McAfee QUICKCLEAN 3.0 User's Guide Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 140
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
5 Creating analyzer VM 41
Create a VMDK file from an ISO image ......................... 42
Import a VMDK file into McAfee Advanced Threat Defense ................. 73
Convert the VMDK file to an image file ......................... 74
Managing VM profiles ................................ 74
View VM profiles ............................... 75
Create VM profiles .............................. 76
Edit VM profiles ............................... 80
Delete VM profiles .............................. 80
View the VM creation log ...............................81
6 Configuring McAfee Advanced Threat Defense for malware analysis 83
Terminologies ................................... 83
High-level steps for configuring malware analysis .....................86
How McAfee Advanced Threat Defense analyzes malware? ................. 87
Managing analyzer profiles ..............................87
View analyzer profiles .............................88
Create analyzer profiles ............................ 89
Edit analyzer profiles ............................. 91
Delete analyzer profiles ............................ 91
Integration with McAfee ePO ............................. 91
Configure McAfee ePO integration ........................ 92
Specify proxy server for internet connectivity ...................... 93
Configure the proxy DNS settings ........................... 94
7 Analyzing malware 97
Upload files for analysis using McAfee Advanced Threat Defense web application ........ 97
Upload files for analysis in user-interactive mode ..................98
Upload files for analysis using SFTP ..........................100
Monitor the status of malware analysis ........................ 100
View the analysis results .............................. 102
View the Analysis Summary report ....................... 104
Dropped files report ............................. 110
Disassembly Results .............................110
Logic Path Graph .............................. 111
User API Log ................................116
Download the complete results .zip file ..................... 116
Working with the McAfee Advanced Threat Defense Dashboard ...............117
Malware analysis monitors .......................... 118
VM Creation Status monitor ..........................121
McAfee Advanced Threat Defense performance monitors .............. 121
8 CLI commands for McAfee Advanced Threat Defense 123
Issue of CLI commands ...............................123
How to issue a command through the console .................. 123
Issuing a command through SSH ........................123
Logging on to the McAfee Advanced Threat Defense Appliance using an SSH client ....124
Auto-complete ............................... 124
CLI syntax ....................................124
Mandatory commands ............................ 124
Log on to the CLI ................................. 125
Meaning of "?" ..................................125
Managing the disks of McAfee Advanced Threat Defense Appliance ............. 125
List of CLI commands ............................... 126
Blacklist ..................................126
clearstats ................................. 127
Contents
4
McAfee Advanced Threat Defense 3.0.4 Product Guide
Page view 3
1 2 3 4 5 6 7 8 9 ... 139 140

Comments to this Manuals

No comments