![]() ![]() The former is the on-prem administration server for MES, while the latter is its cloud variant. The MES platform comes with the McAfee ePolicy Orchestrator (ePO) as well as McAfee ePO Cloud. You can also use the feature to prevent endpoint users from disabling or removing any of the browser plug-ins. Similarly, you can use it to control access to sites based on their safety rating or type of content. Besides blocking URLs, the tool also performs file reputation checks before downloading files. In addition to its security features, MES also includes the web control feature to secure, control, and monitor all activities of your web browser. The firewall utilizes the McAfee Global Threat Intelligence (McAfee GTI) network reputation system in its bid to secure endpoints against threats that originate over the Internet such as botnets, distributed denial-of-service (DDoS) attacks, and other kinds of malicious network traffic. ![]() ![]() So when such a monitored process exhibits malicious behavior, the platform takes the necessary steps not only to kill the process, but also rolls back any changes that it’s made to the installation.Īs is fairly common with virtually all endpoint solutions, MES also includes a stateful software firewall that blocks all malicious inbound and outbound network traffic. It does so by restricting access to specified files, network shares, registry keys, and more, and you can even customize these protections as per your requirements.Īnother strength of the platform is its ability to monitor the behavior of unknown processes with the intent of backing up all changes that they make to the system. One of the strongest suites of the MES platform is that it is very adept at preventing unwanted changes to managed systems. The platform uses machine-learning to analyse the behavior of apps and how they execute in order to prevent previously unknown zero-day exploits. MES provides comprehensive threat protection that guards against various access point violations, buffer overflow exploits, ActiveX exploits, privilege escalation exploits in the kernel and user mode, and more. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |