12.07.2015 Views

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Managing <strong>McAfee</strong> DLP systemsAdding servers to <strong>McAfee</strong> DLP systems 13You might then search his communications for the name of the lost component, then find the emailaddress and geographical location of users outside the company who might have received theinformation. You might not know what will be in those communications, but you can use what you findto form the next question.Add Active Directory serversActive Directory or OpenLDAP directory servers must be added to support integration with existinguser systems. After the server is configured and users are added, incidents can be detected throughuser accounts on the servers.More than one directory server can be added to <strong>McAfee</strong> DLP Manager, but they must be of the sametype. If an Active Directory server is added, you cannot also add an OpenLDAP directory server.Task1 Select one of these options:• In ePolicy Orchestrator, select Menu | <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> | DLP Sys Config.• On your <strong>McAfee</strong> DLP appliance, select System.2 Select System Administration | Directory Services.3 From the Actions menu, select Create Directory Server.4 Type in a label to identify the LDAP server.5 Do one of the following:• Type in the Domain of the LDAP server.If you use this option, you must log on to an administrative account on the LDAP server. Thesystem will then query the Domain Name Server to find the domain controller for the ActiveDirectory domain.• Type in the name or IP address of the Authorization Server.If you are using SSL (Secure Sockets Layer) to encrypt the connection, you must enter theFQDN (fully qualified domain name) cited in the uploaded certificate.Unlike the LDAP server domain name, you can use any valid account that has permission toread from the LDAP server (an administrative account is not necessary). If you have alreadyentered the domain name of the LDAP server, any information you enter here will be ignored.6 Type in the Server Port to be used for the connection.7 Set intervals for connection Timeout and Retries (in seconds).8 Type in the Loginid Attribute.Use samaccountname to retrieve user names from the server.9 Type in the user name (Login DN) and Password.10 Identify the local domain components in the Base DN field (for example, dc=mydomain,dc=com).Use an administrative account whose password does not expire to maintain the connection, but anon‐administrative account name is acceptable when using an authorization server.11 Type in the number of records you want to retrieve at one time in the Server Results limit field.Before entering a value higher than 10, consult the administrator of the Active Directory server tofind out how many records can be served per request.<strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> <strong>9.2.2</strong> <strong>Product</strong> <strong>Guide</strong> 263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!