McAfee ePolicy Orchestrator (ePO)
  • 10 Jun 2024
  • 3 Minutes to read
  • Dark
    Light
  • PDF

McAfee ePolicy Orchestrator (ePO)

  • Dark
    Light
  • PDF

Article summary

McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions. This adapter connects to the ePO server to import information about devices managed by that solution.

Types of Assets Fetched

This adapter fetches the following types of assets:

  • Devices

Parameters

  1. Host (required) - The hostname of the McAfee ePolicy Orchestrator (ePO) server that Axonius can communicate with via the Required Ports.

  2. Port (required) - Use TCP port 8443.

  3. User and Password (required) - The credentials for a user account that has permissions to fetch assets.

  4. Installed Software Query ID (optional) - The ID from the URL bar in the ePO. Set this for product name parsing. It should contain the following fields:

    • DiscoveredSystemOnApps.Name
    • DiscoveredSystemOnApps.Version
    • DiscoveredSystemOnApps.Publisher
    • EPOComputerProperties.ComputerName
  5. Drive Encryption Query ID (optional) - The ID of an existing EPO Query that contains at least 'EPOLeafNode.NodeName' and 'EPESystems.State' information to populate Hard Drive Encryption data for devices. The user specified for the connection must have permissions to access the saved query in order for the additional data to be fetched.

  6. Non-Compliant Devices Query ID (optional) - Select this option to run the query specified by the Query ID. The query itself must be configured to at least return the EPOLeafNode.NodeName column. Any device in which the NodeName matches a result from this query will have the Non-Compliance Detected field set to true. All devices not returned in this query will have the Non-Compliance Detected field set to False.

  7. Events Management Query ID (optional) - Specify the Events Management Query ID to fetch threat events.

  8. Benchmark Query ID (optional) - Specify the Benchmark Query ID to query audit logs.

  9. OAM Query ID (optional) - Specify the OAM Query ID to fetch additional information.

  10. Solidcore Query ID (optional) - Enter a Query ID for Solidcore client data.

  11. Applied Policy Query ID - Select this option to fetch assigned Policy information, such as applied firewall rules.

  12. Use Rolled Up Query - Select whether to use a rolled-up query from multiple databases.

To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.

McAffeeEPO

Advanced Settings

Note:

Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to ​Advanced Configuration for Adapters.

  1. Exclude IPv6 addresses - Select this option to fetch IPv6 addresses (as well as IPv4 addresses).
  2. ePO tags Include list (optional) - Specify a comma-separated list of McAfee ePO tags.
    • If supplied, all connections for this adapter will only fetch devices tagged in McAfee ePO with the tags provided in this list.
    • If not supplied, the connection for this adapter will fetch all devices from McAfee ePO.
  3. Include devices with no Agent GUID - Select to include devices with no Agent GUID, using their EPOLeafNode.NodeName as the ID. When option is cleared, these devices are ignored.
  4. Fetch COAMS Data - Select this option to fetch COAMS data. To obtain COAMS, query the OAM_OperationalAttributes table by selecting the following fields: EPOComputerProperties.ComputerName APS_OAM_CombinedAttributesView.TagName APS_OAM_CombinedAttributesView.TagValue APS_OAM_CombinedAttributesView.FQN. Then join the EPOComputerProperties, APS_OAM_CombinedAttributesView tables.
  5. Enrich data for each device dynamically using these query IDs (optional) - Type a value, and then press Enter, comma, or semicolon to add each additional value to the list of query IDs to enrich each device. You can also paste a comma-separated list into the field.
  6. Enable software name sanitization - Toggle on this option to specify how to sanitize software names.
    • Regular expression and replacement list - Enter a comma-separated list of regular expressions and replacements. Each string in this list holds two values separated by #AX_REPLACE_WITH#. The first value must be a valid regular expression that matches what you want to replace. The second value must be what you wish to replace it with. Example: _#AX_REPLACE_WITH# to replace underscores with spaces. Example: ^[0-9]{4}-[0-9]{2}-[0-9]{2}#AX_REPLACE_WITH# to remove dates from the start of the name.
Note:

For details on general advanced settings under the Adapter Configuration tab, see Adapter Advanced Settings.


APIs

Axonius uses the ePolicy Orchestrator Web API.

Required Ports

Axonius must be able to communicate with the value supplied in Host Name or IP Address via the following ports:

  • TCP port 8443

Required Permissions

Create a service account in McAfee ePO that is view for the systems tree tab and sub systems tree. View System tree acccess of "my organization"
Under Host Viewer: Queries and Reports select Use public groups, and the shared groups,
MCEPONew permis



Was this article helpful?

What's Next