Protect what you value. w _m a P W . 4 5001 # N O I VERS 08 1 0 6 0 Seven Simple Steps that Slash the IT Audit Burden Maximizing your efficiency gains from McAfee Policy Auditor 5.0 Seven Simple Steps that Slash the IT Audit Burden www.mcafee.com Table of Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Audit Fatigue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Tackle Tedium and Disruption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Step 1: Policy Definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Policy definition with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Step 3: Policy Implementation and Policy Lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Policy management with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Step 3: Data Capture to Validate Policy and Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Data collection with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Step 4: Monitoring, Issue, and Patch Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Issue management with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Step 5: Measurement and Scoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Measurement with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Step 6: Waiver Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Waiver management with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Step 7: Reporting Against Key Mandates and Internal Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Reporting with McAfee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Consider the Distinctive Design Inside . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Management efficiency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Security tool integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Take Seven Simple Steps and Sustain Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Get Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 About McAfee, Inc.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Seven Simple Steps that Slash the IT Audit Burden www.mcafee.com Seven Simple Steps that Slash the IT Audit Burden Although IT audits are inevitable—and increasing—they no longer have to be expensive. Auditing systems and system management technologies have matured. Now key control and validation processes can be integrated, streamlined, and automated. You can increase timeliness and accuracy of audit data while reducing IT audit effort, disruption, and cost. Audit Fatigue The audit spotlight now shines on IT. After years of regulation and embarrassing data breaches, the highest levels of management now comfortably discuss IT controls and audit results. However, their quality expectations are rising. Where IT once performed audits annually, many now support quarterly, monthly, and ad hoc exercises. Each audit expands the scope of the technologies assessed, measured, and proven compliant. Broader scope means more complexity and more work. 50% manage 10 or more regulations. Multiple regulations compound effort and complicate both policy and control decisions.3 Manual data collection precedes manual consolidation of data into multiple graphical views that non-technical executives and auditors can easily digest. No wonder there's an epidemic of Audit Fatigue. Automated workflow system Compliance/governance technology platform Predominantly spreadsheets to collect and organize audit 40% Combination of tools listed above 30% 20% No specific tools 10% 0% 20% 40% 60% 0% Ad-hoc Quarterly More than 5,000 employees Semi-annual Annual Less than 5,000 employees How often audits are conducted1 In addition to being more frequent, audit demands have also become more specific. Audits must include granular information on controls, metrics, trend lines, and industry benchmarks. Yet over 51 percent of respondents in a recent survey used spreadsheets or no tools at all.2 Already over-burdened IT and security teams struggle to collect, organize, and disseminate the required data. If administrators spend three to five hours each week supporting audits, that is a 10 percent tax against productivity. Further, more than half of larger organizations Less than 5,000 employees More than 5,000 employees Type of automated tools organizations use to prepare reports4 To minimize the operational and organizational toll of audits, McAfee® Policy Auditor 5.0 brings together audit and systems security management processes. Through innovative technology and process integration, it reduces the number of tools required to audit accurately. IT teams can regain control over spiraling audit demands0 while delivering the visibility and accountability required for increasingly skeptical executives. 1 Source: Internet Research Group 2, 3 Internet Research Group survey of 400 audit-related professionals, Audit Effectiveness, July 2008. 4 Source: Internet Research Group 3 Seven Simple Steps that Slash the IT Audit Burden A bonus: this increased efficiency and sustainability actually improves security. Repeatable, measurable controls built on best practices fulfill the intention of most governance and compliance initiatives: confidentiality, integrity, availability, and—at least for Sarbanes-Oxley—transparency. Tackle Tedium and Disruption At most sites, audits rival log reviews for on-the-job frustration. Administrators say "I spent years training for this?" and "I have real work to do." However, with regulatory compliance penalties, they can't say "No." For the purpose-built McAfee Policy Auditor, we decided to target audit and reporting inefficiencies directly. We considered each phase of the IT audit process and looked for steps that could be improved, eliminated, or converted to automation. The most susceptible activities were: 1.Policy definition 2.Policy implementation and lifecycle management 3.Data collection to validate policies and configurations 4.Monitoring, issue, and patch management 5.Measurement and scoring to document non-compliance 6.Waiver management 7.Reporting against key mandates and internal policies Step 1: Policy Definition Most regulated organizations already have defined policies. The challenge comes from change. Users spend hours evaluating refinements in regulatory and industry guidance and then adjusting policies. Considerations include: • Mapping vague, industry-specific paper policies and requirements into actionable technical controls and repeatable processes • Policies must align across multiple inputs—a single financial company might have SOX, GLBA, SB 1386, PCI DSS, and internal governance controls. • Different experts have different interpretations, yet the resulting policies must be shown to match industry best practices for each regulation and fulfill the intent of governance committees Most IT and security teams do not have the expertise and confidence to define and maintain these policies without expensive consultants. The workload and costs increase as regulations expand and guidance becomes more complex. www.mcafee.com Policy definition with McAfee To reduce these variables, McAfee has made it easy to incorporate expert guidance and industry benchmarks within live technical controls. A wizard guides authoring and tailoring of benchmarks and policies. This wizard provides flexibility to match the policy definition models at different size organizations. You implement policies as a set of rules that activate specific checks on each system. Policy Auditor lightens the burden in several ways: • Eliminates paper policies—McAfee combines the actual text of a regulation or best practice document with the security checks used to measure its compliance. This detail provides context for each security check at every level of the policy. The human world of text documents and computer world of binary controls are now seamlessly integrated. • Tailors content templates provided by McAfee experts— As a quick-start baseline, McAfee provides content in the form of rules templates, called benchmarks, for key regulations and best practices (PCI DSS, SOX, GLBA, HIPAA, FISMA, ISO 27001, and COBIT). Each benchmark includes multiple rules, and an editor lets you easily tune recommendations to suit the specific needs and preferences of your business. Unlike IT administrators with systems to maintain, content developers from McAfee® Avert® Labs focus full time on analyzing regulations and developing rules and checks. They compare regulations with security best practices and test, document, and release appropriate controls in templates. They release updates as needed to keep content current. • Import best practices—Support for the SCAP (Secure Content Adaptation Protocol) family of protocols allows upload of authoritative benchmarks from sources such as the National Institute of Standards and Technology (NIST) and Red Hat. McAfee converts this XML input into editable policies, which you can then compare to your own. In this way, you can map policy violations to a range of industry standards, aligning your organization‘s controls with industry guidelines. If you decide to match the recommendations, the wizard helps you turn on or turn off the rules that activate specific checks. SCAP provides a set of open standards for defining benchmark checks and configuration settings, as well as 4 Seven Simple Steps that Slash the IT Audit Burden an industry-recognized policy format. The SCAP protocols supported include: •eXtensible Checklist Configuration Description Format (XCCDF) •Open Vulnerability and Assessment Language (OVAL) •Common Configuration Enumeration (CCE) •Common Platform Enumeration (CPE) •Common Vulnerabilities and Exposures (CVE) •Common Vulnerability Scoring System (CVSS) www.mcafee.com can gain your greatest operational savings, and boost your consistency. First, McAfee automates implementation of policies across systems. Policy Auditor 5.0 tightly integrates with the proven McAfee ePolicy Orchestrator® (ePO™) single-agent, single-console infrastructure. You can: • Easily group and manage systems to reflect risks and regulations—Since different assets require different scans and assessments, you can build on Active Directory entries and ePO system identifications to create tags and groups that include or exclude specific systems in audits With this model, it is simple to create specific profiles for classes of systems, usage types, or data types, then reorganize and update affected systems as policies change. You can organize these profiles by platform type, applications, function, geography, and even by regulation or policy. This approach improves the consistency of policy application while eliminating repetitive, error-prone system administration tasks. User rights management offers important control over policy authoring and other tasks throughout the policy life cycle Step 2: Policy Implementation and Policy Lifecycle Management Once you know the policies you would like to audit, you must consider the process and workflow around maintaining policies over time. Lifecycle management allows policies to respond to evolving threats, regulations, and risk postures. It also helps as you change the types and number of systems, their configurations and applications, and policies. For example, what if you needed to change password requirements from eight characters to six characters for all of your Windows, UNIX, and Mac systems? Which policies and which rules would you need to change? In addition, separation of duties requires an overlay of planning and role-based access controls. Unfortunately, each distinct step and interface provides an opportunity for data-entry error and inconsistent implementation. Policy management with McAfee McAfee helps you maintain an efficient, structured workflow throughout the policy lifecycle. In this way, you • Support repeatable policy management—Security policies are not carved in stone. Requirements, regulations, and standards evolve over time, and require a manageable, repeatable process for tailoring, reviewing, and publishing policy revisions. Policy Auditor provides the embedded workflow and roles-based access needed to manage this process cleanly. This ensures that audit results always reflect current business requirements. New policies go into a “received” state. They can then be “duplicated,” “edited,” or “tailored.” As an option, a person other than the policy creator can be required to “review” the policy. It is then “published.” Old policies are “archived.” • Separation of duties—Large organizations strictly enforce who has access to what data, controls, and systems. For instance, the role of IT operations has different objectives than those of IT audit. IT operations‘ main concern is maximum availability of its servers. IT audit’s primary concern is to pass an upcoming audit. To satisfy the needs of both roles, McAfee has implemented an innovative model that “makes the computer do the work.” IT Operations simply sets the white-in and blackout scan windows for the systems using ePO policies. IT audit then determines the policies to run and defines how the 5 Seven Simple Steps that Slash the IT Audit Burden www.mcafee.com patch status, file permissions, and the active presence of mitigating controls, such as encryption and restricted file access. data currency parameters. Policy Auditor does the rest, making sure not to scan systems during peak usage hours. In addition, you can assign granular permission sets to the various roles to determine what they can and cannot do. For example, define who can create edit, view, or publish a policy; who can run an audit; who can view the results; and who can approve a waiver. Tabbed dashboards organize audits, waivers, benchmarks, and checks. Tabbed dashboards organize audits, waivers, benchmarks, and checks • Deploy rules automatically—Policy Auditor sends rules and updates through the ePO agents and the Policy Auditor plug-in to targeted desktops, laptops, and servers. Four ePO dashboards help you monitor status of the rollout. Step 3: Data Capture to Validate Policy and Configurations • Audit heterogeneous and distributed hosts with a single process—With Policy Auditor running on each system, including Windows, HP-UX, Linux, Solaris, and Mac OS X, it takes just one tool to generate data for each audit request. Leveraging tags and groups, the ePO query and reporting engine can poll all the systems under review, capturing and time-stamping data without manual collation. • Schedule in advance or audit continuously—Instead of manual, ad hoc polling, you can program automated scanning of any size group, implemented consistently by the agent using data currency thresholds and blackout windows. Careful scheduling increases the accuracy of data, reducing emergency data collection and rework. Although participants may change, the data and checks remain reliable. Tactically, scheduling helps limit network congestion and ensure timely data capture despite large numbers of systems. It also limits potential performance or process effects on business-critical servers. Audits are all about evidence. To prove compliance, data must be accurate, timely, and specific. However, data quality comes into question when different tools produce data in different formats. Furthermore, each auditor wants their unique information on their schedule, with data reflecting a consistent point in time. Given these demands, data collection has become laborintensive. It can be tedious to find and decisively document the details you need on a large number of distributed systems. Where there are multiple data sources and interfaces, it takes manual collation: a painful model that does not scale well. Data collection with McAfee Policy Auditor replaces this manual process with several authoritative ways to verify enforcement of policy controls. Each of these options reduces the effort involved and builds confidence with external auditors. • Ensure accurate checks—System scans use the industry’s most extensive check library to validate technical controls and assess the security state of common applications, such as Office, SQL Server, and Apache. Checks can document Blackout periods protect business processes Strategically, you strengthen the control environment with more frequent audits that automate risk-based controls. If there are control breakdowns or policy violations, you can detect them immediately to minimize risk of loss or damage. • Use roles and dashboards to streamline analysis—Each audit role—network, system, and security operations; internal and external auditors; or senior managers—can define and save custom dashboards. This flexibility lets multiple participants aggregate and view different sets of data. Dashboards simplify navigation between policies, checks, and system data, presenting data graphically where possible for better absorption. You can also share queries and data views with collaborators. 6 Seven Simple Steps that Slash the IT Audit Burden www.mcafee.com • Transparently initiate and close trouble tickets—Optional integrations generate tickets when an audit discovers a misconfiguration. They will later mark issues when resolved. Policy Auditor connectors support BMC Remedy and HP OpenView systems. • Export data to remediation tools—To guide remediation and patching. McAfee Remediation Manager and other SCAP-compliant systems can import audit and system scan result data Step 5: Measurement and Scoring Custom dashboards help you deliver pertinent data for each audience and enable immediate action Sometimes, auditor requests may seem random. Dashboards help you guide the process. You can group and present specific controls that match policies, regulations, and security objectives. As everyone learns the details that matter, you can preempt requests for tweaked data by giving auditors read-only access to more extensive findings. Step 4: Monitoring, Issue, and Patch Management The previous steps have been necessary to put policy auditing in place. Using this infrastructure, you then need to identify and manage violations as they emerge, despite changes in systems and rules and the increasing diversity and complexity of infrastructure. Naturally, existing help desk operations and trouble ticketing systems play a central role in issue management. Your audit tools can help you find violations, prioritize remediations, and document the right details, but only if they can communicate with the people and systems that do these jobs. Issue management with McAfee Policy Auditor enables this step by scanning systems and generating data on rules, checks, audit status, and violations. It can also use ePO for quick access to threat and system information as well as overall risk. • Assess the damage quickly—Web-based dashboard views let you drill down into specific tasks and click directly through to investigate noncompliant systems The bar keeps rising. Audit teams, regulators, and governance committees are more perceptive and less patient after years of experience. Beyond data snapshots, they want to see trends and detect progress, as well as demonstrate parity with industry norms. Executives want data to let them adjust investments and manage risk more proactively as threats and policies evolve. IT audit teams can support these requirements by establishing practical metrics and time-stamped baselines that they can legitimately compare over time. The data should not only be accurate but presented in useful and actionable reports. Measurement with McAfee Once mitigating controls are in place, Policy Auditor becomes a measurement tool. You can initiate and maintain metrics by attaching numeric values to audit results. Each rule can have adjustable scores and weights. • Customize scoring—Guide attention by applying custom weighting to important sections of policy, ensuring that the most critical audit findings get the focus they deserve • Link scores with risk—Direct your organization‘s investment in protections by assigning criticality based on perceived asset value. Content guidance from McAfee includes an expert assessment of violations or rules that are likely to be most critical. • Compare with industry best practice—Templates help you measure compliance against ISO27001 and COBIT frameworks. After beginning with a broad, best-practices compliance program, most organizations can easily take a step back to measure themselves against more targeted standards, such as PCI DSS. 7 Seven Simple Steps that Slash the IT Audit Burden www.mcafee.com Step 6: Waiver Management The dynamic nature of compliance benchmarks and business infrastructure means that no group is ever 100 percent compliant. That is acceptable if you document and justify discrepancies, prevent abuse, and show you have a plan in place to manage your exceptions over time. This precision increases accountability, makes policies more accurate, and supports consistent implementation while enabling business workflows. Step 7: Reporting Against Key Mandates and Internal Policies The most important deliverable from any audit is credible proof of compliance. You must offer this proof at multiple levels for different audiences and, ideally, support established processes and systems. However, manual redundant processes and their errors slow this final step. Costs rise as demands increase. Reporting with McAfee Waiver management with McAfee McAfee allows you to assign waivers conveniently to individual systems, groups of assets, or policy rules. • Control privileges—Only users with appropriate authority can define, grant, and document waiver conditions • Define flexible waiver conditions—Exemption, exception, and suppression options let you determine how to handle a specific issue. For example, exemptions can prohibit audits during quarter-end processing on critical servers. • Set expiration dates—Waivers require a start and end date to automatically limit exposure • Attestation—Comments can be added to explain use of compensating controls and remind auditors why the noncompliance state was waived The advanced ePO reporting system helps you easily find and aggregate data and present it in an infinite variety of reports. Reuse the role-based dashboards built previously to find and present data at different levels of abstraction, or build new reports from scratch. • Save repeated queries and tasks—Store common queries and create linked, automated tasks to repeat audits and reports with precision, easily show changes against audit baselines, and proactively generate updated data • Create executive and auditor views—Executives are primarily interested in compliance status; aggregate this information across business or operational units or subdivide for greater relevance. Let auditors see information by specific regulation. • Enable quick action—Drill into dashboards and webbased reports for details and next steps Thrid Party Ticketing System McAfee Service Desk Remedy ePO Ticketing Policy Auditor Content Policy Auditor Agent Server Policy Templates, Scheduled Scans, Audit Results End Point McAfee Agent ePO Assets, Policies, Events Scans to perform sent ot agent Scan results sent back to server Issues mapped to tickets PA Plug-in Policy Auditor takes full advantage of the ePolicy Orchestrator infrastructure 8 Seven Simple Steps that Slash the IT Audit Burden • Export to portals or reporting tools—The XCCDF and OVAL standards allow you to integrate audit results data into existing auditor and executive portals. You can also transfer data through CSV, XML, HTML, and PDF formats. • Consolidate audit and endpoint data—Speed decisionmaking with scan and system information in the same report, including details like patch levels and countermeasures that are in place • Distribute reports automatically—For convenient, reliable notification, send full reports or just alerts on specific concerns via email to predefined lists of users. Archive copies automatically for consistent reference points. Consider the Distinctive Design Inside With the market energy propelled by regulatory compliance, multiple commercial solutions address each of these seven steps separately. Some companies have deployed as many as six tools in their race to comply. However, it takes standards support, management efficiency, and security tool integration to make audit processes efficient, consistent, and convenient. Standards Through open standards, Policy Auditor lets you import industry best practices and benchmark guidance to inform policy definition. As you identify issues, you can export scan and audit results into your IT remediation and audit processes. Not just convenient, this transparency raises confidence in the relevance and utility of audit data. Policy Auditor supports SCAP, CSV, HTML, and PDF. Management efficiency Policy Auditor 5.0 integrates completely within the management console of ePolicy Orchestrator. With 155 million users worldwide and a single deployment at over 5 million users, ePO provides a rock-solid foundation for implementing and maintaining policy infrastructure. • Four tabs within the ePO console—benchmarks, checks, audits, and waivers—ease monitoring and navigation. Drilldown menus make it easy to act. • The same ePO System Tree used to manage systems for anti-virus is used to audit for policy compliance • Advanced query and reporting help every audit participant locate and share critical information • ePO supports separation of duties with user rights management; audit teams can specify what the controls www.mcafee.com need to be and IT operations can select the reports. Seven unique permission sets, each with multiple rules, restrict access controls. You can segregate rights to modify, run, and view results. Use our examples or easily create your own. • Automation and scheduling options increase consistency and reduce process burdens • Through the single agent, single console design, each McAfee or third party product that uses ePO extends the operational savings. You eliminate extra management agents and consoles and reduce learning, deployment, and maintenance costs. Security tool integration McAfee Total Protection for Endpoint and McAfee Total Protection for Data use the same ePO infrastructure for their policy and function updates. Because of this single agent, audits can include system and data protection countermeasures as well as policy violations. (Note: McAfee Total Protection for Endpoint—Advanced includes Policy Auditor for use on client workstations.) For example, ePO can help enforce endpoint compliance to mandated security configurations, such as “every system must have up-to-date anti-virus installed.“ Similarly, when you use Policy Auditor with McAfee Network Access Control, you can assess and enforce SCAPbased policies before granting network access. Should assets fall out of compliance while on the network, you can automatically quarantine them until they meet policies. McAfee solutions leverage the same security and compliance tasks and processes, including reporting, to minimize the learning curve. By pulling from a single ePO database, tools get consistent, up-to-date data. Third-party tools can integrate with ePO's open interfaces to streamline operations further. Through these integrations, you gain a complete, reliable understanding on which to make decisions. You can efficiently consider both security and compliance activities within your standard procedures and prioritize the actions that minimize effort and maximize protection. Take Seven Simple Steps and Sustain Compliance At most organizations, compliance and security tools are multiplying irresponsibly as threats evolve. Through McAfee Policy Auditor 5.0 and its integration with ePO, you can rein 9 Seven Simple Steps that Slash the IT Audit Burden in implementation and management costs. You can exert control, despite increasing complexity, and avoid Audit Fatigue. Looking for proof? An Insight Express survey of ePO and non-ePO customers found that “integrated security management results in a 44 percent reduction in IT costs and 36 percent improvement in efficiency.” Large enterprises using ePO reduced their total number of administrators by an average of almost 12 people. Estimate your savings When an organization can cut a dozen administrators with salaries of $100,000, their annual savings is $1.2 million dollars. Estimate your own savings through an ROI calculator created by Forrester: www.mcafee.com/us/ enterprise/products/tools/ad/roi Get Started As a purpose-built product, Policy Auditor provides consistent, authoritative validation of compliance. Across the seven steps of auditing, you can meet audit requirements while minimizing cost and effort: 1.Policy definition—Build and customize policies based on expert content, open standards, and industry benchmarks 2.Policy implementation and lifecycle management— Eliminate manual efforts that threaten accuracy and tax IT and security teams www.mcafee.com 6.Waiver management—Use audit processes to accurately reflect workflow and reduce business disruption 7.Reporting against key mandates and internal policies— Deliver efficient, relevant reports with automated data collection, display, and distribution Policy Auditor 5.0 introduces effective auditing of technical controls on top of the security and compliance management system of ePO. This powerful combination, closely integrated to become a single tool, makes day-today audit operations straightforward. With each added audit cycle, regulation, and system, you can achieve greater economies of scale and efficiencies of operation. Learn more at www.mcafee.com/grc About McAfee, Inc. McAfee, Inc., headquartered in Santa Clara, California, is the world’s largest dedicated security technology company. It delivers proactive and proven solutions and services that secure systems and networks around the world, allowing users to browse and shop the web securely. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers by enabling them to comply with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. http://www.mcafee.com 3.Data collection to validate policies and configurations— Use one tool across systems for scheduled and continuous audits 4.Monitoring, issue, and patch management—Simplify actions with custom dashboards and roles and open interfaces between tools 5.Measurement and scoring to document noncompliance— Weight rules to match business realities and build meaningful metrics McAfee and/or additional marks herein are registered trademarks or McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054, 888.847.8766 www.mcafee.com trademarks of McAfee, Inc. and/or its affiliates in the United States and/ or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2008 McAfee, Inc. All rights reserved. 1-na-cor-grc-wp-001-1008 doc-id-goes-here 10
© Copyright 2026 Paperzz