Content

McAfee Remediation Manager

McAfee Remediation Manager  product shot
Enforce compliance with automated remediation of noncompliant or vulnerable systems

Every day you feel squeezed by the pressures of regulatory compliance and security threats. When a vulnerability is discovered, you know its exploit is not far behind. Proactive vulnerability remediation is critical to your security. Turn policy into action with McAfee Remediation Manager—automated remediation that reduces your risk and helps you stay compliant with regulations and policies.

Tab Navigation

Benefits and Features

Benefits:

  • Reduce risk to key assets more quickly
    Eliminate manual processes and ensure critical business assets are free of vulnerabilities, service misconfigurations and policy violations identified by McAfee Policy Auditor before attacks occur
  • Comprehensive remediation
    Automate remediation of policy noncompliance for the five major types of vulnerabilities—software patches, unsecured accounts, unnecessary services, back doors, and misconfigurations
  • Streamline your workflow
    Evaluate, prioritize, schedule, automate, and report on remediation activities
  • Enforce compliance-faster
    Remediate noncompliant systems and critical vulnerabilities according to your corporate security policy
  • Easy to use
    Get up to speed quickly—even if you're a first-time user—with our intuitive Quick Start wizard
  • Improve efficiency
    Reduce the amount of time your IT staff spends addressing policy violations and vulnerabilities, as well as applying patches

Features:

  • Patch management and distribution
    Deploy security patches and related remediations automatically across the enterprise; schedule remediations and choose which vulnerabilities to resolve and when
  • Tested remedies for vulnerabilities
    Fix vulnerabilities with an automated process that draws from our library of more than 28,000 tested actions, including missing patches
  • Policy enforcement
    Integration with McAfee Network Access Control remediates quarantined devices quickly to enforce compliance with network access policy and ensure the fastest path to productivity
  • Integrate with McAfee Policy Auditor,  McAfee Vulnerability Manager (formerly McAfee Foundstone), and third party scanners
    Scan, gather, and correlate data from industry-leading scanners, including McAfee Vulnerability Manager, to quickly identify policy violations and vulnerabilities for remediation
  • Integrates with McAfee ePolicy Orchestrator®
    Quickly deploy and manage the Remediation Manager agents across all supported ePO™ endpoints—and eliminate the need to manage asset data in two separate systems

Description:

The pressures of regulatory compliance and security threats never let up. New vulnerabilities are emerging daily. And the time between the discovery of vulnerabilities and exploits is getting shorter. Compliance with industry regulations and internal policies also mandates speedy correction of policy violations. Add to this the burden of detailed reporting. You need powerful tools that automate vulnerability remediation, so that you can demonstrate compliance, reduce risk, and increase IT efficiency.

Enforce compliance and automate vulnerability remediation with McAfee Remediation Manager, a key component of the McAfee approach to security risk management. Get highly accurate data for decision support and flexible compliance enforcement that aligns with policies and industry regulations. Because Remediation Manager offers support for third party vulnerability assessment scanners, you protect your IT investments.

Remediation Manager addresses all of the major vulnerabilities: software defects, unsecured accounts, unnecessary services, misconfigurations, and backdoors. Our library of more than 25,000 tested vulnerability remedies covers all five types. And Remediation Manager stays up to date on the latest vulnerabilities. It collects and compiles vulnerability data and creates new remedies that are downloaded via an automated delivery mechanism.

Remediation Manager applies remedies that keep your devices compliant with internal security policies that you define and with government and industry regulations. Get a snapshot of remediation activity and manage and monitor operations. Extensive reporting capabilities include summary reports for executives and detailed technical data for IT administrators. As a central element of McAfee's approach to security risk management, Remediation Manager enables organizations to proactively define, measure, report, and remediate on the compliance of information systems based on industry, regulatory, and corporate security policies, standards, and frameworks.  Integration with McAfee Policy Auditor, McAfee ePolicy Orchestrator®, McAfee Vulnerability Manager (formerly McAfee Foundstone®), McAfee Risk and Compliance Manager, and McAfee Network Access Control helps you protect the investment you've made in existing tools. At the same time, you minimize risk as well as maximize your IT resources and security software investments.

System Requirements:

Note: The following are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Operating systems

  • Microsoft ® Windows® Server 2003 Standard Edition, SP1
  • Windows Server 2003 Enterprise Edition, SP1

The server cannot be installed on the following  types of machines:

  • Primary domain controller (PDC)
  • Backup domain controller (BDC)
  • Active directory controller (ADC)

Processor

  • Intel® Pentium® compatible, 3 GHz or above

Network

  • Network Interface 100Mb/s

Memory

Number of devices — Server memory requirements

  • 2000 — 1 GB
  • 4000 — 1.5 GB
  • 6000 — 2 GB

Free disk space

Remediation Manager Server: 2.8 GB for server installation, allow an additional 10MB/device

2.8 GB and 20 GB for file downloads

Graphics

  • VGA Graphics, 1024x768 resolution

Software

  • Microsoft® ASP.NET
  • Microsoft.NET Framework v1.1, SP2
  • Web server IIS 6.0
  • Web browser-Microsoft® Internet Explorer® 6.0 (IIS and web browser must be installed prior to installing the server.)
  • Microsoft® SQL Server 2005 with reporting services (P/IP must be enabled as a protocol for SQL Server 2005.)