Install & Upgrade
Download the Installation and Upgrade Guide.
The installation and configuration of the McAfee MOVE AntiVirus multiplatform environment require the installation of extensions on McAfee ePO, registering a cloud account, deploying the SVM Manager, and configuring the SVM auto scale settings.
- If you are installing for the first time, refer to this guide.
- If you are upgrading, read this guide.
The installation and configuration of the McAfee MOVE AntiVirus agentless environment require the installation of extensions on McAfee ePO, registering a cloud account, integration with NSX Manager, deploying the SVM, and setting security policies.
Configuration & Management
Configuring McAfee MOVE AntiVirus
Configure McAfee MOVE AntiVirus settings to prevent malware access, keep your protection up to date, and scan for malware on client systems. McAfee MOVE AntiVirus provides two types of file scanning: on access and on demand. You can customize the scan settings based on your demands and requirements. For more information, see Configure McAfee MOVE AntiVirus.
Managing McAfee MOVE AntiVirus
Manage McAfee MOVE AntiVirus by responding to threat detections, managing quarantined items, and periodically analyzing your protection. For more information, see Managing McAfee MOVE Antivirus.
Best Practices & FAQ
Latest Known Issues
Root Certificate Expiration
The McAfee product line uses TLS for secure communication. Two certificates validate McAfee TLS chains, including a primary expiring in 2038 and a secondary expiring on May 30, 2020. If either certificate, or both, are present in your environment, TLS will function correctly prior to May 30, 2020. After May 30, 2020, only the primary certificate will be valid. Out of an abundance of caution McAfee is informing customers of this impending event.
Generally, certificates are auto-updated through operation systems and customers will not be impacted. However, in environments where automatic management of root certificates is disabled and the primary certificate has not been manually deployed, customers will potentially be impacted. KB92937 provides information on how to verify and install the primary certificate.
Failure to have a valid certificate will cause product issues including reduced detection efficacy.
The primary certificate that needs to be validated is in a customer's environment as below:
Subject : CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
Thumbprint : 2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Expiration : 2038-01-18
Subscribe to KB92937 to receive updates.