1 2 3 Previous Next 43 Replies Latest reply on Sep 29, 2017 8:27 AM by kvk

    McAfee Open API via PowerShell


      Wanted to start a discussion for a few reasons.


      (1) To see if any other community members are accessing/using the API via PowerShell.

      (2) To begin a point of reference for my development of PowerShell modules/scripts for the Open API.


      I've recently been tasked with starting development work within our environment using the Open APIs, and coming from a Windows shop - the scripting choice is PowerShell (and .NET).  I've been looking around online, but noticed that there aren't many articles on the use of PowerShell with the APIs. 


      So, please, if your or someone you know is doing any work with the APIs via PowerShell - point them in this direction.


      Message was edited by: wp4n on 1/18/12 4:32:47 PM CST
        • 1. Re: McAfee Open API via PowerShell

          I managed to get some commands working:


          [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}


          $url = "https://Servername_or_localhost:8443/remote/system.findGroups?searchText=Region"
          $username = "username"
          $pwd = "password"
          $wc = new-object System.net.WebClient
          $wc.Credentials = new-object System.Net.NetworkCredential($username, $pwd)
          $webpage = $wc.DownloadString($url)

          if ($webpage.IndexOf('groupId:') -gt 0)
              $groupId = $webpage.Substring($webpage.IndexOf('groupId')+9, $webpage.IndexOf('groupPath') - $webpage.IndexOf('groupId')-9)




          obviously replace region with a sub"folder" that exists in your system tree in the ePO console.


          however more comlex commands which require an link to a local file does not work yet...


          so I just created a small python script that I call from powershell:

          c:\python26\python.exe d:\tools\andre\myPythonScript.py

          which executes the mc.system.importSystem(uploadFile="file///d:\tools\andre\tree.txt",branchNodeId ='2')


          so... if someone figures out how to fix this for a windows system, let me know

          • 2. Re: McAfee Open API via PowerShell

            @prinand - I'll try to take a look at your code this week to see if I can get it working.  Glad to see at least one other person working with some PowerShell.



            I've started tinkering around and I'll post a compiled module once I have enough built.  For now, I'll just upload the functions that I complete in pieces.

            -------------------------------------------------------------------------------- --------------------------------------





                      Author: WP4N

                      Date:    2012.01.30


                      Web Client initialization and authentication to the McAfee ePO server.




            #region << ePO Connection and Initialization >>



                      This function is used to begin the connection attempt.  This will call two subsequent functions (1) to create the web client, and (2) to prompt the user for credentials used for authentication.




            function McAfee-Connect{


                 $c = McAfee-Credential

                 $script:wc = McAfee-WebClient -Credential $c






                      Calls the Get-Credential cmdlet to prompt the user for authentication credentials.  These are passed to the web client during initialization.


            function McAfee-Credential{

                 $c = Get-Credential -Credential $null

                 return $c






                      Creates the .NET web client and populates the previously gathered credentials in the object.


            function McAfee-WebClient{


                 $wc = new-object system.net.webclient

                 $wc.credentials = New-Object System.Net.NetworkCredential -ArgumentList ($Credential.GetNetworkCredential().username,$Credential.GetNetworkCredential() .password)

                 return $wc





            -------------------------------------------------------------------------------- --------------------------------------


            Message was edited by: wp4n on 1/30/12 5:42:04 PM CST
            • 3. Re: McAfee Open API via PowerShell

              Thanks to Prinand, I was able to get the following working to Tag multiple systems at once using a source CSV file:



              $epoServer = "https://<server>:<port>"
              $Credential = get-credential -Credential $null
              $epoUser = $Credential.GetNetworkCredential().username
              $epoPassword = $Credential.GetNetworkCredential().password

              $arrSys = Import-Csv ".\test.csv"


              foreach ($sys in $arrSys) {

                    $compName = $sys.hostname
                    $epoTag = $sys.tag

                    $url = "$epoServer/remote/system.applyTag?names=$compName&tagName=$epoTag"
                    $wc = new-object system.net.webclient
                    $wc.credentials = New-Object System.Net.NetworkCredential `
                                                   -ArgumentList ($epoUser,$epoPassword)


              • 4. Re: McAfee Open API via PowerShell

                I created a Powershell module in C# months ago, but I had to stop working on the project due to workload. I implemented cmdlets to get system properties, add and remove tags, get and run ePO queries, and maybe some other stuff I forgot about.


                I'm thinking of digging up and continuing the project, if the community is still interested.

                • 5. Re: McAfee Open API via PowerShell

                  so far I can do almost anything in powershell with the webapi.

                  my biggest problem is those commands that can import computers from a flat file.

                  I have not been able to achieve that in powershell. I actually even created a very small python script that did import the computers, which I called out of my powershell script.


                  so... if you can add that capability in any way, I would be very interrested.

                  • 6. Re: McAfee Open API via PowerShell

                    I'm trying to impliment some powershell scripts for ePo, but I'm having difficulty getting started.  I was looking for resources and found this forum post.  Not sure if anyone is still playing with this, but I was hoping for some help.  I've used some of the code snippets here to get started, but I don't understand how to send commands to ePo through the web object, any help or suggestions?

                    • 7. Re: McAfee Open API via PowerShell

                      Do you have any examples of what you're using and/or what commands you're trying to accomplish?

                      • 8. Re: McAfee Open API via PowerShell

                        I currently use Powershell for everything I can with the WebAPI. I also user Mischa's module which has been a big help for what he has completed on it. My Latest undertaking has been with Rogue System Detection. I take a list of machines and parse out their information and add them to the exceptions list if required. I have a few other that I am either working on or completed. If you are interested in seeing any code snippets I would be happy to provide them. Like wp4n stated, what are you looking for?

                        • 9. Re: McAfee Open API via PowerShell

                          In the interest of full disclosure, I am just starting to learn powershell as I work with this.



                          $Credential=get-credential -Credential $null




                          $wc=new-object System.net.WebClient

                          $wc.Credentials = new-object System.Net.NetworkCredential -ArgumentList ($epoUser, $epoPassword)


                          That's the code that I'm working with, but I don't know how to attach the $epoServer to $wc


                          As for what I'm trying to do, I'm trying to write a powershell script that, when passed a computer name, will delete that object from ePo.  I'm trying to avoid using the Python interface.

                          1 2 3 Previous Next