Hi,
We have recently implemented RSD on our environment, and I have noticed that it is report a couple of false positives, for example laptops that already have the McAfee Agent installed, are being reported as rogue with no agent. Our Matching Detected Systems is set to the default MAC and Hostname/Domain (pair). Is there a way to find our or better understand why the laptop is being reported as rogue?
Many thanks.
Solved! Go to Solution.
That is correct, you don't need to put in alternate port if none exists.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
Look closely at the domain name pairing and properties of the system that is being counted as rogue. Often there is something that isn't quite matching up in the criteria. The domain name would need to match exactly.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
Thanks for your reply. I had a false positive this morning, and this time I have noticed that the MAC address the MAC address reported in the system information was different. The laptop reported as rogue was using the wireless card when it was reported. All our laptops have built-in wireless and NIC cards, and they would more often connect via LAN cables, however they also switch to wireless when moving around the building or visiting other sites. Is there a way to prevent this type of false positives?
What version of RSD are you running for the client and extension versions?
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
RSD Agent 5.0.6.125
RSD Ext. 5.0.6.123
ePO 5.9.1
Hello Linuxxo,
Another feature we have is actually under the Automatic Response area of ePO. You can enabled the Automatic Response called "RSD: Query New Rogue Detection".
This will actively ping newly detected rogue systems in an attempt to interrogate the installed agent.
If the agent replies, it will list it as a managed system. It does require some specific MA policy configuration so I would also ask that you review https://kc.mcafee.com/corporate/index?page=content&id=KB91544
Thanks
Brian Barnes
Thanks for your solution. I have enabled the automatic query as per suggestion. However the KB provided, seems to apply to environments that have multiple ePO servers. In our case, we only have one ePO and one standalone Agent Handler on the DMZ.
That shouldn't matter. It is meant to query the agent for which server it belongs to. if it finds it belongs to your epo server, it should still then list it as a managed agent instead of rogue.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
So in this case, looking at the KB, I am assuming that I can skip step 1a and 1b since we do not have alternative ePO servers and we use the default 8081 port.
Whilst step two is not very clear, but it seems to refer to the McAfee Agent policies, and in that case we do have all options enabled.
That is correct, you don't need to put in alternate port if none exists.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA