TDR and McAfee Endpoint Security

Deployment Overview

Threat Detection and Response (TDR) is a collection of advanced malware defense tools that correlate threat indicators from Fireboxes and Host Sensors to enable real-time, automated response to stop known, unknown, and evasive threats. As part of the TDR solution, you install TDR Host Sensors to provide endpoint protection.

This document includes information about the integration of a TDR Host Sensor with a host that runs McAfee Endpoint Security.

This document does not describe the procedure to set up your Threat Detection and Response account. For information about how to set up your TDR account, TDR deployment best practices, and how to enable TDR on a Firebox, see Quick Start — Set Up Threat Detection and Response.

Configuration Summary

To avoid conflicts between the TDR Host Sensor and McAfee, add these exclusions:

  • Exclusion in TDR for McAfee — For Windows:
    • C:\Program Files\McAfee\
    • C:\Program Files(x86)\McAfee\
    • C:\ProgramData\McAfee\
  • Exclusion in TDR for McAfee — For Mac:
    • /Application/McAfee Endpoint Security for
    • /Library/McAfee/
    • /private/var/McAfee/
    • /private/var/folders/zz/zyxvpxvq6csfxvn_n0000000000000/C/PKInstallSandboxManager/*.activeSandbox/Root/Library/McAfee/
    • /users/<user name>/Downloads/
  • Exclusion in McAfee for TDR— For Windows:
    • 64-bit Windows — C:\Program Files (x86)\WatchGuard\Threat Detection and Response\
    • 32-bit Windows — C:\Program Files\WatchGuard\Threat Detection and Response\
  • Exclusion in McAfee for TDR — For Mac:
    • /usr/local/watchguard/

If the Host Sensor and McAfee detect and respond to a threat at the same time, this can cause high utilization of system resources such as CPU, Memory and Disk I/O.

Configuration Details

To complete this deployment, you must have:

  • An active Threat Detection and Response subscription with Host Sensor licenses
  • McAfee Endpoint Protection Essential for SMB
    • McAfee Agent version

The TDR and Fireware versions tested for this deployment included:

  • TDR Host Sensor
  • Firebox with Fireware v12.0 or higher

The Windows test environment for this deployment included:

  • Windows 7, 8.1, 10 Enterprise 64-bit Operating System
  • Memory (RAM) — 8 GB
  • Processor — 2 CPU Cores

The Mac test environment for this deployment included:

  • Sierra version 10.13.2
  • Memory (RAM) — 8 GB
  • Processor — 2.6GHz Intel Core i5

Configure Exclusions in TDR

In your TDR account, add the exclusions to manually identify paths for files and processes that you do not want Host Sensors to monitor. Before you deploy a Host Sensor on computers that have McAfee installed, Add exclusions for the McAfee file paths as TDR Exclusions in your TDR account.

In your TDR account, add the TDR exclusions for the paths shown in the Integration Summary.

Unless otherwise noted, configure each TDR exclusion with these options, which are selected by default:

  • Also exclude subfolders
  • Entities to exclude: Files and Processes

To add an exclusion in TDR:

  1. Log in to your TDR account or managed account as a user with Operator privileges.
  2. Select Configuration > Exclusion.
  3. Click Add Exclusion.
    The Add Exclusion dialog box appears.
  4. In the Path text box, type the path to exclude. Folders specified in an exclusion must end with a backslash.
  5. To apply the exception to all hosts, in the Hosts / Groups text box, specify the group All Hosts.
  6. Click Save & Close.

Repeat these steps to add each exclusion.

Configure Exclusions in McAfee

To exclude directories used by the TDR Host Sensor, add the exclusions for the paths listed in the Integration Summary.

To add an exclusion in McAfee — For Windows:

  1. Click Setting.
  2. Select Threat Prevention.
  3. Find On-Demand Scan > Exclusions.
  4. Click Add.
  5. Click What to exclude > Browse.
  6. Browse to the TDR file location. Click OK.
  7. Select the Also exclude subfolders check box.
  8. Click OK.

To add an exclusion in Endpoint — For Mac:

  1. Click McAfee Endpoint Security for Mac > Preferences.
  2. Select Threat Prevention > Exclusion.
  3. Click Unlock. Browse to the TDR path.
  4. Click Open.

For information about the integration testing methodology, see TDR Testing Methodology.

Give Us Feedback  ●   Get Support  ●   All Product Documentation  ●   Technical Search