Protect data and stop threats in the cloud
Secure sensitive data everywhere it resides
Detect, prevent, and correct advanced threats
Intrusion prevention and detection
Gain complete security visibility
Discover and protect server and cloud workloads
Identify attacks and share insights
Actionable data to prioritize and investigate threats
Secure web access from any device
Customer and technical support programs, terms, and documentation
Resources to help you upgrade to the latest versions of McAfee security solutions
Best practices, troubleshooting, and issue-related articles
Release notes, installation, and product guides
Articles addressing product vulnerabilities
Current and past product releases, pro tips, and end-of-life notices
Real-time cloud service status
Analysis on current threats
Top targeted attacks
Top toolkits used to exploit system vulnerabilities
Top system weaknesses or flaws targeted by hackers
Top malicious ransomware software
Quarterly analysis on threat trends
Collaborating with partners for better security
Access training, sales, and marketing resources developed for McAfee partners
Access the ServicePortal for technical support
21 - 30 of 1302 results (total unclustered: 1302
Updated November 13, 2017 12:00 am
This example rule prevents users from creating files with the name "*test.txt" from cmd.exe in the C:\temp folder.
Updated August 21, 2018 12:00 am
McAfee Endpoint Security provides information in the EndpointSecurityPlatform_Errors.log file about rules that didn't successfully compile and so were not enforced.
Updated December 3, 2018 12:00 am
The key features of Threat Prevention protect against threats entering your environment, detect malware in your environment, and correct issues by cleaning or repairing infected files.
Updated January 28, 2019 12:00 am
Expert Rules are text-based custom rules that you create in the Exploit Prevention policy in Threat Prevention.
McAfee Endpoint Security Threat Prevention prevents threats from accessing systems, scans files automatically when they are accessed, and runs targeted scans for malware on client systems.
Updated May 4, 2018 12:00 am
Endpoint Security provides two syntaxes for creating the different Expert Rule types.
Updated January 16, 2018 12:00 am
Define Threat Prevention settings that apply to on-access and on-demand scans.
Updated April 15, 2019 12:00 am
The Services class type protects Windows Services operations.
Compile data from multiple servers at the same time using McAfee ePO Roll Up Data server tasks.
Updated October 15, 2015 12:00 am
The Block and Allow List policies use site patterns to specify a range of sites that are allowed or blocked. With site patterns, you can allow or block a domain or a range of similar sites without entering each URL...