I have read every scrap of info I can, I have installed the ForeScout CounterACT extension 18.104.22.168 into ePO 5.1.1, but I don't see any way to leverage pulling queries in ePO that show CounterACT visibility or actions.
All of the documents I have read state that CounterACT can install the McAfee Agent if ePO cant, and can report directly to MVM and vice/versa with the ability to write to the SQL database. OK. Great. Where is the setup document for that posted??
CounterACT communicates bi-directionally with McAfee Vulnerability Manager through ForeScout’s ControlFabric™ integration technology. CounterACT detects devices the moment they connect to the network and informs McAfee Vulnerability Manager. This enables several unique capabilities:
- CounterACT can trigger McAfee Vulnerability Manager to perform a real-time scan of the connecting device when it joins the network. This significantly increases the chance of “catching” transient endpoints while they are on the network and helps produce more up-to-date and complete vulnerability reports.
- Highly security conscious organizations want to confirm an endpoint’s risk posture before allowing access to the network. In such cases, CounterACT can isolate the connecting device in an inspection VLAN while McAfee Vulnerability Manager performs a scan. If the endpoint’s risk rating, as determined by McAfee Vulnerability Manager, is below a configured level, CounterACT can admit the endpoint to the production network.
- CounterACT can trigger McAfee Vulnerability Manager to scan devices that meet certain policy conditions, such as endpoints with specific applications, or endpoints with configuration changes.
After McAfee Vulnerability Manager scans a device, CounterACT obtains the scan results, and can initiate risk mitigation actions if vulnerabilities are detected. Based on policy, CounterACT can flexibly and seamlessly enforce network and host controls, with a level of response appropriate to the issue at hand. For example, CounterACT can quarantine endpoints with critical vulnerabilities, initiate built-in remediation actions, or trigger external remediation via patch management and other IT systems.
There are ALOT of briefs, white papers, and such...but I haven't found a single Install and config guide. Can someone please point me to the correct documentation for setting this up in MVM or ePO?