McAfee SIEM with Ease

By on

This blog post was written by Karl Klaessig.

Think security and event management is hard from the get go? Think again. The initial set up of McAfee Enterprise Security Manager (ESM) within McAfee’s Security Information and Event Manager (SIEM) ecosystem is a breeze, and takes less than 10 minutes from start to finish.

With McAfee, it’s simple: log into the ESM installation wizard with your McAfee-provided details (if you don’t have any, don’t worry: we can give you yours later on), approve the end-use license agreement, and update your default passwords. From there you can choose to set up McAfee in Federal Information Processing Standards (FIPS) mode, or as a normal account. From there you can choose to set up McAfee in Federal Information Processing Standards (FIPS) mode, or as a normal account. or in non-fips mode, since fips limits the types of data and other features of the SIEM Finally, you’ll be prompted to set up additional settings like how you’d like to — if at all — receive ICMP messages, establish pings, connect to proxy IP addresses, port settings, time synchronization, policy updates, and much moreAllow ICMP, and pings, and even connect to a proxy server if you need it.

And that’s it! After that initial setup, you’re well on your way to protecting yourself with the industry’s leading security and event management platform.

 

Leave a Comment

Similar articles

Here's some cool trivia for you: What profession currently has a zero-percent unemployment rate, pays an average of $116,000 a year, and is among the top in-demand jobs in the world? A lawyer? A pharmacist? A finance manager, perhaps? Nope. The job we're talking about is a cybersecurity specialist and, because of the increase in cyber ...
Read Blog
I’m proud to say that McAfee has received recognition from our customers with the 2018 Gartner Peer Insights Customers’ Choice for the Security Information and Event Management (SIEM). This is a recognition of high satisfaction from a number of reviews by verified end-user professionals. To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors ...
Read Blog
In security operations, we frequently talk about the difficulties in separating the signal from the noise to detect legitimate threats and disregard false alarms. Data overload is a common problem and triage becomes a critical skill to hone and develop. As the chief information security officer (CISO) for McAfee, I am aware at multiple levels ...
Read Blog