McAfee Global Threat Intelligence Proxy (McAfee GTI Proxy)

McAfee Global Threat Intelligence Proxy (McAfee GTI Proxy)

Enable McAfee GTI to operate in DNS proxy environments

Next Steps:

Overview

McAfee Global Threat Intelligence Proxy (McAfee GTI Proxy) enables McAfee VirusScan Enterprise nodes to perform McAfee GTI file reputation (formerly known as Artemis) queries from within the enterprise network without requiring direct access to the public McAfee cloud from all McAfee VirusScan Enterprise (version 8.7 or later) endpoint systems. With McAfee GTI Proxy, organizations ensure that they have up-to-date threat protection and robust virus detection capabilities, including a strong defense against advanced persistent threats and botnets, even if Internet access is limited.

Consolidated cloud communications — Driven by compliance or other factors, organizations often have unique requirements for allowing applications to access resources on the Internet. For organizations operating limited Internet access environments, McAfee GTI Proxy consolidates communications between McAfee VirusScan Enterprise clients that have McAfee GTI file reputation queries activated and the McAfee cloud via a set of auditable proxy servers.

Streamlined deployment and management — McAfee GTI Proxy is delivered as a VMware virtual appliance and managed by the McAfee ePolicy Orchestrator (ePO) platform. Optimized for efficiency, McAfee GTI Proxy requires little additional network overhead.

Real-time threat protection — Leveraging McAfee GTI via the cloud to resolve real-time file reputation queries, McAfee GTI Proxy identifies suspicious files that may contain malware.

Features & Benefits

Leverage local intelligence

McAfee GTI Proxy supports custom reputation entries enabling local intelligence to override the McAfee Global Threat Intelligence reputation response. Administrators can specify whether a triggered file should have a clean or unclean response regardless of the reputation given by McAfee, enabling rapid response to suspected threats and false positive prevention.

Stop malware in real time

Close the protection gap with McAfee Global Threat Intelligence (GTI). McAfee GTI offers comprehensive, real-time protection against both known and emerging threats and McAfee GTI Proxy enables GTI support for VirusScan Enterprise clients. McAfee GTI, a cloud-based service using reputation-based threat protection in addition to other techniques, correlates real-world data collected from millions of sensors globally and delivers automated intelligence to VirusScan Enterprise via the GTI Proxy.

Implement a highly scalable, cost-effective solution

Support up to 100,000 PCs per virtual appliance, reducing management costs.

Ensure secure data transmission

Communications between GTI Proxy and the McAfee cloud are handled via UDP wrapped in SSL (which is DTLS on port 443).

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

McAfee Components

  • McAfee ePolicy Orchestrator (ePO), version 4.6
  • McAfee VirusScan Enterprise, version 8.7 or 8.8
  • McAfee Global Threat Intelligence file reputation (formerly known as Artemis) technology

VM Infrastructure

  • VMware Workstation 8
  • VMware ESX 4.x
  • VMware ESXi 4.x/5.x

Server

  • Distributed as VMware appliance image
  • 64-bit guest operating system running McAfee Linux (MLOS)
  • Disk space: Minimum of 35 GB available
  • Minimum of 2 GB RAM available
  • 64-bit CPU

Resources

Data Sheets

McAfee GTI Proxy

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

McAfee Global Threat Intelligence FAQ

Get answers to commonly asked questions about McAfee Global Threat Intelligence and McAfee GTI Proxy.

Community

Blogs

  • Superfish Root Certificate Used to Sign Malware
    Patrick Knight - February 28, 2015

    The recent issue with the Superfish VisualDiscovery software installing a root certificate on some Windows 8/8.1 systems shipped by Lenovo was generally reported to facilitate man-in-the-middle attacks for SSL connections. The properties of that certificate, however, allow it to be used for any digital-signing purposes, including signing files and malware. On February 26, McAfee Global […]

    The post Superfish Root Certificate Used to Sign Malware appeared first on McAfee.

  • We Tried the NIST Framework and It Works
    Kent Landfield - February 11, 2015

    By Kent Landfield, Director of Standards and Technology Policy, Intel Security, and Malcolm Harkins, Chief Security and Privacy Officer at Intel When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at Intel and Intel Security were familiar with the details, as we had participated […]

    The post We Tried the NIST Framework and It Works appeared first on McAfee.

  • The Coming Security Singularity (Blog 4 of 4)
    Nat Smith - February 10, 2015

    We’ll be releasing four blog posts over the next week.  Each blog will contain a repeated clue word to help you solve the puzzle below.  Track all four clues to help solve the final puzzle and a chance to win an Xbox One Gaming system!.   To enter the contest, after the last blog, email us at with […]

    The post The Coming Security Singularity (Blog 4 of 4) appeared first on McAfee.

  • Personal Privacy vs. Security – Do We Have to Choose?
    Lianne Caetano - February 10, 2015

    Since the dawn of the mobile era, there has been a continuous fight for an increase in the security measures taken to protect user’s data sent through mobile apps. When various mobile messaging apps began rolling out encryption, it came as no surprise that consumers and security aficionados rejoiced. After all, encryption is more or […]

    The post Personal Privacy vs. Security – Do We Have to Choose? appeared first on McAfee.

  • What We Need to Fight Back (Blog 1 of 4)
    Nat Smith - January 29, 2015

    We’ll be releasing four blog posts over the next week.  Each blog will contain a repeated clue word to help you solve the puzzle below.  Track all four clues to help solve the final puzzle and a chance to win an Xbox One Gaming system!  To enter the contest, after the last blog, email us at with the […]

    The post What We Need to Fight Back (Blog 1 of 4) appeared first on McAfee.

Threats and Risks