Skip to main content
TrustRadius
Trellix ePolicy Orchestrator

Trellix ePolicy Orchestrator
Formerly McAfee ePolicy Orchestrator

Overview

What is Trellix ePolicy Orchestrator?

Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Read more
Recent Reviews

TrustRadius Insights

McAfee ePolicy Orchestrator is widely used as the go-to antivirus product for organizations, serving as a comprehensive solution for …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Trellix ePolicy Orchestrator?

Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

55 people also want pricing

Alternatives Pricing

What is Snyk?

Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and helps security teams to collaborate with their development teams. It boasts a developer-first approach that ensures organizations can secure all of the critical components of their applications from code to…

What is Acunetix by Invicti?

AcuSensor from Maltese company Acunetix is application security and testing software.

Return to navigation

Product Details

What is Trellix ePolicy Orchestrator?

Trellix ePolicy Orchestrator Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Reviewers rate Support Rating highest, with a score of 10.

The most common users of Trellix ePolicy Orchestrator are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(58)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

McAfee ePolicy Orchestrator is widely used as the go-to antivirus product for organizations, serving as a comprehensive solution for securing systems, servers, and PCs. Users appreciate the ease of management and robust control over endpoints that this software offers. Its cloud-based nature eliminates the need for on-premises overhead, simplifying management and providing a seamless user experience.

One notable use case comes from a Defense Contractor that relies on McAfee ePolicy Orchestrator for real-time virus scanning and USB peripheral detection on both classified and unclassified systems. The software has greatly simplified and streamlined endpoint security management, allowing for easier tracking and management of threats across the network. By automating security processes, it has freed up valuable time for the IT team to focus on other critical tasks.

Moreover, the reporting and analytics capabilities of McAfee ePolicy Orchestrator are robust, helping organizations stay on top of potential threats. It ensures that computers are properly managed and up to date before being added back into the domain, preventing issues with outdated antivirus software and potential malware spread.

Users value the easy-to-use and informative dashboard approach of McAfee ePolicy Orchestrator, which enables them to build a single pane of glass view for efficient security management. It offers flexibility through features such as whitelisting processes, tagging endpoints for additional tasks, and quarantining systems with restricted policies. The software provides secure applications and data protection through its customization options.

For many organizations facing global crypto locker attacks, deploying McAfee ePolicy Orchestrator has been crucial in providing real-time protection to users in different locations. The software proves its worth by catching numerous instances of malicious files, successfully preventing users from unintentionally opening phishing scam emails.

McAfee ePolicy Orchestrator also acts as a centralized management console for various McAfee products including Antivirus, DLP endpoint sensors, Exchange MSME software policies, Host Protection, Site Advisor, and Disk Encryption. It effectively manages malware protection across the organization, covering workstations, laptops, and servers.

In summary, McAfee ePolicy Orchestrator serves as an effective tool for security threat prevention and detection. Its user-friendly interface, robust control over endpoints, automation capabilities, reporting and analytics features, and centralized management console make it a valuable asset for organizations aiming to maintain a secure environment for their systems and data.

Intuitive User Interface: Users have consistently praised the software's intuitive and easy-to-navigate user interface, with several reviewers stating that it has made accessing different features and performing tasks quick and convenient.

Cloud-based Access: Many users appreciate the cloud-based access provided by the software as it allows them to access it from anywhere without the need for installation on individual devices. This flexibility has been noted as a significant advantage by multiple reviewers.

Seamless Integration with Single Sign-On SSO: The integration of the software with Single Sign-On SSO has been highly regarded by users who find it seamless to authenticate and access the software. This feature enhances their overall user experience with the product.

Difficult User Interface: Some users have found the user interface to have a steep learning curve and not easy to master every component of the software. They feel that it takes time and effort to become familiar with the interface, which can be frustrating for new users.

Challenging Deployment and Setup: The process of deploying the software has been reported as not easy by some users. They mention that the setup is more time-consuming than expected, causing delays in getting the software up and running smoothly.

Busy-Looking Console: Users have mentioned that the console can be overwhelming for new users due to its busy appearance. This can make it difficult for them to navigate through different features and functionalities effectively.

Users have made several recommendations based on their experience with the software.

Firstly, they suggest that it is important to try using the software before making a decision. Users emphasize the importance of giving it a test run to evaluate its performance and features.

Secondly, before using the software, users recommend considering if a comprehensive solution is necessary for managing multiple security tools. This will help determine if McAfee e Policy Orchestrator is the right fit for the organization's needs.

Thirdly, many users prefer using McAfee e Policy Orchestrator for their security management needs, particularly when there are multiple security tools to manage. They find it efficient and effective in handling and coordinating various security components.

In addition to these recommendations, users also provide some key advice:

  • Ensure that all required ports are open through the firewall before setting up McAfee ePO.
  • Use the recommended server configuration based on the number of nodes for optimal performance.
  • Utilize the tagging feature for a phased rollout of McAfee components.
  • Subscribe to McAfee SNS alerts for updates and hotfix details.
  • Report to McAfee Support if the antivirus does not detect a virus immediately.

By following these recommendations, users can make the most of their experience with McAfee e Policy Orchestrator.

Attribute Ratings

Reviews

(1-15 of 15)
Companies can't remove reviews or game the system. Here's why
Farukh Alam | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
  • it makes easy to manage policies, configurations, and updates.
  • Advanced reporting and analytics capabilities, giving you visibility into security incidents and trends across your network.
  • Scalability-allowing it to grow and adapt to your organization's changing needs..
  • can be simplified deployement process..
  • Can do better Integration with Third-Party Solutions..
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Protect endpoints from malware, viruses.
  • Robust agent deployment capabilities.
  • Management dashboards.
  • Very complex configuration, can be difficult to implement.
  • Database usage.
  • Hardware resources usage.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • It integrates well with Splunk
  • You get email alerts
  • It can easily manage users and groups through System Tree
  • Deployment is easy
  • DLP for USB devices
  • You can update from a single console
  • Not easy to master every component
  • Won't catch 0 Day threats
  • High CPU utilization
  • Console can be very busy looking for a new user
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Centralized security management
  • Dashboarding and single point to fetch reports
  • Supporting third-party with API integration
  • Need in-depth on KBs because there is dependency on support for even petty issues
  • Scanning of systems at times increases CPU utilization
  • GUI can be made little more easy and smooth
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Real-time protection with daily DATA updates.
  • Visibility to which machine had a potential occurrence.
  • Ability to create your own personalized protection rules.
  • Due to Microsoft Windows Updates, support and KB articles are a must.
  • Deployment tasks might need a lot of configurations before.
  • ePO upgrade requires a lot of preparation steps.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Applies the policy settings for the selected group
  • Keeps the hosts updated well, in general
  • Allows update of available software from within the management console
  • Assigns and runs ongoing tasks with little need for intervention
  • Provides quick high-level view of systems
  • In general, the upgrades are not easy and often fraught with errors and difficulties.
  • When there is an issue, it usually requires McAfee support to get involved.
  • Keeping track of what software updates need to be installed is often confusing.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Threat detection and protection
  • Very good reporting and auditing
  • Good policy configuration and customization
  • Easy to detect rogue devices
  • Training is needed to fully understand and utilize all the features of the product.
  • Use documentation can be more detailed
  • No other problems
Ashley Babiarz | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Managing machines on the domain
  • Making sure all machines have up to date antivirus
  • Allowing us to block computers from the domain that are a potential threat
  • More advanced search options
  • Ability to automatically remove computers if they aren't active for a certain time
  • Ability to customize home screen per user
Score 7 out of 10
Vetted Review
Verified User
  • We can deploy easily to wide range of machines across the organization using ePolicy Orchestrator.
  • Easily manageable and better UI which helps users understand what is the machine, what kind of OS it has, what are the detections it found in that machine, and what are the things that are blocked.
  • McAfee helps us in detecting threats across the machines with rogue sensors which will be used in detection of unmanaged systems in the organization.
  • It has a slow mechanism when adding custom threat feeds. For example, if McAfee didn't have a signature or detection about a new virus and we try to add it to our console it is like a really big process in adding that to our available signatures.
  • Whenever a scan is performed, the system CPU utilization goes up 100 percent.
  • Installation fails due to difference in timestamp when we try to shuffle between packages.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • A unified dashboard view provides security intelligence across different endpoints.
  • Allowed us to access our third party IT infrastructure from a single security management console.
  • Where workflows were cumbersome and messy this allowed them to be more streamlined.
  • Setup was more time consuming than expected.
  • Consolidated with McAfee products better than other vendor products.
  • Support for lesser-known vendors was not available.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • Static malware scans for known bad processes and files works well and can be schedules on endpoints easily
  • Preventing users from accessing USB drives and other peripherals is easily configured. We can also allow users to access to USB drives with user codes for the times they need it for business reasons.
  • ePO provides access into our MSME software so that we're not managing many different products from different locations.
  • In recent years the console has gotten much easier to navigate even though there is a ton of information to be accessed.
  • Within DLP the email alerting you cannot stipulate specific vendor id's or types of devices to alert on. It will just alert on everything no if it gets hit by any policy.
  • Because the scans are for static/known processes and files you will not be protected by unknown/0-day malware.
  • There have been many times that a DAT update will find and alert very old .js files and it never caught before and are many times flagged as Artemis generic. The FP rate could be improved upon.
  • Price, it's fairly expensive.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Systems Manager. We are able to view all the systems in our environment in one dashboard. This gives us the chance to see when PCs last communicated with our McAfee ePolicy Orchestrator (ePO) server and if they are up to date on their virus definitions.
  • Ease of pushing out anti-virus to our endpoints.
  • Agentless Virtual Machine anti-virus. No need to have anti-virus on the VM it goes on the ESXi host which scans the datastores.
  • Clunky interface.
  • Lots of information but not presented neatly.
  • More configuration needed to stop some of the bigger exploits.
Return to navigation