McAfee Asset Manager

McAfee Asset Manager

Continuous monitoring that scans your network in real time

Next Steps:


Unlike traditional discovery approaches, McAfee Asset Manager uses both passive and active scanning techniques to canvass everything on your network in real time. This continuous asset monitoring integrates with industry-leading vulnerability scanning and incident management workflows to enable continuous asset compliance.

Now you can uncover hidden devices on your network as well as smartphones, tablets, virtual machines, and laptops that come and go between scheduled scans. What you haven’t been seeing or scanning will surprise you — and could be jeopardizing compliance. If it has an IP address or is using your network, McAfee Asset Manager can discover and assess it in real time, revealing the compliance of all assets on your network.

McAfee Asset Manager gives you:

  • Real-time awareness of all devices on the network
  • True device tracking based on a media access control (MAC) address, preventing inaccurate device information if a device IP address changes
  • An agentless solution which provides a real-time inventory of all devices connected to the network, including device profiles and the identities of device users, and creates a physical network topology for each site
  • Virtual environments mapping showing the exact mapping of the virtual guest to its host
  • Rapid deployment with one-time installation, no agents, and no required infrastructure changes
  • Integration with McAfee ePolicy Orchestrator (McAfee ePO), and McAfee Vulnerability Manager to enable network-wide, up-to-date risk visibility

Features & Benefits

Know what you are protecting

Eliminate the guesswork. McAfee Asset Manager provides total visibility into your network, including managed, unmanaged, physical, and virtual devices. Essential network, device, and user intelligence provides the context needed to eliminate ambiguity and facilitate better decision making based on accurate and in-depth audit information. Network information is continuously collected in real time to reflect the current state of the network, enabling complete control over the security, management, and compliance status of your enterprise network.

Implement real-time operation

Detect changes to the network and the devices connected to it as they occur. For example, McAfee Asset Manager can detect a new device as it is being attached to the network, or match a user ID to the IP address it is using as soon as the user authenticates to the network.

Track devices according to their media access control (MAC) addresses

See changes with devices operating on the network. The information collected also includes changes made to the device reflecting the operation of third-party solutions.

Build a comprehensive asset profile

Maintain a comprehensive profile for each device operating on your network. An asset profile may include the following parameters: MAC address, vendor MAC ID, VLAN name and ID, IP address, device type and capability, operating system, patch information, switch and port connections, open network services, user intelligence information (e.g., user ID, user name, department, user group, phone number, and email address), installed software and hardware, running processes, switch- and router-related asset information (e.g., firmware, software, hardware versions, serial numbers, and physical cards), and more.

Enable user identity discovery

Correlate user identities with specific IP addresses. This enhanced user intelligence improves audit controls, boosts regulatory compliance, and significantly advances incident response by identifying vulnerable or exploited hosts, and eliminating manual efforts to track users.

Provide agentless virtualized environments mapping

Discover and track virtualized environments without the use of software-based agents, map between virtual guest devices and the physical system they depend on, and audit the configuration of virtual assets, generating information similar to what is provided for physical devices.

Build a physical network topology

Create and maintain, in real time, the physical topology of your network. McAfee Asset Manager makes it easy to locate devices throughout the enterprise network and use that information to troubleshoot management-related issues.

Get real-time network activity alerts

Receive notification of events happening on your network in real time and then export that activity to the syslog which integrates with third-party applications such as a SIEM.

Save time with rapid deployment

Generate results in just a few hours. With minimal prerequisites, no physical infrastructure changes, and agentless operation, it is easy to implement and configure McAfee Asset Manager.

Get a fast return on investment

Provide instant, complete, and accurate network, device, and user intelligence, allowing IT professionals to complete tasks both quickly and efficiently.

System Requirements

These are general sizing guidelines for McAfee Asset Manager Console and Sensor. Specific analysis may be required for more accurate and detailed planning and sizing of McAfee Asset Manager deployments, especially for large sites. For more information on specifications, download the McAfee Asset Manager 6.6 Deployment Guide.

Minimum hardware configurations for McAfee Asset Manager Sensor deployments

Site Type Number of Devices Minimum CPU Specifications Minimum RAM Specifications Minimum Number of Gigabit NICs
Small Up to 250 (single class C) Intel Atom (or equivalent) 1 GB 2
Medium 251 to 1,000 Intel Celeron (or equivalent) 2 GB 2 to 4 (depending on the number of subnets/VLANs)
Large 1,001 to 3,000 Intel Xeon with a single CPU and 4 cores (or equivalent) 4 GB 4 (assuming the active interface is connected to a Trunk port)
Large More than 3,001 Intel Xeon with 2 CPUs and 4 cores each (or equivalent) 4 GB, 8GB recommended 4 (assuming the active interface is connected to a Trunk port)


Minimum hardware configurations for McAfee Asset Manager Console deployments

Deployment Type Overall Number of Devices Minimum CPU Specifications Minimum RAM Specifications
Small/Medium Up to 50,000 Intel Xeon with a single CPU and 4 cores (or equivalent) 4 GB, 8 GB recommended
Large 50,000 to 100,000 Intel Xeon with 2 CPUs and 4 cores each (or equivalent) 8 GB

News / Events


Data Sheets

McAfee Vulnerability Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Asset Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

Counterattacking BERserk

Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.

Abuse of Trust

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

Prioritize and Remediate Critical Risks Found by McAfee Vulnerability Manager

McAfee Vulnerability Manager and Skybox Risk Exposure Analyzer (REA) combine to give customers an advanced solution to identify IT vulnerabilities, prioritize and evaluate security risks and attack scenarios, and mitigate critical risks before they cause harm.

Ensure Compliance and Automate Change Management of McAfee Enterprise Firewalls

The combination of McAfee Firewall Enterprise and Skybox Firewall Assurance, Skybox Network Assurance, and Skybox Change Manager continuously validate that your McAfee Firewall Enterprise solutions are optimally and securely configured to ensure continuous compliance, block unauthorized activity, and securely automate change management.

Continuous, Comprehensive Monitoring

Learn how you can move to real-time vulnerability management with always-on discovery and integrated risk assessment.

Scanning Web Applications for Vulnerabilities

McAfee Vulnerability Manager has a new web scanning capability, allowing you to discover, crawl, assess, report, and manage the vulnerabilities discovered in any number of internal or external web applications.

Quantitative Metrics to Measure, Model, and Manage IT Risk

Prevari’s Technology Risk Manager (TRM) solution uses existing enterprise data combined with actuarial risk information to provide repeatable, quantitative, and predictive risk analytics.

Preventing Information Leaks

Raytheon SureView integration with McAfee ePolicy Orchestrator (McAfee ePO) software enables governmental and commercial enterprises to deploy and seamlessly manage command and control of SureView clients across the entire organization through their existing infrastructure, allowing for speedy implementation and efficient management of an effective cyberaudit program.

Security Posture and Risk Management

RedSeal Vulnerability Advisor analyzes the results of McAfee Vulnerability Manager in the context of the network to prioritize vulnerabilities requiring attention and offer network mitigation options.

Technology Blueprints

Assess Your Vulnerabilities

McAfee integrates data and processes to make vulnerability management more effective and efficient. Our approach combines asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.

White Papers

Conquer the Top 20 Critical Security Controls

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.



Threats and Risks