Product guide

Policies and their categories
Policy information is grouped into two categories: SVA and Scan. You can create, modify, or delete as
many policies as needed under these categories. ePolicy Orchestrator provides a preconfigured McAfee
Default policy, which cannot be edited or deleted but can be copied. You then modify these copies to suit
your needs.
How policies are applied
Policies are applied to any System Tree group or system by inheritance or assignment. Inheritance
determines whether the policy settings for any system are taken from its parent.
By default, inheritance is enabled throughout the System Tree. You can break inheritance by direct
policy assignment. The Agentless deployment option, as managed by ePolicy Orchestrator, enables you
to create policies and assign them without regard to inheritance. When you break this inheritance by
assigning a new policy to a system, all groups and systems that are children of the selected system
inherit the new policy.
Configuring policies
You can create, modify, or delete as many policies as you need. The extension provides a
preconfigured McAfee Default policy, which cannot be edited or deleted but can be copied and used as a
base for new policies.
The SVA policy allows the administrator to define how and when anti-virus scans run on a hypervisor.
These policies are applied to the hypervisor instead of the VM or system. The Scan policy allows the
administrator to configure scan settings for when a threat is found.
Create an SVA policy
Create a new policy to change behavior on managed systems.
Task
For option definitions, click ? in the interface.
1
From the ePolicy Orchestrator console, click Menu | Policy | Policy Catalog.
2
From the Product drop-down list, select MOVE AV Agentless 3.6.0.
3
From the Category drop-down list, select SVA.
4
Click New Policy.
5
On the New Policy page, configure the policy settings, then click OK.
6
In the Authentication tab of the Policy Settings page for the newly created policy, configure these
settings to control basic behavior.
Protocol — Select https or http, depending on the protocol the server uses to receive client
requests.
Hypervisor/vCenter Server — Enter the valid IP address of either the hypervisor that the SVA resides
on or the vCenter server.
3
Monitoring and managing your environment
Policy management
46
McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide