Product guide

Table A-2 Audit Log entries (continued)
Feature Audit Log entry Description
Normal Boot/Restart Initiated Normal Boot/Reboot Displays when Normal Boot/Reboot is
initiated.
Run Tag Criteria Evaluate AMT tag criteria Displays when Evaluate AMT tag
criteria is initiated.
Table A-3 Threat Event Log entries
Feature Threat Event Log entry Description
Local Access Local Fast Call for Help Intel
®
AMT system initiates a Local Access
call.
Remote Access Connected – Remote Fast Call for Help Intel
®
AMT system initiates a Remote
Access call.
Disconnected – Remote Fast Call for Help Intel
®
AMT system closes a Remote Access
call.
Python scripts for ePO Deep Command
You can write Python scripts to enforce Intel
®
AMT policies and turn on your client systems from the
Intel
®
AMT action using the McAfee ePO scripting.
See McAfee ePolicy Orchestrator Scripting Guide for more information on using Python scripts.
Download the python client
Download the Python Remote Client scripting library from McAfee ePO.
Task
For option definitions, click ? in the interface.
1
In the McAfee ePO console, click Menu | Software | Software Manager.
2
In Product Categories under Software (by Label), click Management Solutions.
3
Select McAfee ePolicy Orchestrator 4.6 as the product, then click Download for the corresponding Python
Remote Client.
Sample script for the Power On action
Here is a sample script to perform Power On action through the McAfee ePO Python Scripting support.
# Script to do an OOB Power On through the ePO Python Scripting support.
# The parameters to be passed to the script is an IP address or a list of comma-separated
IP addresses.
import mcafee
import sys
# mcafee.client() function in this command is using these parameters
# 1st parameter is the hostname of the McAfee ePO System.
# 2nd parameter is the port on which the McAfee ePO interface is accessible.
# 3rd parameter is the username that is used to log on to the McAfee ePO interface.
# 4th parameter is the password of the User name provided in the 3rd parameter.
# 5th parameter is always https and 6th parameter is always json.
mc = mcafee.client('myepo','8443','admin','epo', 'https','json')
try:
input = sys.argv[1] #input to the script, our AMT system IP address.
except:
print "Missing 1st parameter. Provide a single IP address of a comma-separated list of
A
Additional information
Python scripts for ePO Deep Command
162
McAfee ePO Deep Command 2.1.0 Product Guide