Post-installation tasks Once the server extension is configured, create, monitor, and adjust TIE server policies to determine what is allowed and blocked. Use the TIE server policies to run the TIE server in observation mode to build file prevalence (how often a file is seen in your environment) and observe what the TIE server detects in your environment. You can monitor and adjust the policies, or individual file or certificate reputations to control what is allowed in your environment. Configure the TIE server extension Configure the TIE server extension for use with VirusTotal. Configure the TIE server topology TIE server appliances can run combined into different operation modes to offer scaling and fail-over capabilities. Edit the TIE Server topology Change the operation mode of your TIE server instances managed by the local McAfee ePO server. Configure the TIE server policy Specify McAfee GTI, McAfee Advanced Threat Defense and McAfee Cloud Threat Detection settings for the server. Verify the installation After installing the Threat Intelligence Exchange and Data Exchange Layer components, perform this task to verify the installation. Verify registered servers Verify that the servers are registered correctly to view TIE server information in McAfee ePO reports and dashboards.