisor Enterprise settings Web Control settings SiteAdvisor policy enforcement: Enable Options policy: • Enable Web Control SiteAdvisor toolbar: Enable Options policy: • Hide the toolbar on the client browser Table E-30 Enforcement Messaging SiteAdvisor Enterprise settings Web Control settings Site: Enter short messages (up to 50 characters) to Enforcement Messaging policy: display when users attempt to access sites you • Site: Messages for sites blocked by Rating have configured actions for Actions Site: Enter explanation messages (up to 1000 Enforcement Messaging policy: characters) to display when users attempt to access • Site: Explanations for sites blocked by Rating sites you have configured rating actions for Actions Site: Enter explanation messages (up to 1000 Enforcement Messaging policy: characters) to display when users attempt to access • Site: Explanation for sites blocked by Web sites you have configured content filtering actions Category Blocking for Site Resources: Enter short messages (up to 50 characters) to display when users attempt to download a file that is warned or blocked McAfee Endpoint Security 10.2.0 Enforcement Messaging policy: • Site Downloads: Messages for site downloads blocked by Rating Actions Migration Guide 85 E Changes to migrated settings Changes to SiteAdvisor Enterprise settings Table E-30 Enforcement Messaging (continued) SiteAdvisor Enterprise settings Web Control settings Site Resources: Enter a short message (up to 50 Enforcement Messaging policy: characters) to display when users attempt to access • Block List: Message for sites blocked by a blocked phishing page Phishing Pages Authorize and Prohibit Lists: On Prohibit Lists Enforcement Messaging policy: • Site Downloads: Message for sites on the Block List Fail Close: Enter short messages (up to 50 Enforcement Messaging policy: characters) to display when users attempt to access • McAfee GTI Unreachable: Message for sites sites you have configured actions for blocked when McAfee GTI ratings server is not reachable Fail Close: Enter explanation messages (up to 1000 Enforcement Messaging policy: characters) to display when users attempt to access • McAfee GTI Unreachable: Explanation for sites you have configured rating actions for sites blocked when McAfee GTI ratings server is not reachable Zero Day Protection: Enter short messages (up to 50 characters) to display when users attempt to access sites you have configured actions for Enforcement Messaging policy: Zero Day Protection: Enter explanation messages (up to 1000 characters) to display when users attempt to access sites you have configured rating actions for Enforcement Messaging policy: Image Enforcement Messaging policy: • Unverified Site Protection: Messages for sites not yet verified by McAfee GTI • Unverified Site Protection: Explanations for sites not yet verified by McAfee GTI • Image for Warn and Block Pages Table E-31 Event Tracking SiteAdvisor Enterprise settings Web Control settings Track content categories for all green sites Options policy: • Enable Web Control • Page views and downloads: Track Options policy: • Send browser page views and downloads to Web Reporter Content Security Reporter Configuration Options policy: • Web Reporter configuration Table E-32 General SiteAdvisor Enterprise settings Endpoint Security and Web Control settings HTTP proxy server Common Options policy: • Proxy Server for McAfee GTI 86 HTTP proxy authentication: Use authentication Common Options policy: Block Malicious and Warn sites in an iframe Options policy: McAfee Endpoint Security 10.2.0 • Enable HTTP proxy authentication • Enable HTML iFrames support Migration Guide Changes to migrated settings Changes to SiteAdvisor Enterprise settings Table E-32 E General (continued) SiteAdvisor Enterprise settings Endpoint Security and Web Control settings Enable ePO event tracking for iframe URL navigation Options policy: Zero Day Protection: Level Options policy: • Log Web Control iFrame events • Apply this action to sites not yet verified by McAfee GTI Fail Close: Enable Options policy: • Block sites by default if McAfee GTI ratings server is not reachable Accept Warn action at domain level: Enable Options policy: Observe mode: Enable Options policy: • Allow warn action at domain level • Enable Observe mode File download enforcement: Enable Options policy: • Enable file scanning for file downloads Artemis enforcement level Options policy: • McAfee GTI sensitivity level Enable browser-based annotations Options policy: • Enable annotations in browser-based email Enable non-browser-based annotations Options policy: • Enable annotations in non browser-based email Private IP range: Enable Options policy: • Exclusions: Allow all IP addresses in the local network • Exclusions: Specify IP addresses or ranges to exclude from Web Control rating or blocking Web gateway interlock: Enable Options policy: • Stand down if a web gateway appliance is detected Client is using one of your organization's default gateways Options policy: Web gateway enforcement is detected Options policy: • Use your organization's default gateway • Detect web gateway enforcement Enter the DNS name for the Internal Landmark Options policy: Secure Search: Enable Options policy: • Specify internal landmark to use and DNS name for internal landmark • Enable Secure Search McAfee Endpoint Security 10.2.0 Migration Guide 87 E Changes to migrated settings Changes to McAfee Endpoint Protection for Mac settings Table E-32 General (continued) SiteAdvisor Enterprise settings Endpoint Security and Web Control settings Search Engine Options policy: • Set the default engine in supported browsers Block links to risky sites Options policy: • Block links to risky sites in search results Table E-33 Hardening SiteAdvisor Enterprise settings Web Control settings Protect SiteAdvisor browser plugin: Enable Options policy: • Prevent user from uninstalling or disabling browser plug-in Table E-34 Prohibit List SiteAdvisor Enterprise settings Web Control settings Test Site Patterns Block and Allow List policy: • Test Pattern button See also Policy maps on page 63 Migration notes for SiteAdvisor Enterprise settings on page 42 Changes to McAfee Endpoint Protection for Mac settings As part of the migration process from McAfee Endpoint Protection for Mac 2.3, these settings are removed, moved, renamed, or merged with other settings. Removed settings These settings from the Anti-malware policy are not migrated. General tab • Disable the local auto-update schedule On-demand Scan tab (all settings) Exclusions tab • Exclude specific disks, files, and folders: On-demand Scan Moved, renamed, and merged settings These McAfee Endpoint Protection for Mac settings from the Anti-malware policy are migrated to the On-Access Scan policy in Threat Prevention. 88 McAfee Endpoint Security 10.2.0 Migration Guide E Changes to migrated settings Changes to McAfee Endpoint Protection for Mac settings Table E-35 General tab McAfee Endpoint Protection for Mac settings Threat Prevention settings General policies controlling overall functioning of Anti-malware: On-access Scan On-Access Scan policy: General policies controlling overall functioning of Anti-malware: Spyware Scan On-Access Scan policy: • Enable On-Access Scan • Detect unwanted programs (Standard tab) Table E-36 On-access Scan tab McAfee Endpoint Protection for Mac settings Threat Prevention settings On-access Scan policies: Scan contents of Archives and Compressed Files On-Access Scan policy (Standard tab): • Compressed archive files On-access Scan policies: Scan Apple Mail On-Access Scan policy (Standard tab): Messages • Compressed MIME-encoded files On-access Scan policies: Scan files on Network Volumes On-Access Scan policy (Standard tab): • On network drives On-access Scan policies: Maximum scan time (seconds) On-Access Scan policy: Scan files: On-Access Scan policy (Standard tab): • On Read • When reading from disk • On Write • When writing to disk • Read & Write • Let McAfee decide When a virus is found and If the above action fails: Threat detection first response and If first response fails: • Clean • Quarantine • Delete • Notify • Specify maximum number of seconds for each file scan: • Clean • Delete • Delete • Deny If the primary action is Quarantine and the secondary action is Delete in the source policy, the target settings are Delete and Deny. When a spyware is found and If the above action fails: Unwanted program first response and If first response fails: • Clean • Clean • Quarantine • Delete • Delete • Delete • Notify • Deny If the primary action is Quarantine and the secondary action is Delete in the source policy, the target settings are Delete and Deny. McAfee Endpoint Security 10.2.0 Migration Guide 89 E Changes to migrated settings Changes to McAfee VirusScan Enterprise for Linux settings Table E-37 Exclusions tab McAfee Endpoint Protection for Mac settings Threat Prevention settings Exclude specific disks, files, and folders: On-access Scan On-Access Scan policy (Standard tab): • Exclusions: File name or path including subfolder for read and write See also Policy maps on page 63 Migration notes for McAfee Endpoint Protection for Mac settings on page 44 Changes to McAfee VirusScan Enterprise for Linux settings As part of the migration process from McAfee VirusScan Enterprise for Linux 2.0.2, these settings are removed, moved, renamed, or merged with other settings. You can manage Endpoint Security for Linux with the Endpoint Security Threat Prevention and Common module extensions in McAfee ePO. Endpoint Security Firewall and Web Control are not supported for Linux. Removed settings These settings from the Actions tab of the On-Access Scanning policy are not migrated. • If scanning fails • If scanning times out Other policies are not migrated. Moved, renamed, and merged settings These McAfee VirusScan Enterprise for Linux settings from the On-Access Scanning policy are migrated to the On-Access Scan policy in Threat Prevention. Table E-38 On Access Scanning policy: Actions tab 90 VirusScan Enterprise for Linux settings Threat Prevention settings When Viruses and Trojans are found and If the above action fails Threat detection first response and If first response fails: • Clean • Clean • Delete • Delete • Deny • Deny When Programs & Jokes are found and If the above action fails Unwanted program first response and If first response fails: • Clean • Clean • Delete • Delete • Deny • Deny McAfee Endpoint Security 10.2.0 Migration Guide Changes to migrated settings Changes to McAfee VirusScan Enterprise for Linux settings E Table E-39 On Access Scanning policy: Advanced tab VirusScan Enterprise for Linux settings Threat Prevention settings Heuristics: Find unknown program viruses On-Access Scan policy: Heuristics: Find unknown macro viruses On-Access Scan policy: • Additional scan options: Detect unknown program threats • Additional scan options: Detect unknown macro threats Non-viruses: Find potentially unwanted programs On-Access Scan policy: Non-viruses: Find joke programs On-Access Scan policy: • Additional scan options: Detect unwanted programs • Additional scan options: Detect unknown program threats Compressed files: Scan inside multiple-file archives (e.g. .ZIP) On-Access Scan policy: Compressed files: Decode MIME encoded files On-Access Scan policy (Standard tab): • What to scan: Compressed MIME-encoded files • What to scan: Compressed archive files Table E-40 On Access Scanning policy: Detections tab VirusScan Enterprise for Linux settings Threat Prevention settings Scan files: On-Access Scan policy: • When writing to disk • When to scan: When writing to disk • When reading from disk • When to scan: When reading from disk Scan files: On-Access Scan policy: • On network mounted volume • What to scan: On network mounted volume What to scan On-Access Scan policy: • All files • What to scan: All files • Default + additional file types • What to scan: Default and specified file types • Specified file types • What to scan: Specified file types only What not to scan On-Access Scan policy: • Exclusions: File name or path including subfolder for read and write Maximum Scan Time: Maximum scan time (seconds) On-Access Scan policy: • Specify maximum number of seconds for each file scan: Table E-41 On Access Scanning policy: General tab VirusScan Enterprise for Linux settings Threat Prevention settings On-access Scan: Enable on-access scanning On-Access Scan policy: • Enable On-Access Scan On-access Scan: Quarantine Directory Options policy: • Quarantine folder McAfee Endpoint Security 10.2.0 Migration Guide 91 E Changes to migrated settings Changes to McAfee VirusScan Enterprise for Linux settings Table E-41 On Access Scanning policy: General tab (continued) VirusScan Enterprise for Linux settings Threat Prevention settings Maximum Scan Time: Enable a maximum scanning time for all files On-Access Scan policy: Maximum Scan Time: Maximum scan time (seconds) On-Access Scan policy: • Specify maximum number of seconds for each file scan • Scan Timeout Table E-42 On-Demand Scan client tasks VirusScan Enterprise for Linux settings Threat Prevention settings Scan Items Custom On-Demand Scan client task: • Scan Options: Scan Locations: user-defined path Where to scan Custom On-Demand Scan client task: • Scan Options: Scan subfolders What to scan: Default + specified user-defined extensions Custom On-Demand Scan client task: What to scan: Specified user-defined extensions • What to scan: Specified user-defined extensions Exclusions Custom On-Demand Scan client task: • What to scan: Default and specified file types • Exclusions Advanced: Find unknown program virus Custom On-Demand Scan client task: Advanced: Find unknown macro viruses Custom On-Demand Scan client task: Advanced: Find potentially unwanted programs Custom On-Demand Scan client task: Advanced: Scan inside multiple file archives Custom On-Demand Scan client task: Advanced: Decode MIME encoded files Custom On-Demand Scan client task: Actions: Primary Action Virus Custom On-Demand Scan client task: • Additional scan options: Detect unknown program threats • Additional scan options: Detect unknown macro threats • Additional scan options: Find potentially unwanted programs • Additional scan options: Compressed Archive Files: • Additional scan options: Compressed MIME-encoded files • Remediation: Primary Action Virus Actions: Secondary Action Virus Custom On-Demand Scan client task: • Remediation: Secondary Action Virus See also Policy maps on page 63 Migration notes for VirusScan Enterprise for Linux settings on page 46 92 McAfee Endpoint Security 10.2.0 Migration Guide Index A about this guide 5 Access Protection port-blocking rules not migrated 32, 57 Self Protection settings 32 Application Protection Rules, migrated 36 assignments migrating 15 migration paths and 11 verifying migration 16 automatic migration Common Options policy 17 comparing to manual 11 migrating client tasks 15 migrating Host IPS Catalog 15 migrating policies 15 multi-platform policies and 15, 27 overview 13 repeat migrations 17 single-platform policies and 27 target policy names and notes 25 verifying migrated objects 16 B best practices guidelines for choosing automatic migration 11 guidelines for choosing manual migration 11 manual migration, viewing policy maps 20 migrating exclusions 32 migrating Host IPS Catalog manually 7, 24, 40 preparing to migrate 12 buffer overflow protection, See Exploit Prevention C Catalog, Firewall, See Firewall Catalog Catalog, Host IPS, See Host IPS Catalog checklist, pre-migration 12 client software, deployment 10 Client Task Catalog pre-migration review 12 verifying migration 16, 23 client tasks migrated, Threat Prevention 46, 71, 90 McAfee Endpoint Security 10.2.0 client tasks (continued) migrated, VirusScan Enterprise 71 migrated, VirusScan Enterprise for Linux 46, 90 migrating assignments 15 migrating automatically 15 migrating manually 22 pre-migration review 12 repeat migrations 17, 24 verifying migration 16, 23 Common Options policy automatic migrations 17 migrated policy maps, illustrated 63 repeat migrations 17 source policies, illustrated 30 compatible products 7 conventions and icons used in this guide 5 D default settings in migrated policies 25 deployment, product 10 documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 E Endpoint Protection for Mac license requirements for migration 44 migrated policy maps, illustrated 63 migration details 44 on-access scan settings, migrated 35 policies, migrated 44 policies, migration changes 88 policies, multi-platform 44 Endpoint Security Firewall compatibility with Host IPS Firewall 40 creating port-blocking rules 32, 57, 59, 61 migrated policy maps, illustrated 63 migration details 40 policies, migrated 39, 40 policies, migration changes 81 policies, multiple-instance 40 trusted networks 40 Migration Guide 93 Index Endpoint Security for Linux migrated policy maps, illustrated 63 migrated policy tables 90 Endpoint Security for Mac migrated policy maps, illustrated 63 migrated policy tables 88 error messages 49 exclusions Application Protection Rules 36 best practices 32 IPS Rules 36 on-access scanning 32, 46 on-access scanning, migrated 71, 88, 90 on-demand scanning 32, 46 regular expressions 46 root-level folders 32 Exploit Prevention, migrated settings 32 F Firewall See also Endpoint Security Firewall best practice, migrating 7 Firewall Catalog best practice 24, 40 best practice, migrating 12 migrating 15, 23, 40 pre-migration review 12 repeat migrations 17, 24 synchronizing with migrated policies 40 verifying migration 16, 23 firewall rules, creating port-blocking rules 32, 57, 59, 61 H Host Intrusion Prevention best practice, migrating Catalog 40 changes to migrated Host Intrusion Prevention settings 40 compatibility with Endpoint Security Firewall 40 IPS Rules policies, migration changes 78 migrated policy maps, illustrated 63 migrating Host IPS Catalog with policies 40 migrating IPS Rules 36, 51–53 migration details 36, 40 policies, migrated 36, 39, 40 policies, migrated to Common Options 30 policies, migration changes 81 Host IPS Catalog best practice, migrating 7, 12, 24, 40 migrating 15, 23, 40 pre-migration review 12 repeat migrations 17, 24 synchronizing with migrated policies 40 verifying migration 16, 23 94 McAfee Endpoint Security 10.2.0 I installation, Migration Assistant 12 IPS Rules, migration details 36, 51–53 L legacy products, supported 7 license requirements 7, 44, 46 Linux product migration, See VirusScan Enterprise for Linux M Macintosh product migration, See Endpoint Protection for Mac managed systems, product deployment 10 manual migration best practice, viewing policy maps 20 comparing to automatic 11 migrating client tasks 22 migrating Host IPS Catalog 23 migrating policies 20 multi-platform policies and 20, 27, 44, 46 overview 19 repeat migrations 24 single-platform policies and 20, 27 target policy names and notes 25 verifying migrated objects 23 McAfee Agent, deployment 10 McAfee Default policy 25 McAfee ServicePortal, accessing 6 migration choosing automatic or manual 11 error messages 49 overview 9 overview, automatic 13 overview, manual 19 pre-migration tasks 12 repeat migrations 17, 24 supported legacy products 7 verifying migrated assignments 16 verifying migrated objects 16, 23 Migration Assistant automatically migrating settings 15 installing 12 manually migrating client tasks 22 manually migrating Host IPS Catalog 23 manually migrating policies 20 repeat migrations 17, 24 multi-platform policies defined 27 migrating automatically 15, 44, 46 migrating manually 20, 44, 46 naming conventions 25 precedence of settings, by operating system platform 27 multi-slot policies, See multiple-instance policies multiple-instance policies 26, 40, 42 Migration Guide Index O on-access scan settings migrated 35, 71, 88, 90 root-level exclusions 32 on-demand scan settings client tasks 46 migrated 71, 90 root-level exclusions 32 overview automatic migration 13 manual migration 19 migration 9 product deployment 10 P policies changes, overview 8 default settings 25 merging 28 migrating assignments 15 migrating automatically 15 migrating manually 20 multi-platform 15, 25, 27, 44, 46 multiple-instance, migrating 26, 40, 42 pre-migration review 12 precedence of settings, by operating system platform 27 repeat migrations 17, 24 server settings, VirusScan Enterprise 32 single-platform 27 target policy names 25 target policy notes 25 verifying migration 16, 23 workstation settings, VirusScan Enterprise 32 policies, migrated changes to migrated Endpoint Protection for Mac settings 44 changes changes changes changes to migrated Host Intrusion Prevention settings 40 to migrated IPS Rules settings 36, 51–53 to migrated SiteAdvisor Enterprise settings 42 to migrated VirusScan Enterprise for Linux settings 46 changes to migrated VirusScan Enterprise settings 32 Common Options 30 Endpoint Protection for Mac 44, 88 Endpoint Security Firewall 39, 81 Host Intrusion Prevention 30 Host Intrusion Prevention, Firewall 39, 81 Host Intrusion Prevention, IPS Rules 36, 78 illustrated 63 multi-platform policies 27, 44, 46 precedence of settings, by operating system platform 27 single-platform policies 27 SiteAdvisor Enterprise 30, 42, 84 Threat Prevention 31, 36, 44, 46, 71, 78, 90 VirusScan Enterprise 30, 31, 71 McAfee Endpoint Security 10.2.0 policies, migrated (continued) VirusScan Enterprise for Linux 46, 90 Web Control 42, 84 Policy Catalog pre-migration review 12 verifying migration 16, 23 policy mapping Common Options policy 30 Endpoint Protection for Mac 44, 88 Endpoint Security Firewall 39, 81 Host Intrusion Prevention, Firewall 39, 81 Host Intrusion Prevention, IPS Rules 36, 78 overview 8 overview, illustrated 63 SiteAdvisor Enterprise 42, 84 Threat Prevention 31, 36, 44, 46, 71, 78 VirusScan Enterprise 30, 31, 71 VirusScan Enterprise for Linux 46, 90 Web Control 42, 84 port-blocking rules not migrated 32, 57 re-creating as firewall rules 57, 59, 61 pre-migration tasks 12 Q quarantine folder path 32 R requirements Endpoint Security, installing 10 Migration Assistant, installing 12 pre-migration tasks 12 supported legacy products 7 S Self Protection, migrated settings 32 server and workstation settings, VirusScan Enterprise 32 ServicePortal, finding product documentation 6 single-platform policies defined 27 migrating manually 20 naming conventions 25 SiteAdvisor Enterprise migrated policy maps, illustrated 63 migration details 42 policies, migrated 42 policies, migrated to Common Options 30 policies, migration changes 84 T tasks, migrated Threat Prevention 46, 71, 90 VirusScan Enterprise 71 Migration Guide 95 Index tasks, migrated (continued) VirusScan Enterprise for Linux 46, 90 technical support, finding product information 6 Threat Prevention changes to migrated Endpoint Protection for Mac settings 44 changes to migrated IPS Rules settings 36, 51–53 changes to migrated VirusScan Enterprise for Linux settings 46 changes to migrated VirusScan Enterprise settings 32 exclusions, root-level folders 32 migrated policy maps, illustrated 63 migrating IPS Rules 36, 51–53 migration details 32 on-access scan settings, migrated 35 on-demand scan exclusions 32 policies, merged 32 policies, migrated 31, 32, 36, 44, 46 policies, migration changes 71, 78, 88, 90 quarantine folder path 32 Self Protection settings 32 tasks, migration changes 71, 90 workstation and server policy settings 32 troubleshooting, error messages 49 V verification migrated assignments 16 migrated objects 16, 23 Migration Assistant installation 12 VirusScan Enterprise Access Protection port-blocking rules not migrated 32, 57 buffer overflow protection 32 exclusions, root-level folders 32 migrated policy maps, illustrated 63 migrated policy tables 71 migration details 32 96 McAfee Endpoint Security 10.2.0 VirusScan Enterprise (continued) on-access scan exclusions 32 on-access scan settings, migrated 35 on-demand scan exclusions 32 policies, migrated 31, 32 policies, migrated to Common Options 30 policies, migration changes 71 Self Protection settings 32 tasks, migration changes 71 workstation and server policy settings 32 VirusScan Enterprise for Linux and Endpoint Security modules 46 client tasks, migrated 46 exclusions, regular expressions 46 license requirements for migration 46 migrated policy maps, illustrated 63 migration details 46 on-access scan settings, migrated 35 policies, migrated 46 policies, migration changes 90 policies, multi-platform 46 tasks, migration changes 90 W Web Control Block and Allow List 42 changes to migrated SiteAdvisor Enterprise settings 42 Content Actions 42 migrated policy maps, illustrated 63 migration details 42 policies, merged 42 policies, migrated 42 policies, migration changes 84 policies, multiple-instance 42 workstation and server settings, VirusScan Enterprise 32 Migration Guide 0-00