Mcafee Agent 5.7.x Product Guide
Mcafee Agent 5.7.x Product Guide
Mcafee Agent 5.7.x Product Guide
x Product Guide
Contents
Product overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
How it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Safe install using Product Deployment Incompatibility check (McAfee ePO On-Premises). . . . . . . . . . . . . . . . . 17
View the Product Deployment Incompatibility report using Queries & Reports. . . . . . . . . . . . . . . . 18
SuperAgent hierarchy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Peer-to-peer communication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Change the language for the agent interface and event log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Change from managed to unmanaged mode on Windows systems (McAfee ePO On-Premises). . . . . . . . . . . . . . . . 49
Change from managed to unmanaged mode on non-Windows platforms (McAfee ePO On-Premises). . . . . . . . . . 51
Make the system tray icon visible and update security settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Agent logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
View McAfee Agent product log from McAfee ePO (McAfee ePO On-Premises) using Single System Troubleshooting
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Product overview
Overview
McAfee® Agent is the client-side component that provides secure communication between McAfee® ePolicy Orchestrator®
(McAfee® ePO™) and managed products.
Systems can be managed by the McAfee ePO server only if they have an agent installed. While running silently in the
background, the agent:
• Agent — The basic operating mode for McAfee Agent, providing a communication channel to McAfee ePO and local
services for managed products.
• SuperAgent — An agent that acts as an intermediary between McAfee ePO and other agents in the same network
broadcast segment. The SuperAgent caches information received from McAfee ePO, the Master Repository, or a
mirrored Distributed Repository, and distributes it to the agents in its network subnet.
Configure a SuperAgent in every subnet when managing agents in larger networks.
Note
This guide covers multiple versions of McAfee ePO management platform. When content applies to only one platform, the
platform name appears with the content.
McAfee ePO The umbrella term for all McAfee ePO management
platforms. When used in this guide, the content
applies to all platforms.
Key features
McAfee Agent architecture is single threaded and asynchronous based on services (messaging) architecture. In messaging-based
architecture, the services communicate using a common language. This reduces the use of system resources, such as number of
threads, number of handles, memory, and CPU.
McAfee Agent 5.0.x is the minimum required version for McAfee ePO Cloud.
(McAfee ePO On-Premises) McAfee Agent 5.6.x supports McAfee ePO 5.3.x or later.
The McAfee Agent 5.x.x extension manages all previous versions of McAfee Agent (4.8.x and 5.0.x). But, previous versions of the
McAfee Agent management extension cannot manage McAfee Agent 5.x.x clients.
Persistent connection
When performing an agent-server communication, McAfee Agent keeps the communication channel with McAfee ePO alive, so
that multiple requests and responses such as property upload, policy download, and events upload are passed between the
agent and the Agent Handler in the same TCP connection. Once the communication is complete, the connection is closed.
Previous versions of McAfee ePO required multiple TCP connections from McAfee Agent during a single agent-server
communication. This required more network bandwidth, whereas keeping the connection alive reduces the network bandwidth.
Sensor services
McAfee Agent uses sensor services to track system events and take actions on the client system. There are two types of sensor
services:
• User sensors — Detects the logged on users on the client system using operating system APIs and apply the user-based
policies accordingly.
• Network sensors — Detects the network connectivity status using operating system network APIs and determines if the
agent functionality such as pulling updates from the repository or communicating to McAfee ePO should be performed.
Peer-to-peer communication
To retrieve updates and install products, McAfee Agent communicates with McAfee ePO. These updates might be available with
the agents in the same subnet. With peer-to-peer communication, McAfee Agent downloads updates from the peer agents in
the same subnet, reducing bandwidth consumption between McAfee ePO and McAfee Agent.
Remote provisioning
You can use remote provisioning to:
• Convert an unmanaged McAfee Agent to managed — Use the command-line switch to convert McAfee Agent mode
from unmanaged to managed (that is, provision to McAfee ePO).
• Migrate from one McAfee ePO to another — Use the command-line switch to migrate McAfee Agent from one McAfee
ePO to another.
Note
The MsgbuscertupdaterPackage.zip package is downloaded automatically at the client nodes. This default download task is
also scheduled to download the package at 12 a.m. (local time) every day.
Self-protection
McAfee Agent protects unauthorized access to all internal Agent assets such as the databases, files, folders, and registries using
McAfee VSCore. The admin can choose to enable or disable the service protection with McAfee Agent self-protection policy.
Because McAfee Agent 5.0.5 or later doesn't consume SysCore in its installer, it doesn't upgrade or install SysCore on the system.
This makes McAfee Agent installer lightweight and reduces the size of the package and installation time. Once a supported
version of SysCore (15.3.0.673 or later) is installed on the system, McAfee Agent starts using its protection capabilities, enables
self-protection for files, folders, registry, services, and executables.
Installer improvements
In the event of shutdown or restart, McAfee Agent now provides additional information to the user when products are being
deployed onto the system.
If the user initiates system shutdown or restart when the agent is deploying products, McAfee Agent notifies the user that the
shutdown can't continue. If continued, this might cause stability issues to the operating system. The user can still continue with
the shutdown operation. Once the product deployment is complete, the user can reinitiate shutdown later by clicking Cancel on
the notification displayed. If not, the system automatically continues for shutdown.
Note
McAfee product updates such as DAT and content updates are not affected by this new feature.
Note
Smart Scheduler supports VMware ESXi, Citrix XenServer, Microsoft Hyper-V, Microsoft Azure, and Amazon Web Services. This
feature is not supported on physical systems.
For more details about configuring Smart Scheduler, see the McAfee Endpoint Security for Servers product documentation.
McAfee Agent 5.6.0 has the capability to block the deployment of incompatible McAfee products on the client system, which is
based on the incompatibility specification list.
SuperAgent Yes No No
How it works
Installing the agent on client systems is required for managing your security environment through McAfee ePO.
This diagram shows how the McAfee Agent works when installed on client systems through McAfee ePO.
SELinux is a kernel security module that allows enforcement of access controls that are loaded at the start of a system.
You can use SELinux to confine programs and services as well as access to files, network, IPC, and other processes. SELinux RPM
provides SELinux policies to confine all services installed by McAfee Agent. When you install McAfee Agent along with SELinux
RPM, the SELinux modules create contexts for McAfee Agent processes, binaries, configuration files, log files, etc. and all Agent
processes run in SELinux confinement.
Note
McAfee Agent SELinux is supported on RHEL 7.x and 8.x versions. For information about the supported RHEL versions, see
KB51573.
When you enable McAfee Agent SELinux, the following are the default allowed directories for the processes and features to
perform its operations.
• The command-line, maconfig and cmdagent tools, accesses the directory in /tmp, /var/tmp, /var/log, /var/McAfee/
agent/logs.
• McAfee Agent processes access the directory in /var/McAfee/agent.
• Super Agent, peer-to-peer and relay accesses the directory in /var/McAfee/agent.
To change the allowed default directory to any other directory when you enable SELinux, you need to perform the steps
mentioned in KB94454. For example, you can change the Super Agent or peer-to-peer repository from /var/McAfee/agent to /
tests/test through McAfee Agent general policy from McAfee ePO by following the steps mentioned in KB94454.
Before distributing McAfee Agent throughout your network, consider carefully how you want McAfee Agent to behave in
the segments of your environment. Although you can configure McAfee Agent policy settings after they are distributed, we
recommend setting them before the distribution, to prevent unnecessary impact on your resources.
Note
Only the difference in the policy settings is downloaded from the server when using McAfee Agent 5.0.0 or later.
General policy
Settings available for General policy are divided into following tabs.
Tab Settings
General
• Policy enforcement interval
• Use of system tray icon in Windows environments
• Enabling system tray icon in a remote desktop
session
• (McAfee ePO On-Premises) McAfee Agent and
SuperAgent wake-up call support
• Whether to accept connections only from McAfee
ePO
• Yielding of the CPU to other processes in Windows
environments
• Restricting McAfee Agent processes, services, and
registry keys change
• Rebooting options after product deployment in
Windows environments
• The agent-server communication
• Retrieving all system and product properties
SuperAgent
• Enabling RelayServer on McAfee Agent
• Disabling discovery of RelayServers
• (McAfee ePO On-Premises parameters):
Tab Settings
Events
• Enabling/disabling priority event forwarding
• Level of priority events forwarded
• Interval between event uploads
• Maximum number of events per upload
Logging
• Enabling/disabling application logging
• Setting the log file size limit and rollover count
• Level of logging detail
• (McAfee ePO On-Premises) Enabling/disabling
remote logging
• (McAfee ePO On-Premises) Setting to enable
remote access to logs
Updates
• Custom update log file location
Tab Settings
Peer-to-Peer
• Enable peer-to-peer communication on McAfee
Agent to enable peer-to-peer client
Deployment
• Enable McAfee Agent to perform incompatibility
check during McAfee product deployment
Note
(McAfee ePO On-Premises) When importing My Default General policy from the McAfee ePO 4.6.6 server to the McAfee
ePO 5.1.1 server, the policy values for Peer-to-Peer feature are replicated from McAfee Default policy rather than My Default
policy on the McAfee ePO 5.1.1 server.
Repository policies
Repository policies settings can be configured using Repositories and Proxy tabs.
Note
On McAfee ePO Cloud, only Proxy server settings can be configured using the Repository policy.
Tab Settings
Troubleshooting policies
Settings available for Troubleshooting policies are contained in one tab.
Tab Settings
Tab Settings
Tab Settings
You can configure McAfee Agent to forward events to McAfee ePO on a priority basis, if they are equal to or greater than a
specified severity.
During normal operation, McAfee Agent and security software on the managed system generate software events regularly.
These events are uploaded to the server at each agent-server communication, at a set upload interval and are stored in the
database. These events can range from information about regular operation, such as when McAfee Agent enforces policies
locally, to critical events, such as when a virus is detected and not cleaned. A typical deployment of McAfee Agent in a large
network can generate thousands of these events an hour.
If you plan to use Automatic Responses, enable priority uploading of higher severity events for those features to function as
intended. McAfee Agent sends lower priority events to McAfee ePO on later agent-server communication intervals.
Specific event severities are determined by the product that generates the events. You can enable priority uploading of events on
the Events tab of the McAfee Agent policy pages.
The table lists the events generated by McAfee Agent with IDs and severity.
Retrieve system properties to fetch information about the defined properties and installed programs on the managed systems.
At each agent-server communication, McAfee Agent sends information to McAfee ePO about the managed computer, including
information about the software products that are installed.
• McAfee Agent policy that specifies whether to retrieve a full set of information about installed programs, or only a
minimal set as defined by the McAfee products.
• (McAfee ePO On-Premises) The task setting that specifies whether to retrieve all properties defined by McAfee Agent
policy, or only properties that have changed since the last agent-server communication. This setting is available when
configuring an immediate or scheduled wake-up call.
Use System Tree actions to wake up McAfee Agent on non-Windows operating systems.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → General. Click Edit to update a policy.
You can also edit the policy from Policy Details on the right pane.
Note
For McAfee ePO 5.9 or earlier and McAfee ePO Cloud, select McAfee Agent in the Product drop-down list and General
in the Category drop-down list. Click a policy name to update it.
3. Deselect Retrieve all system and product properties (recommended). If unchecked retrieve only a subset of properties.
to send system properties and minimal product properties.
This is selected by default.
4. Click Save.
5. Select Menu → Client Tasks → Client Task Catalog.
Note
For McAfee ePO 5.9 or earlier and McAfee ePO Cloud, select Menu → Policy → Client Task Catalog.
Safe install using Product Deployment Incompatibility check (McAfee ePO On-Premises)
McAfee Agent 5.6.0 checks for incompatibilities with McAfee products before it is deployed on the client system using a McAfee
ePO deployment task.
You can see the safe install errors in the install failure client event details in McAfee ePO. The following table shows the list of
errors displayed on the Client Event: Details page.
Types of error
You can view the Product Deployment Incompatibility report using either Dashboard or Queries & Reports.
The Product Deployment Incompatibility queries display a bar chart with product incompatibilities detected during product
deployment on the client system.
The following queries are available on the Product Deployment Incompatibility report:
You can view the Product Deployment Incompatibility report using Dashboard on the McAfee ePO console.
Task
1. Select Menu → Dashboards.
2. Select Product Deployment Incompatibility from McAfee Dashboards pop down list.
The Product Deployment Incompatibility report is displayed.
Results
View the Product Deployment Incompatibility report using Queries & Reports
You can view the Product Deployment Incompatibility report using Queries & Reports on the McAfee ePO console.
Task
1. Select Menu → Queries & Reports.
2. From McAfee Groups, select Agent Management.
The list of queries is displayed. You can run queries to view the Product Deployment Incompatibility report.
Results
Check for product incompatibilities using safe install during McAfee product deployments.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → General.
Click Edit to update a policy.
3. Click the Deployment tab.
4. Select Enable Incompatibility check.
5. Click Save.
Repositories are selected in a policy. McAfee products are updated from the repositories you specify in the Repository policies.
See McAfee ePO product documentation for details about Repositories and different types of repositories.
McAfee Agent can update from any repository in its repository list based on the policy setting. These repository policies allow
you to specify the most efficient means for designating a source repository for updates. You can select repositories based on
ping time, subnet distance, or from a preset list.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → Repository. Click New Policy to create a policy or select Edit → Duplicate on the
right pane for the My Default policy name to create a policy based on the default.
Note
For McAfee ePO 5.9 or earlier, select McAfee Agent from the Product drop-down list, and Repository in the Category
drop-down list. Click New Policy to create a policy, or select Duplicate in the Actions column for the My Default policy
name to create a policy based on the default.
Note
McAfee Agent selects a repository each time a change occurs in the repository list, IP address, or Repository policy
option.
You might need to configure proxy settings if an agent is having trouble accessing the Internet. The proxy is supported on
Windows, Macintosh, and Linux operating systems.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → Repository. Click Edit to update a policy.
Note
For McAfee ePO 5.9 or earlier and McAfee ePO Cloud, select McAfee Agent from Product drop-down list and
Repository from Category drop-down list.
3. From the list of policies, select any policy listed on this page other than McAfee Default.
4. Click Proxy.
5. Select your preferred option:
• Select Do not use a proxy if your agent does not require a proxy to access the Internet.
• Select Use Internet Explorer settings (For Windows) / System Preferences settings (For Mac OSX)/ System
environment variables (For Linux), then enable Allow user to configure proxy settings.
Note
On Linux systems, you can add or modify the proxy information in the /etc/ma.d/ma_environment.conf file.
Restart the McAfee Agent services once you add or modify the proxy information. The proxy information in a
ma_environment.conf file can be as shown below:
http_proxy=<proxy_url>:<proxy_port>
HTTP_PROXY=<proxy_url>:<proxy_port>
https_proxy=<proxy_url>:<proxy_port>
HTTPS_PROXY=<proxy_url>:<proxy_port>
no_proxy=<localhost>
all_proxy=<proxy_url>:<proxy_port>
To configure the proxy settings for McAfee Agent, and to allow continuous communication with McAfee ePO when
a user session is logged out, use the netsh command to set the proxy.
netsh winhttp import proxy source =ie (if the proxy already configured in IE)
or
netsh winhttp set proxy <proxy>:<port>
• Select Manually configure the proxy settings if you need a proxy other than Internet Explorer, and configure the
following settings:
Select a form for the address of the source HTTP or FTP location where the agent pulls updates.
DNS Name
IPv4
IPv6
Type the DNS name or IP address and port numbers of the HTTP or FTP source. If appropriate, select Use
these settings for all proxy types.
Select Specify exceptions to designate systems that do not require access to the proxy.
Select Use HTTP proxy authentication and Use FTP proxy authentication, then provide a user name and
credentials.
6. Click Save.
McAfee Agent 5.5.2 or later replaces the Product Improvement Program (PIP) with a new, more efficient, and more secure
product telemetry framework.
To simplify the management experience, the new framework is integrated with McAfee Agent management extension and client.
This integration eliminates the need for a separate PIP extension. McAfee Agent 5.6.0 or later installer removes any previously
installed PIP extension and PIP client. To make these changes as transparent as possible, we have maintained the name of the
Server Setting in McAfee ePO and maintained previous PIP settings with this new capability.
Purpose
McAfee uses the data that is collected by the agent. The data collected is:
• Analyzed by McAfee to improve product features and customers' experience with the product.
• Used by McAfee Technical Support for troubleshooting.
Privacy protection
The data collected by McAfee Agent will be used only for product improvement and Technical Support. The system-specific data
will be filtered or used in aggregate form, unless it is required for Technical Support. For details about McAfee Privacy Notice, see
https://www.mcafee.com/enterprise/en-us/about/legal/privacy.html.
You can configure the McAfee ePO server settings to enable Product Improvement Program capability.
Task
1. Click Menu → Configuration → Server Settings, select Product Improvement Program from the Setting Categories, then
click Edit.
2. Select Yes to allow McAfee to collect anonymous diagnostic and usage data, then click Save.
You can manage Product Improvement Program on multiple client systems using the McAfee Agent PIP policy.
Task
1. Click Menu → Systems → System Tree, then select a group in the System Tree.
All systems within this group (but not its subgroups) appear in the details pane.
2. Select the required systems, then click Actions → Agent → Set Policy & Inheritance.
3. Select McAfee Agent as the Product, Product Improvement Program as the Category, then select the required policy.
See the ePolicy Orchestrator product documentation for more information about creating and editing policies.
4. Select whether to Reset inheritance or Break inheritance, then click Save.
These system properties can be used to tag and identify managed systems to perform actions such as assign policies, tasks, and
sort systems in the System Tree. You can configure Custom Properties policy to determine which custom properties are set on
the client system.
• A custom property that is empty can be overwritten by system administrators regardless of write policy set.
Note
Starting with McAfee Agent 5.0.5, you can set up to eight Custom Properties. When using McAfee Agent 5.0.5 with earlier
versions of McAfee ePO (before 5.9.0), the first four (1–4) Custom Properties are reported as part of system properties that
can be effectively used for tagging, queries, and quick find features. The remaining four (5–8) Custom Properties can't be
used for tagging features and are reported as part of McAfee Agent product properties.
The following table explains the behavior of Custom Properties on the System Properties page for different versions of McAfee
ePO and McAfee Agent.
The custom properties field does not support use of double quotation marks ("). you can use the single quotation mark (') as an
alternative. For example:
System administrators' action on Custom Properties is based on the following policy conditions:
• If the Allow edit option is enabled in the policy, system administrators can change a custom property multiple times
using the maconfig/frminst command.
• If Allow view is enabled in the policy, system administrators can view the custom property value from the registry or
using the cmdagent command.
Windows: cmdagent.exe -x
Non-Windows: cmdagent -x
• If the Allow view option is disabled in the policy, system administrators can't view the custom property value from the
registry or using the cmdagent command.
Determine which properties of the Custom Properties policy are set on client systems.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → Custom Properties. Click Edit to update a policy.
For McAfee ePO 5.9 or earlier and McAfee ePO Cloud, select McAfee Agent from Product list, then select Custom
Properties from the Category list.
3. Click New Policy, type the policy name, then click OK.
4. Click the new policy name you created from the Policy Catalog page.
5. Set the Allow view and Allow edit options for each Custom Property as needed.
6. Click Save.
Task
1. Select Menu → Client Tasks → Client Task Catalog.
Note
For McAfee ePO 5.9 or earlier and McAfee ePO Cloud, select Menu → Policy → Client Task Catalog.
2. From the Client Task Types list, select McAfee Agent → Custom Properties.
3. Click New Task, select Custom Properties as task type, then click OK.
4. Type a name and description for the task.
5. In Custom Properties, configure these fields as needed:
• Set Values — Enable or disable setting custom property value through a task.
Overwrite client system values:
If enabled, a new value overwrites the existing value regardless of the value set on the client
system.
If disabled and property is empty on the client system, a new value is set.
• Grant one-time edit permission — Enable or disable McAfee ePO administrator to grant one-time edit permission
through a task.
One-time edit permission — Grant one-time permission for system administrators to edit a particular
custom property on the client system.
6. Click Save.
These communications are referred as agent-server communication. During each agent-server communication, McAfee Agent
collects its current system properties, as well as events that have not yet been sent, and sends them to the server. The server
sends new or changed policies and tasks to McAfee Agent, and the repository list if it has changed since the last agent-server
communication. McAfee Agent enforces the new policies locally on the managed system and applies any task or repository
changes.
Note
McAfee ePO uses an industry-standard Transport Layer Security (TLS) network protocol for secure network transmissions.
When McAfee Agent is first installed, it calls into the server in 45 seconds. After, McAfee Agent calls in when one of the following
occurs:
Note
After upgrading McAfee Agent extension on MVISION ePO, the minimum ASCI value changes to 60 minutes for
existing customer policies if its earlier ASCI value is less than 60 minutes. For more information, see KB94254. There
is no change in the minimum ASCI value for the On-premise ePO.
Note
For details about how to troubleshoot agent-server communication failures in McAfee Agent 5.x.x, see KB90603.
The agent-server communication interval (ASCI) determines how often the agent calls into McAfee ePO.
The ASCI is set on the General tab of the McAfee Agent policy page. The default setting of 60 minutes means that McAfee Agent
contacts McAfee ePO once every hour. When deciding whether to change the interval, consider that McAfee Agent performs
each of the following actions at each ASCI:
Note
In general, if your environment includes these variables, you want to perform agent-server communications less often. For
individual clients with critical functions, you might want to set a more frequent interval.
When a client system can't connect with McAfee ePO, you must resolve the issue to re-establish communication.
Communication interruptions can happen for many of reasons, and the agent-server connection algorithm is designed to
reattempt communication if its first attempt fails.
McAfee Agent tries to establish connection using one of these methods. If all these methods fail, McAfee Agent tries to connect
again during the next ASCI.
• IP address
• Fully qualified domain name
• NetBIOS name
• Relay
• Proxy
A wake-up call triggers an immediate agent-server communication rather than waiting for the current interval to elapse.
Note
• Manually from the server — The most common approach and requires an open wake-up communication port.
• On a schedule set by the administrator — Useful when a policy requires manual agent-server communication.
The administrator can create and deploy a wake-up task, which wakes up McAfee Agent and initiates agent-server
communication.
• You make a policy change that you want to enforce immediately, without waiting for the scheduled ASCI.
• (McAfee ePO On-Premises) You created a task that you want to run immediately. The Run Task Now option creates a
task, then assigns it to specified client systems and sends wake-up calls.
• A query generated a report indicating that a client is out of compliance, and you want to test its status as part of a
troubleshooting procedure.
(McAfee ePO On-Premises) If you converted a particular McAfee Agent to a SuperAgent, it can issue wake-up calls to designated
network broadcast segments. SuperAgent distributes the bandwidth impact of the wake-up call.
Manually send a wake-up call to managed systems when you make policy changes and want to enforce them before the next
agent-server communication.
Task
1. Select Menu → Systems → System Tree, then select the group that contains the target systems.
2. Select the systems from the list, then click Actions → Agent → Wake Up Agents.
3. Make sure the systems you selected appear in the Target Systems section.
4. (McAfee ePO On-Premises) Next to Wake-up call type, select whether to send an Agent Wake-Up Call or SuperAgent
Wake-Up Call as appropriate.
5. Accept the default Randomization (0 minutes) or type a different value (0–60 minutes). Consider the number of systems
that are receiving the wake-up call when it is sent immediately, and how much bandwidth is available. If you type 0,
agents respond immediately.
6. To send incremental product properties as a result of this wake-up call, deselect Retrieve all properties.... The default is
to send full product properties.
7. To update all policies and tasks during this wake-up call, select Force complete policy and task update.
8. Enter the Number of attempts, Retry interval, and Cancel after settings for this wake-up call if you do not want the
default values.
9. (McAfee ePO On-Premises) Select whether to wake up agent using All Agent Handlers, Last Connected Agent Handlers,
or Selected Agent Handler.
10. Click OK to send a wake-up call.
Manually send a wake-up call to an entire group of managed systems when you make policy changes and want to enforce them
before the next agent-server communication.
Task
1. Select Menu → Systems → System Tree.
2. Select the target group from the System Tree and click the Group Details tab.
3. Click Actions → Wake Up Agents.
4. Make sure that the selected group appears next to Target group.
5. Select whether to send the wake-up call to All systems in this group or to All systems in this group and subgroups.
6. Next to Wake-up call type, select whether to send an Agent Wake-Up Call or SuperAgent Wake-Up Call.
7. Accept the default Randomization (0 minutes), or type a different value (0–60 minutes). If you type 0, agents awaken
immediately.
8. To send minimal product properties as a result of this wake-up call, deselect Retrieve all properties.... The default is to
send full product properties.
9. To update all policies and tasks during this wake-up call, select Force complete policy and task update.
10. Click OK to send a wake-up call.
The SuperAgent caches information received from McAfee ePO, the Master Repository, an HTTP, or an FTP repository, and
distributes it to the agents in its broadcast domain. Configure a SuperAgent in every broadcast domain when managing agents
in larger networks.
The Lazy Caching feature allows the SuperAgent to retrieve data from McAfee ePO only when requested by a local agent system.
Creating a hierarchy of SuperAgents with lazy caching further saves bandwidth and minimizes the load on McAfee ePO.
A SuperAgent also broadcasts wake-up calls to other agents on the same network subnet. The SuperAgent receives a wake-up
call from McAfee ePO, then wakes up the agents in its subnet.
Note
This broadcast is an alternative to sending ordinary wake-up calls to each agent in the network or sending agent wake-up
task to each computer.
SuperAgent contacts all agents in the same subnet using the SuperAgent wake-up call.
SuperAgent distributes the bandwidth load of concurrent wake-up calls. Instead of sending wake-up calls from the server to
every McAfee Agent, the server sends the SuperAgent wake-up call to SuperAgents in the selected System Tree segment.
When you send a SuperAgent wake-up call, McAfee Agent without an operating SuperAgent on their broadcast domain are not
prompted to communicate with the server.
McAfee Agent and SuperAgent wake-up calls use the same secure channels. Make sure that the following ports are not blocked
by a firewall on the client:
Task
1. Select Menu → Systems → System Tree → Systems tab, then select the required group under System Tree.
All systems in this group appear in the details pane
2. Select the required system, then click Actions → Agent → Edit Policies on a Single System.
The Policy Assignment page for that system appears.
3. From the Product drop-down list, select McAfee Agent.
The policy categories are listed with the system’s assigned policies.
4. Click Edit Assignment under Actions corresponding to the General policy category.
5. Next to the Inherit from option, select Break inheritance and assign the policy and settings below to inherit the policies
from.
6. From the Assigned policy drop-down list, select My Default policies, then click Edit Policy.
Note
7. On the SuperAgent tab, next to Repository options, enable Convert agents to SuperAgents to allow broadcasting of
wake-up calls.
8. Click Save.
9. Send a wake-up call.
The SuperAgent caches the contents of its repository in a way that minimizes the load on McAfee ePO.
If an agent has been converted to a SuperAgent, it can cache content from McAfee ePO, the distributed repository, or other
SuperAgent to distribute locally to other agents, reducing load on McAfee ePO.
Note
SuperAgent caching with repository replication is not recommended. The SuperAgent can't cache content from McAfee HTTP
or FTP repositories.
The SuperAgent is guaranteed only to store content required by the agents assigned to it because it does not pull any content
from the repositories until requested from a client. This minimizes traffic between the SuperAgent and the repositories. While
the SuperAgent is retrieving content from the repository, client system requests for that content are paused.
To enable LazyCaching, go to Menu → Policy → Policy Catalog → McAfee Agent → General → SuperAgent, then select Enable
LazyCaching.
Important
The SuperAgent must have access to the repository. Without this access, agents receiving updates from the SuperAgent
never receive new content. Make sure that your SuperAgent policy includes access to the repository.
Agents configured to use the SuperAgent as their repository receive the content cached in the SuperAgent instead of directly
from McAfee ePO. This improves agent system performance by keeping most network traffic local to the SuperAgent and its
clients.
If the SuperAgent is reconfigured to use a new repository, the cache is updated to reflect the new repository.
Important
Do not use SuperAgent caching with global updating. These features serve the same function in your managed environment,
keeping your distributed repositories up to date. But, they are not complementary features. Use SuperAgent caching
when limiting bandwidth usage is your primary consideration. Use Global Updating when quick enterprise updating is
your primary consideration. See McAfee ePO product documentation for more details about Global Updating. SuperAgent
caching with repository replication is not recommended.
Configure a flush interval on the SuperAgent policy page to remove content from the SuperAgent memory if the content is
outdated.
The next time the SuperAgent receives a content request after the flush interval, it downloads the requested file hash. If there is
a mismatch in the file hash, the outdated content is removed and the latest files are retrieved and served to the agent.
Task
1. Select Menu → Systems → System Tree → Systems tab, then select the required group under System Tree.
All systems in this group appear in the details pane.
2. Select the required system, then click Actions → Agent → Edit Policies on a Single System.
The Policy Assignment page for that system appears.
3. From the Product drop-down list, select McAfee Agent.
The policy categories are listed with the system’s assigned policies.
4. Click Edit Assignment under Actions corresponding to the General policy category.
5. Next to the Inherit from option, select Break inheritance and assign the policy and settings below to inherit the policies
from.
6. From the Assigned policy drop-down list, select My Default policies, then click Edit Policy.
Note
Note
Configure the interval for the SuperAgent to purge cache content that is no longer in use.
The cache content is downloaded when a client system requests for an update. The previous content update files might still be
available in the local disk, but might not be listed in the Replica.log file. If a file is not listed, it is purged. By default the cache
content is purged every day.
Note
The Replica.log file contains information about files and folder in its respective directory. Every directory in the repository
contains a Replica.log file.
Task
1. Select Menu → Systems → System Tree → Systems tab, then select the required group under System Tree.
All systems in this group appear in the details pane.
2. Select the required system, then click Actions → Agent → Edit Policies on a Single System.
The Policy Assignment page for that system appears.
3. From the Product drop-down list, select McAfee Agent.
The policy categories are listed with the system’s assigned policies.
4. Click Edit Assignment under Actions corresponding to the General policy category.
5. Next to Inherit from option, select Break inheritance and assign the policy and settings below to inherit the policies
from.
6. From the Assigned policy drop-down list, select My Default policies, then click Edit Policy.
Note
Note
Traffic between locations can be reduced by ensuring best practices when enabling SuperAgent in your network.
• Enable SuperAgent servers on PCs or virtual systems. Don't enable a SuperAgent server on laptops or other mobile
devices.
• Avoid setting up SuperAgent servers on systems with poor network connectivity or are connected using VPN.
• Set up at least one SuperAgent per subnet to reduce the network load. Each SuperAgent can handle 1024 requests
concurrently.
• If you set up SuperAgent Hierarchical Update, make sure that your hierarchy of SuperAgents is no more than three
levels.
• Configure the Max. disk quota to be greater than the disk space requirement for all commonly used applications and
their updates. For example, if the DAT file size is 150 MB and the average product update size is 100 MB, the purging disk
quota should be more than 250 MB.
SuperAgent hierarchy
A hierarchy of SuperAgents can serve agents in the same network with minimum network traffic utilization.
A SuperAgent caches the content updates from McAfee ePO or distributed repository and distributes it to the agents in the
network, reducing the load on McAfee ePO. It is always ideal to have more than one SuperAgent to balance the network load.
Note
Make sure that you enable Lazy caching before you set the SuperAgent hierarchy.
Use the Repository policy to create the hierarchy. We recommend that you create a three level hierarchy of SuperAgents in your
network.
Creating a hierarchy of SuperAgents avoids repetitive download of the content update from McAfee ePO or distributed
repository. For example, in a client network with multiple SuperAgents (SuperAgent 1, SuperAgent 2, SuperAgent 3, and
SuperAgent 4) and a distributed repository, configure the hierarchy so that the client systems receive the content updates from
their respective SuperAgents (SuperAgent 2, SuperAgent 3, or SuperAgent 4). The SuperAgent 2, 3, and 4 receive and cache
updates from SuperAgent 1, and the SuperAgent 1 receives and caches updates from the distributed repository.
In the previous example, SuperAgent 2, SuperAgent 3, and SuperAgent 4 are configured as SuperAgents for the client systems
in their respective broadcast domain.
Note
The SuperAgents can't cache content from McAfee ePO HTTP or FTP repositories.
When creating a hierarchy, make sure that the hierarchy doesn't form a cycle of SuperAgent; for example SuperAgent 1 is
configured to pull updates from SuperAgent 2, SuperAgent 2 is configured to pull updates from SuperAgent 3, and SuperAgent
3 in turn is configured to pull updates from SuperAgent 1.
To make sure that the parent SuperAgent is up to date with the latest content update, SuperAgent wake-up calls broadcast must
be enabled.
Note
If the SuperAgents don’t serve agents with latest content update, agent falls back to the next repository configured in the
policy.
Creating a hierarchy of SuperAgents with lazy caching further saves bandwidth and minimizes the wide-area network traffic.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → General.
Note
For McAfee ePO 5.9 or earlier, select McAfee Agent in the Product drop-down list and General in the Category
drop-down list.
3. Click the My Default policy to start editing the policy. To create a policy, click New Policy.
Note
4. On the SuperAgent tab, select Convert agents to SuperAgents to convert the agent to a SuperAgent and update its
repository with latest content.
5. Select Use systems running SuperAgents as distributed repository to use the systems that host SuperAgents as update
repositories for the systems in its broadcast segment. Then, provide the Repository Path.
6. Select Enable Lazy caching to allow SuperAgents to cache content when it is received from McAfee ePO.
7. Click Save.
The Policy Catalog page lists the General policies.
8. Change the Category to Repository, then click the My Default policy to start editing the policy. If you want to create
policy, click New Policy.
9. On the Repositories tab, select Use order in repository list.
10. Click Automatically allow clients to access newly-added repositories to add new SuperAgent repositories to the list.
Then, click Move to Top to arrange the SuperAgents in a hierarchy.
Note
Arrange the hierarchy of the repositories so that the parent SuperAgent is always at the top of the repository list.
A McAfee Agent discovers each RelayServer in the network at every agent-server communication, and caches details for the first
five unique servers to respond. If the connection fails or the required content update isn't available, McAfee Agent connects to
the first RelayServer in its cached list.
Relay capability can be enabled on McAfee Agent that does not have direct connectivity to McAfee ePO or Agent Handler
to bridge communication between the client systems and McAfee ePO. You can configure more than one McAfee Agent as a
RelayServer to maintain network load balance.
Note
When a McAfee Agent uses relay to communicate with McAfee ePO, the connections are established in two parts; first between
McAfee Agent and the RelayServer, and second between the RelayServer and McAfee ePO. These connections are maintained
during the communication.
Note
If enabling a non-Windows system as a RelayServer, make sure that you manually add an exception for the macmnsvc, masvc,
macompatsvc, and Mue_InUse processes and the service manager port to the iptables and ip6tables.
Task
1. Select Menu → Systems → System Tree → Systems tab, then select the required group under System Tree.
All systems in this group appear in the details pane.
2. Select the required system, then click Actions → Agent → Edit Policies on a Single System.
The Policy Assignment page for that system appears.
3. From the Product drop-down list, select McAfee Agent.
The policy categories are listed with the system’s assigned policies.
4. Click Edit Assignment under Actions corresponding to the General policy category.
5. Next to the Inherit from option, select Break inheritance and assign the policy and settings below to inherit the policies
from.
6. From the Assigned policy drop-down list, select My Default policies, then click Edit Policy.
Note
• Select Enable Relay Communication to allow agents to discover RelayServers in the network.
• Select Disable Discovery to disable UDP broadcast (discovery) in the client network to detect RelayServer.
Specify the RelayServer IP address or Host name and Port number through which the agent communicates
with McAfee ePO in the network.
Note
Enable relay capability in the organization's network. A RelayServer can't connect to McAfee ePO using
proxy settings.
Note
To disable the relay capability on McAfee Agent, deselect Enable Relay Communication and Enable RelayServer
respectively.
9. Click Save.
10. Send a wake-up call.
Results
After the first ASCI, the status of the RelayServer is updated in the McAfee Agent Properties page or the McTray UI on the client
system.
The log file macmnsvc_<hostname>.log is saved in these locations:
Peer-to-peer communication
Downloading content updates from peer agents
Downloading updates and installation files from peers (agents in the same broadcast domain) reduces the load on McAfee ePO.
A McAfee Agent can be configured as a peer-to-peer server or client as needed. Configuring a McAfee Agent as a peer-to-
peer server enables it to provide updates to others in the broadcast domain when requested. A peer-to-peer server has
local disk space allocated to cache updates. By default, the peer-to-peer server caches 512 MB of updates at <agent data
folder>\data\mcafeeP2P, but the cache size and location can be customized. You can also configure the policy to purge updates
cached in the local disk.
When an agent requires a content update, it tries to discover peer-to-peer servers with the content update in its broadcast
domain. On receiving the request, the agents configured as peer-to-peer servers check if they have the requested content and
respond back to the agent. The agent requesting the content downloads it from the peer-to-peer server that responds first.
Note
Enable the policy option Enable Peer-to-Peer Communication to allow the client system to discover peer-to-peer servers in
the broadcast domain.
If a McAfee Agent can't discover a peer-to-peer server or the content update among its peers in the broadcast domain, it falls
back to the repository, as configured in the policy.
Peer-to-peer communication uses port 8082 to discover peer servers and port 8081 to serve peer agents with updates.
Peer-to-peer server purges the content based on the disk quota and purge interval configuration.
Traffic between locations can be reduced by following best practices when enabling peer-to-peer communication in your
network.
• We recommend that you enable peer-to-peer servers on PCs or virtual systems. Enabling peer-to-peer server on laptops
or other mobile devices is not recommended.
• We recommend that you disable peer-to-peer servers on the systems that have poor network connectivity or are
connected using VPN.
• When deploying McAfee Agent or managed products, or updating the products on large number of systems, we
recommend that you enable peer-to-peer client on all systems. This limits the network traffic in the local subnet during
the deployment or update.
• Peer-to-peer communication is enabled by default. If your organization restricts peer-to-peer communication, disable
the peer-to-peer policy.
• We recommend that you configure the Max disk quota always greater than the size of sum of commonly used
application and updates (For example, if the DAT file size is 150 MB and the average product update size is 100 MB,
the peer-to-peer disk quota should be more than 250 MB).
To reduce the load on McAfee ePO, enable peer-to-peer service in your broadcast domain.
Note
Task
1. Select Menu → Systems → System Tree → Systems tab, then select the required group under System Tree.
All systems in this group appear in the details pane.
2. Select the required system, then click Actions → Agent → Edit Policies on a Single System.
The Policy Assignment page for that system appears.
3. From the Product drop-down list, select McAfee Agent.
The policy categories are listed with the system’s assigned policies.
4. Click Edit Assignment under Actions corresponding to the General policy category.
5. Next to the Inherit from option, select Break inheritance and assign the policy and settings below to inherit the policies
from.
6. From the Assigned policy drop-down list, select My Default policies, then click Edit Policy.
Note
• Select Enable Peer-to-Peer Communication to allow McAfee Agent to discover and use peer-to-peer servers in the
network.
• Select Enable Peer-to-Peer Serving to enable McAfee Agent to serve content to peer agents.
8. Click Save.
Collect RelayServer statistics and network bandwidth saved by Peer-to-Peer communication and SuperAgent hierarchy.
Note
Task
1. Select Menu → Systems → System Tree → Systems, then select a group under the System Tree.
The details pane lists all systems in the group.
2. Select a system, then click Actions → Agent → Edit Tasks on a Single System to display the system's client tasks.
3. Click Actions → New Client Task Assignment.
4. From the product list, select McAfee Agent, then select McAfee Agent Statistics as the Task Type.
5. Click Create New task.
6. Select the required option, then click Save.
Note
Once the task is deployed on the client system and the status is reported to McAfee ePO, the statistics are reset to 0.
Results
To see the statistics collected by McAfee Agent, create and run a new Agent Statistics Information query.
Change the language for the agent interface and event log
Force the agent on a target system to run and publish log entries in the selected language.
You can change the agent user interface and logging language on a managed system with a McAfee ePO policy. This setting
forces the agent on the target system to run and publish log entries in the selected language.
Note
Individual McAfee security software products control some text. This text might follow regional or locale settings.
Task
1. Select Menu → Policy → Policy Catalog.
2. From Products, select McAfee Agent → Troubleshooting.
Note
For McAfee ePO 5.9 or earlier and McAfee ePO Cloud, select McAfee Agent in the Product drop-down list and
Troubleshooting in the Category drop-down list.
Results
When you assign this policy to a system, the agent on that system runs and publishes log messages in the selected language. If
this language does not match the active windows system locale, the log messages appearing in the Agent Monitor user interface
might not be legible.
Note
Regardless of language selection, some log messages are always published in English to aid McAfee in troubleshooting
customer issues.
Note
Deploying patches and service packs from the Evaluation or Previous repositories is designed to allow update
testing on a limited subset of systems before a broader deployment. We recommend moving approved patches
and service packs to the Current repository when they are ready for general deployment.
3. Click OK.
Task
1. Select Menu → Automation → Automatic Responses to open the Automatic Responses page.
2. Click New Response.
3. Enter a Name for the response, and an optional Description.
4. Select ePO Notification Events for the Event group, and Client, Threat, or Server for the Event type.
5. Click Enabled to enable the response, then click Next.
6. From Available Properties, select Event Description.
7. Click ... in the Event Description row and choose an option:
• Agent failed to collect properties for any point products — This event is generated and forwarded when a
property collection failure first occurs. A subsequent success event is not generated. Each failing managed product
generates a separate event.
• Agent failed to enforce policy for any point products — This event is generated and forwarded when a policy
enforcement failure first occurs. A subsequent success event is not generated. Each failing managed product
generates a separate event.
8. Enter remaining information into the filter as needed, then click Next.
9. Select Aggregation, Grouping, and Throttling options as needed.
10. Choose an action type and enter a behavior depending on the action type, then click Next.
11. Review the summarized response behavior. If correct, click Save.
Results
The automatic response performs the described action when a policy event occurs.
On the Client Task Assignment Builder page, configure whether a task runs on a schedule.
If you disable scheduling, you must run the task from the System Tree → Systems page by clicking Actions → Agent → Run
Client Task Now.
Note
• Daily — Specifies that the task runs every day at a specific time, on a recurring basis between two times of the day, or a
combination of both.
• Weekly — Specifies that the task runs on a weekly basis. Such a task can be scheduled to run on a specific weekday, all
weekdays, weekends, or a combination of days. You can schedule a task to run at a specific time on the selected days, or
on a recurring basis between two times on the selected days.
• Monthly — Specifies that the task runs on a monthly basis. Such a task can be scheduled to run on one or more specific
days or weekdays of each month at a specific time.
• Once — Starts the task on the time and date you specify.
• At System Startup — Starts the task the next time you start the client.
• At logon — Starts the task the next time you log on to the client.
• Run immediately — Starts the task immediately.
Note
After the task is run for the first time, it will not run again.
• Configure the start and end dates when the client task is available or unavailable to run at the scheduled intervals.
• Specify the time when the task begins.
• Specify whether to run the task only once at the Start time, or to continue running until a later time. You can also specify
the interval when the task runs during this interval.
• Specify whether the task runs at the local time on the managed system or Coordinated Universal Time (UTC).
• Configure task behavior and what happens if the task runs too long, or whether the task runs if it was missed.
• Specify whether to run the task randomly in a specific interval.
Such client tasks reach the agent using the Datachannel communication. This allows agent to run these client tasks immediately.
Task
1. Select Menu → Systems → System Tree.
2. Select one or more systems where you want to run a task.
3. Click Actions → Agent → Run Client Task Now.
4. Select the Product as McAfee Agent and the Task Type.
5. To run an existing task, click the Task Name then click Run Task Now.
6. To define a new task, click Create New Task.
a. Enter the information appropriate to the task you are creating.
Results
The Running Client Task Status page appears, and displays the state of all running tasks. When the tasks are complete, the
It's possible for agents to become disabled, or for users to uninstall them. In other cases, the system hosting McAfee Agent
might have been removed from the network. We recommend performing regular weekly searches for systems with these
inactive agents.
Task
1. Select Menu → Reporting → Queries & Reports.
2. In the Groups list, select McAfee Groups, then select Agent Management group.
3. Click Run in the Inactive Agents row to run the query.
The default configuration for this query finds systems that have not communicated with McAfee ePO in the last 30 days.
Results
When you find inactive agents, review their activity logs for problems that might interfere with agent-server communication.
Note
(McAfee ePO On-Premises) The query results allow you to take actions on the systems identified, including ping, delete, wake
up, and redeploy McAfee Agent.
Note
McAfee ePO administrators can restart the client systems that require a reboot before scheduling the installation or upgrade
deployment tasks for the point products to avoid the possible unknown installation or upgrade failures. Reboot is detected only
for the McAfee point products and Windows update that requires a reboot. The Reboot Pending status from a client system is
sent as part of system properties, which gets updated during the next scheduled ASCI and on a manual property collection.
Task
1. Select Menu → Dashboards.
2. Select Product Reboot Pending from McAfee Dashboards pop down list.
The Product Reboot Pending dashboard is displayed. The color indicator can be one of the following:
• The number of sequence errors for each system in the Managed Systems Sequence Errors property.
• The date and time of the last sequence error in the Managed Systems Last Sequence Error property.
The tracked information is incorporated into one of the available predefined queries:
• Duplicate Agent GUID - remove systems with potentially duplicated GUIDs This task deletes the systems that have
many sequencing errors and classifies the agent GUID as problematic. As a result, the agent is forced to generate a new
GUID. The threshold number of sequencing errors is set in the query Systems with High Sequence Errors.
• Duplicate Agent GUID - Clear error count Sequencing errors can occur occasionally for inconsequential reasons. This
task clears the count of sequencing errors in systems that have not had any recent sequencing errors. This cleanup task
does not remove any problematic GUIDs. The threshold value for defining recent is set in the query Systems with no
Recent Sequence Errors.
Task
1. Select Menu → Automation → Server Tasks, then edit the Duplicate Agent GUID - remove systems with potentially
duplicated GUIDs task.
Note
To run this task immediately, click Run. The Server Task Log page appears after running the task.
Task
1. Select Menu → Systems → System Tree.
2. On the Systems tab, click the row corresponding to the system you want to examine.
Results
Information about the system's properties, installed products, and McAfee Agent appears. The top of the System Information
page contains Summary, Properties, and Threat Events windows. It also displays System Properties, Products, Threat Events,
• Managed mode — McAfee Agent connects and communicates with McAfee ePO to manage McAfee product updates.
• (McAfee ePO On-Premises) Unmanaged mode — McAfee Agent doesn't connect or communicate with McAfee ePO, but
pulls updates from McAfee HTTP or FTP servers.
(McAfee ePO On-Premises) Some of the more recent McAfee products that use AutoUpdate, such as McAfee Endpoint Security,
are installed with McAfee Agent in updater mode. To start managing these products with McAfee ePO, you can enable McAfee
Agent that is already on the system by changing its management mode.
Changing the existing McAfee Agent on each system to managed mode saves significant network bandwidth over deploying
McAfee Agent installation package. But, existing McAfee products were probably installed with an older version of McAfee
Agent, which is not automatically upgraded to the latest version on McAfee ePO.
(McAfee ePO On-Premises) In some situations, you might want to change a system that is managed by McAfee ePO to updater
(unmanaged) mode. Information is provided for changing from managed mode to unmanaged mode.
• Do not change the McAfee Agent installation folder without removing and reinstalling McAfee Agent. The agent that you
enable might be in a different folder than the agent that you deploy in your network by another method.
• Assigning sorting filters or domain names to specific System Tree segments saves time. Without such designations,
systems are placed in Lost & Found and you must move them from that location.
• Export agentfipsmode file from this location with the mentioned files and rename the reqseckey.bin and srpubkey.bin to
req2048seckey.bin and sr2048pubkey.bin respectively.
On Windows systems, you have three methods to change the management mode of the agent:
Note
Only remote provisioning method is available on McAfee ePO Cloud to change the management mode of the agent.
• Use the installer package Framepkg Send the installer file Framepkg.exe from McAfee ePO to the unmanaged system,
then run it on the system from an administrator account.
• Locally provision with maconfig
Send Sitelist.xml, srpubkey.bin, reqseckey.bin, req2048seckey.bin, and sr2048pubkey.bin from McAfee ePO to the
unmanaged system.
Run one of these on the target system (requires administrator rights).
Using frminst
maconfig.exe -provision -managed -dir "directory location where the sitelist.xml and
security keys were exported"
For example,
Task
1. Select Menu → Systems → System Tree.
2. Select the systems to change to unmanaged mode.
3. Click Actions, select Directory Management, then click Delete.
4. Select Remove McAfee Agent on next agent-server communication and confirm the deletion. The selected system is no
longer managed by McAfee ePO and now functions only as an updater.
Results
This uninstalls McAfee Agent if no other managed products are installed on the system.
1. Download and extract the McAfee Agent package (Example: MAxxxLNX.zip and MAxxxMAC.zip) to a temporary location.
2. Copy the DXL.zip and contrib.ini files to the /var/McAfee/agent/data/contrib folder.
Remote provisioning
• To change the mode using remote provisioning, run the following command:
maconfig -provision -managed -auto -dir "temp location to copy keys" -epo ePOServerMachine [-user
ePO-User-name] [-password epo-admin-password]
Linux /opt/McAfee/agent/bin
Macintosh /Library/McAfee/agent/bin
maconfig -provision -managed -dir "directory location where the sitelist.xml and security
keys were exported"
Task
1. On the target system, locate the maconfig file in the binaries subfolder of the ma folder.
Linux /opt/McAfee/agent/bin
Macintosh /Library/McAfee/agent/bin
Note
The optional -nostart parameter indicates that McAfee Agent does not restart after changing mode.
The system tray icon resides in the Windows system tray on the client system and provides an interface to products installed on
that system.
Option Function
(McAfee ePO On-Premises) Quick Settings Links to certain product menu items that are
frequently used.
(McAfee ePO On-Premises) Manage Features Displays links to the administrative console of
managed products.
(McAfee ePO On-Premises) Scan Computer for Starts McAfee programs, such as VirusScan
Enterprise, that scan systems on-demand and detect
malware.
McAfee Agent Status Monitor Triggers the Agent Status Monitor, which:
Option Function
Make the system tray icon visible and update security settings
Allow users to update security settings by making the system tray icon visible.
Task
1. Select Menu → Systems → System Tree.
2. On the Assigned Policies tab, select McAfee Agent in the Product drop-down list.
3. Click the name of a policy that is in the General category.
4. Select Show the McAfee system tray icon (Windows only).
• To allow users to update security on-demand, select Allow end users to update security from the McAfee system
tray menu. When selected, users who are running McAfee Agent can update all products when an update package
is present in the repository.
• To allow users to enable McAfee system tray icon in a remote desktop session, select Enable McAfee system tray
icon in a remote desktop session.
5. When you have completed your changes to the default configuration, click Save.
If you want to allow Windows users to update all McAfee products on their managed systems, you must enable this functionality.
The icon can't be used to update applications selectively. The user can update all items in the repository, or none of them.
When the user selects Update Security, these items are updated with the contents of the designated repository:
• Patch releases
Different Command Agent tools are available for Windows and non-Windows operating systems.
• Windows — cmdagent.exe
• Non-Windows — cmdagent
The Command Agent tool is installed on the managed system at the time of McAfee Agent installation. Perform this task locally
on managed systems. It must be run from an Administrator command prompt.
The Command Agent tool file is located in the McAfee Agent installation folder. By default, this location is:
Command-line options
Parameter Description
Parameter Description
You can use McAfee Agent Return Codes with installation and removal scripts to allow the script to continue to the next step or
stop depending on the code returned. The two return codes are:
• 0 — Success
• -1 — Failure
For a code -1, the parameter is invalid or it failed to open one of the global events for the framework service. Make sure that the
service is running, the user has administrator rights, and you are using a valid command line.
Parameter Description
Parameter Description
-custom Sets custom properties. You can set more than one
custom property.
-prop1 "string value" -prop2 "string value" ... -propN Value of custom property. Specify the value for each
"string value" of your custom property.
Examples
• Provision the agent to McAfee ePO This command provisions a specified McAfee ePO to the local system that runs this
command. maconfig -provision -managed -auto -epo <ePO IP> -user <ePO admin username> -password <ePO admin password>
• Set custom properties This command allows you to set custom properties that are reported back to McAfee ePO and
are displayed in the system properties. maconfig -custom -prop1 "string value1" -prop2 "string value2"
• Set log level This command allows you to configure the level of agent activity that is recorded. maconfig -enforce -loglevel 3
• Provision the agent to MVISION ePO (applicable only for nDLP appliances) This command provisions agent to MVISION
ePO. The tenant or an endpoint administrator logs into the endpoint device and runs maconfig. The maconfig uses
the following parameters to obtain the agent configuration data. The maconfig initiates provisioning of agent after
retrieving the configuration data. Run the maconfig -provision -managed -auto - mvisionepoenv <config file path> command
to provision agent. For example, maconfig -provision -managed -auto -mvisionepoenv /tmp/config.ini Where, config.ini contains
the following parameters:
-srt : <srt_token> You can obtain registration token from MVISION ePO. For more information about obtaining
registration token, see McAfee MVISION ePO Product Guide.
-iam_url:
-epo_url:
-proxy_url:
-proxy_port:
-proxy_user:
-proxy_password:
-connection_timeout: The default value is set to 30 seconds.
-transfer_timeout: The default value is set to 300 seconds.
-epo_endpoint: The default value is frameworkconfig.
Inputs to srt, iam_url, and epo_url are mandatory. The proxy_url, proxy_port, epo_endpoint, connection_timeout, and
transfer_timeout are optional fields. If you provide proxy_url, then providing proxy_port is mandatory. Optionally, you
can provide proxy_user and proxy_password for authentication. Otherwise, proxy details are optional parameters. If you
provide epo_endpoint, it is appended at the end of epo_url.
Agent logs
Viewing McAfee Agent logs
The McAfee Agent log is a condensed log that can be viewed from the client system.
McAfee Agent Status Monitor — You can open the McAfee Agent Status Monitor window from the McAfee Agent tray icon
(McTray).
Single System Troubleshooting — You can view the McAfee Agent logs of a managed system from the McAfee ePO console
remotely for troubleshooting. You can enable remote logging by enabling the Enable Remote Logging option under the General
policy Logging tab. The default line limit for the remote log is 200 lines and can go up to 5000 lines.
McAfee Agent product logs — You can record all McAfee Agent activities related to policy enforcement, agent-server
communication, product deployment, update logging, and event forwarding in the respective log files.
You can configure the Logging policy options under the General policy tab to enable McAfee Agent logging on the managed
systems and McAfee ePO. Configuring the Application Logging option allows McAfee Agent to record the activities in the
McAfee Agent log files. In addition to the information stored in the McAfee Agent log, you can view detailed log that contains
troubleshooting messages. You can enable detailed logging by enabling the Enable detailed logging option. The default file size
is 2 MB and can go up to 100 MB. The default rollover count is 1 and can go up to 10.
You can view all installation-related activities in the installation log files.
By default, the McAfee Agent logs on Windows client systems are saved in <ProgramData>\McAfee\Agent\Logs.
The Windows installation logs on the client system are saved in:
Whenever there is a manifest integrity failure or an error in the policy database validation, the McAfee Agent logs an error
message in the mapolicy_<hostname>.log file. The maximum file size is 5 MB for 1 rollover count and there is no impact on this
file size by the McAfee Agent policy.
The table lists the McAfee Agent logs and installation log files for Windows and Non-Windows client systems.
McAfee Agent logs McAfee Agent logs Installation logs Installation logs
(Windows) (Non-Windows) (Windows) (Non-Windows)
McAfee Agent logs McAfee Agent logs Installation logs Installation logs
(Windows) (Non-Windows) (Windows) (Non-Windows)
McScript_deploy.log McScript_deploy.log
McScript_deploy_error. McScript_deploy_error.
log log
marepomirror.log mcupdater_<hostname
>.log
marepomirror_error.lo McAfeeSmartInstall_<s
g ystem time stamp>.log
UpdaterUI_<hostname mcupdater_<hostname
>.log >.log
UpdaterUI_<hostname
>_error.log
McTray_<hostname>.lo
g
mfemactl.log
mfemactl_c.log
McAfee Agent logs McAfee Agent logs Installation logs Installation logs
(Windows) (Non-Windows) (Windows) (Non-Windows)
mapolicy_<hostname>. mapolicy_<hostname>.
log log
Task
1. On the managed system, right-click the McAfee Agent icon in the system tray, then select McAfee Agent Status Monitor.
Note
McAfee Agent icon is available in the system tray only if the Show McAfee system tray icon (Windows only) policy is set
in McAfee ePO on the General tab of the McAfee Agent policy pages.
2. Click Save Contents to Desktop to save the contents of the McAfee Agent log to a file.
A file called Agent_Monitor.log is saved on your desktop.
3. When finished viewing the McAfee Agent log, click Close.
View McAfee Agent product log from McAfee ePO (McAfee ePO On-
Premises) using Single System Troubleshooting
You can view the McAfee Agent product log of a managed system from the McAfee ePO console remotely.
Note
The download option is available only after the product log collection is complete. The task completion status for a
system is queued if the Run Client Task Now and Update Now tasks are in progress. Single System Troubleshooting
requests through multiple sessions invoke an error message — The selected system cannot use this feature as the system
cannot be reached.
A file called <Machine_Name>_productlogs.zip is downloaded. Extract the contents in the folder to view the product logs.
Additional information
McAfee Agent files and folders
When you install the agent, the files are stored in different locations depending on the operating system.
Note
The DXL client is automatically installed with McAfee Agent 5.6.0. The DXL files are stored in the respective Data Exchange
Layer folder based on the operating system.
• Windows 7–10
• Windows Server 2016
• Windows Server 2012 R2
• Windows Server 2012
• Windows Server 2008 R2
Linux /opt/McAfee/agent/
Macintosh /Library/McAfee/agent
• Windows 7–10
• Windows Server 2016
• Windows Server 2012 R2
• Windows Server 2012
• Windows Server 2008 R2
Czech 0405
Danish 0406
Dutch 0413
English 0409
Finnish 040b
French 040c
German 0407
Italian 0410
Japanese 0411
Korean 0412
Norwegian 0414
Polish 0415
Portuguese 0416
Russian 0419
Spanish 0c0a
Swedish 041d
Turkish 041f
McAfee Agent on Macintosh client systems supports English, Japanese, French, German, and Spanish.
McAfee Agent on all other supported non-Windows client systems supports only English.
• Configure your operating systems to use Unicode support for McAfee Agent.
• Install the appropriate operating system language packs on the systems to display language-specific characters.
Note
For a consolidated list of common questions and answers for McAfee Agent 5.x.x, see KB75298.
Yes. You can access the McAfee Smart Installer URL using the Internet if your McAfee ePO is accessible over a public
network.
Can I restrict the McAfee Smart Installer URL to be used only a specific number of times or number of days?
Yes. The McAfee Smart Installer URL can be used for a predefined number of times.
Can I run the McAfee Smart Installer if I don't have administrator rights on the client system?
No. The user must have administrator rights to install McAfee Agent on client systems.
Remote Provisioning
Is there a temporary credential available that can be shared with end users for remote provisioning? I do not want to share
my McAfee ePO administrator credentials.
Peer-to-Peer communication
When an agent requires a content update, it tries to discover peer-to-peer servers with the content update in its broadcast
domain. On receiving the request, the agents configured as peer-to-peer servers check if they have the requested content
and respond back to the agent. The agent requesting the update, downloads the content update from the peer-to-peer
server that responded first.
A peer-to-peer server provides all content available in its McAfee ePO repositories.
General
The McAfee runtime environment uses Linux Native threads through the Light Weight Process implementation. Using Linux
Native threads causes each thread to show as a separate process on the client computer.
(McAfee ePO On-Premises) How can I change the language of McAfee Agent during installation?
(McAfee ePO On-Premises) Are there best practices or important considerations for upgrading McAfee Agent?
Any action that generates network traffic must be carefully considered. Because McAfee ePO is used to deploy products,
updates, and McAfee Agent, a McAfee ePO administrator's actions can negatively affect the network. Though the McAfee
Agent installation package is not large by itself, it can have significant impact on a network if sent to thousands of systems
at once. So, apply careful planning to any deployment effort.
Before checking in the new package, make sure you:
• Disable Global Updating — Checking in a McAfee Agent package with Global Updating enabled can cause the new
version of McAfee Agent to be deployed even if the Product Deployment task is not enabled.
• Disable the Product Deployment Task — If the Product Deployment task is still enabled from the previous
deployment, the new version causes deployments to begin according to the configured schedule. To reduce the
risk of existing task execution, send the task change to client systems before checking in the new package.
• Enable Product Deployment task below Directory level — Do not set the Product Deployment task at the root
level. Schedule Product Deployment tasks at a site level, or even at the group level, if needed, to reduce the
number of systems downloading the new McAfee Agent at the same time.
• Randomize Product Deployment tasks — Do not configure the Product Deployment task to start at a set time
for the entire site. Using the randomization feature in the task allows the network traffic to be spread out over a
specified time.
(McAfee ePO On-Premises) How can I redirect the communication from a McAfee Agent to a new McAfee ePO server?
Use one of these installation methods to redirect communication from a McAfee Agent to a new McAfee ePO server. See
McAfee ePO product documentation for alternate methods.
Method Action
Using FrmInst.exe
• On McAfee ePO, navigate to C:\Program
Files\McAfee\ePO\DB\Software\Current\eP
OAgent3000\Install\0409.
Method Action
Using remote provisioning commands Run this command on the client system.
maconfig -provision -managed -auto
-dir "temp location to copy keys"
-epo ePOServerMachine [-user ePO-User-
name] [-password epo-admin-password]
For example,
maconfig -provision -managed -auto
-dir "/temp"
-epo ePOServerMachine [-user admin]
[password password123]
How can I redirect the communication from a McAfee Agent to a new McAfee ePO Cloud server?
Use this installation method to redirect communication from McAfee Agent to a new McAfee ePO Cloud server. See
McAfee ePO Cloud product documentation for alternate methods.
Method Action
Using remote provisioning commands Run this command on the client system.
maconfig -provision -managed -auto
-dir "temp location to copy keys"
-epo ePOServerMachine [-user ePO-User-
name] [-password epo-admin-password]
For example,
Method Action
maconfig -provision -managed -auto
-dir "/temp"
-epo ePOServerMachine [-user admin]
[password password123]
How does McAfee ePO sort McAfee Agent at the first connection?
When McAfee Agent is installed on a system, a unique GUID is created based on the MAC address and computer name of
the system. McAfee Agent then connects to McAfee ePO in a randomized interval.
At that connection, McAfee ePO uses these system properties to see if McAfee Agent is populated in the System Tree. A
new object is created in the System Tree if this search doesn't find a match. The location for the new object is also based on
this sort order.
System properties used when Sorting Criteria System properties used when Sorting Criteria
is disabled is enabled
If an entry is found that is listed in the search order, McAfee Agent lists the client system in the correct group. If it does not
find any of the above, it then lists the client in the Lost & Found group at the My Organization level.
Note
If peer-to-peer service and RelayServer are disabled, these ports are not open.
Trellix and FireEye are the trademarks or registered trademarks of Musarubra US LLC, FireEye Security Holdings US LLC and their affiliates in the
US and /or other countries. McAfee is the trademark or registered trademark of McAfee LLC or its subsidiaries in the US and /or other countries.
Skyhigh Security is the trademark of Skyhigh Security LLC and its affiliates in the US and other countries. Other names and brands are the
property of these companies or may be claimed as the property of others.