
Types of distributed repositories.....................................................132
Repository branches and their purposes...............................................133
Repositorylistfileanditsuses.......................................................134
Howrepositories work together.............................................................134
Ensuringaccesstothesourcesite...........................................................135
Configuring proxy settings..........................................................135
Configuring proxy settings for the McAfee Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Configuring proxy settings for MyAvert Security Threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Working with source and fallback sites.......................................................137
Switching source and fallback sites...................................................137
Creating source sites..............................................................137
Editing source and fallback sites.....................................................138
Deleting source sites or disabling fallback sites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Using SuperAgents as distributed repositories.................................................139
Creating SuperAgent repositories....................................................139
Selecting which packages are replicated to SuperAgent repositories. . . . . . . . . . . . . . . . . . . . . . . . 140
Deleting SuperAgent distributed repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Creating and configuring FTP, HTTP, and UNC repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Creating a folder location on an FTP, HTTP server or UNC share. . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Adding the distributed repository to ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Avoidingreplication ofselectedpackages..............................................143
Disabling replication of selected packages.............................................144
Enabling folder sharing for UNC and HTTP repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Editing distributed repositories ......................................................144
Deleting distributed repositories.....................................................145
Working with the repository list files.........................................................145
Exporting the repository list SiteList.xml file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Exporting the repository list SiteMgr.xml file for backup or use by other servers. . . . . . . . . . . . . . . 146
Importing distributed repositories from the SiteMgr.xml file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Importing source sites from the SiteMgr.xml file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Changing credentials on multiple distributed repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Managing your Network with Policies and Client Tasks............................148
Product extensions and what they do........................................................148
Policy management.......................................................................149
Policy application.........................................................................150
Creating Policy Managementqueries.........................................................151
Client tasks and what they do..............................................................152
7McAfee ePolicy Orchestrator 4.5 Product Guide
Contents