Protect data and stop threats in the cloud
Secure sensitive data everywhere it resides
Detect, prevent, and correct advanced threats
Intrusion prevention and detection
Gain complete security visibility
Discover and protect server and cloud workloads
Identify attacks and share insights
Actionable data to prioritize and investigate threats
Secure web access from any device
Customer and technical support programs, terms, and documentation
Resources to help you upgrade to the latest versions of McAfee security solutions
Best practices, troubleshooting, and issue-related articles
Release notes, installation, and product guides
Articles addressing product vulnerabilities
Current and past product releases, pro tips, and end-of-life notices
Real-time cloud service status
Analysis on current threats
Top targeted attacks
Top toolkits used to exploit system vulnerabilities
Top system weaknesses or flaws targeted by hackers
Top malicious ransomware software
Quarterly analysis on threat trends
Collaborating with partners for better security
Access training, sales, and marketing resources developed for McAfee partners
Access the ServicePortal for technical support
21 - 30 of 1047 results (total unclustered: 1047
Updated July 9, 2018 12:00 am
If you encounter a system failure, you can restore McAfee ESM from a previous settings backup.
Updated September 25, 2018 12:00 am
Back up your McAfee ESM settings and data regularly and before starting any software upgrades. Then, if you encounter a system failure or data loss, you can restore McAfee ESM to its previous state.
Updated November 20, 2017 12:00 am
When you add a device to the System Tree, give it a name that displays on the tree. You can change the device name, system name, URL, and description.
To configure device-generated SNMP notifications, you must define which traps to send and their destinations.
View or export a log of the changes that were made to the policy. This log can hold a maximum of 1 GB of data. When it reaches this limit, the system deletes the oldest files, as needed.
Sensitive data masks prevent unauthorized viewing of data by replacing the sensitive information with generic strings, called the mask. When you add a McAfee Database Event Monitor device, the system adds standard sensitive data masks to the McAfee ESM database....
Clusters of McAfee ESM devices can be set up to maximize throughput (sharding), to maximize how many copies of event data are maintained in the devices (replication), or to take advantage of both of these capabilities in a hybrid installation...
Updated October 4, 2018 12:00 am
Install a new version of McAfee ESM in a distributed ESM environment.
If your system includes high-availability receivers, ensure IP addresses will not be duplicated.
Updated November 8, 2018 12:00 am
Store and retain large amounts of long-term data using McAfee Enterprise Log Manager and search stored log data quickly using McAfee Enterprise Log Search.