The common architecture allows the modules to work together to provide improved security. For example, when a file gets downloaded, the Web Control module sends a file hash to the Threat Prevention module. The Threat Prevention module triggers an immediate on-demand scan on the file. You can also configure McAfee Global Threat Intelligence sensitivity in McAfee ePolicy Orchestrator® (McAfee ePO) software for these types of scenarios. Based on the results of the scan, the product will take the necessary action. The actions that are taken are summarized in common, easy to read language within ePO with several new insights into the origins, attempted actions and targets of attacks so you can harden your policies and defensive actions.
McAfee Endpoint Security 10 introduces a new framework that consolidates and simplifies the technologies you already have while also allowing multiple endpoint defense technologies to communicate in real time to analyze and collaborate against new and advanced threats. Our next generation framework that is ready to plug in our other advanced threat, Endpoint Detection and Response (EDR) solutions. The ENS 10 framework communicates using the Data Exchange Layer (DXL) Fabric. McAfee Threat Intelligence Exchange also uses DXL and can communicate with ENS 10. This is valuable for customers are interested in purchasing multiple, global threat intelligence feeds and stronger threat detection and response tools. McAfee Active Response can run side by side with ENS 10 further enhancing a customer’s environment
The result is a simplified product:
The Endpoint Security Migration Assistant tool aids customers in migrating their policies from VSE, HIPS, and SAE to McAfee Endpoint Security 10.
Two migration approaches can be taken:
Automatic migration – Customers can create new policies and client tasks automatically, based on current product settings, and assign them to groups and managed systems, based on current assignments.
Manual migration – Customers select the settings to migrate and, optionally, edit them. Manual migration does not retain assignments.
If you’re an existing customer with one of our Endpoint suites, you’re in. Simply log into McAfee ePO, and McAfee Endpoint Security 10 will be available to you within the Software Manager or you may access it by using your grant number to download the software package to install via McAfee ePO.
Customer's with current McAfee product versions, read on for more information on how you can quickly get started.
You can start leveraging next generation security now by upgrading your systems to Endpoint Security 10. Customers who are managing VirusScan 8.8, Host IPS 8.0, or Site Advisor Enterprise with ePO 5.1.1 or 5.3, and McAfee Agent 5.0.3, are ready to upgrade now. Please refer to Knowledge Base article KB87476 - Recommended Upgrade Paths to Endpoint Security 10.x.
To streamline the migration process and minimize potential conflicts that may arise, Intel Security recommends that you first review and revise your existing legacy policies and assignments that you plan to migrate. During your review, identify any policies or tasks that you can consolidate to simplify the migration process. Additionally, you should also remove any duplicate objects as well.
Be sure to notify other ePO administrators not to make any modifications to the Policy Catalog, Client Task Catalog, or Firewall Catalog during migration. If objects change while the migration is in progress, the new objects will not reflect those changes.
The Endpoint Security Migration Assistant walks you through the migration process. You can let the Migration Assistant migrate all your settings and assignments automatically, based on your current settings and new product defaults, or you can perform the migration manually. The Migration Assistant migrates settings in environments managed with McAfee ePolicy Orchestrator version 5.1.1 or higher.
Endpoint Security 10 is an integrated solution for the endpoint; replacing the individual legacy endpoint products of VirusScan Enterprise, Host IPS Firewall, and Site Advisor web filtering.
The Endpoint Migration Assistant ensures that the settings in your legacy policies are moved to the correct policies in Endpoint Security. In some cases, they are merged with other Endpoint Security settings, and in others, new default settings are applied to support updated technologies. As a result, some of the legacy policy settings have changed.
This table describes what happens when Endpoint Security 10 is installed.
The Endpoint Migration Assistant allows you to decide which migration path to follow by considering the characteristics of your network or managed systems and your migration goals. Here are some steps to help you decide the best migration path for you.
Decide whether you need to migrate at all. Do you want to retain any current settings and assignments for your legacy products?