McAfee HISCDE-AB-IA Product Guide - Page 10

Host IPS policy tracking and tuning

Page 10 highlights

Introducing Host Intrusion Prevention Host IPS policy tracking and tuning direct policy assignment. Host Intrusion Prevention, as managed by ePolicy Orchestrator, enables you to create policies and assign them without regard to inheritance. When you break this inheritance by assigning a new policy, all groups and systems below inherit the new policy. Policy ownership Each policy is required to have an assigned owner. Ownership ensures that no one can modify the policy other than the global administrator, the creator of the policy, or the person associated as the policy owner. Any administrator can use any policy that exists in the catalog, but only the creator, owner, or global administrator can modify it. TIP: Rather than use a policy owned by a different administrator, we recommend that you duplicate the policy, then assign the duplicate. Otherwise, if you assign a policy that you do not own to System Tree groups that you administer, and the owner of the policy modifies it, all systems to which this policy is assigned receive these modifications. Host IPS policy tracking and tuning The deployment and management of Host Intrusion Prevention clients are handled from ePolicy Orchestrator. In the ePO System Tree you can group systems hierarchically by attributes. For example, you might group a first level by geographic location and a second level by operating system platform or IP address. McAfee recommends grouping systems by Host Intrusion Preventionn configuration criteria, including system type (server or desktop), use of major applications (web, database, or mail server), and strategic locations (DMZ or intranet). You can place systems that fit a common usage profile into a common group on the System Tree. In fact, you might name a group after its usage profile, for example, Web Servers. With computers grouped in the System Tree according to type, function, or geographic location, you can easily divide administrative functions along the same lines. With Host Intrusion Prevention you can divide administrative duties based on product features, such as IPS or firewall. Deploying Host Intrusion Prevention to thousands of computers is easily managed because most computers fit into a few usage profiles. Managing a large deployment is reduced to maintaining a few policy rules. As a deployment grows, newly added systems should fit one or more existing profiles, and be placed under the correct group on the System Tree. Preset protection Host Intrusion Prevention offers two types of protection: • Basic protection is available through the McAfee Default policy settings. This protection requires little or no tuning and generates few events. For many environments this basic protection might be sufficient. • Advanced protection is also available from some preconfigured IPS and firewall policies or by creating custom policies. Servers, for example, need stronger protection than that offered in basic protection. Both scenarios require some tuning of protection settings for actual working environments is required. Adaptive mode To help tune protection settings, Host Intrusion Prevention clients can create client-side rules to server-mandated policies that block legitimate activity. The automatic creation of client rules 10 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

direct policy
assignment
. Host Intrusion Prevention, as managed by ePolicy Orchestrator, enables
you to create policies and assign them without regard to inheritance. When you break this
inheritance by assigning a new policy, all groups and systems below inherit the new policy.
Policy ownership
Each policy is required to have an assigned owner. Ownership ensures that no one can modify
the policy other than the global administrator, the creator of the policy, or the person associated
as the policy owner. Any administrator can use any policy that exists in the catalog, but only
the creator, owner, or global administrator can modify it.
TIP:
Rather than use a policy owned by a different administrator, we recommend that you
duplicate the policy, then assign the duplicate. Otherwise, if you assign a policy that you do
not own to System Tree groups that you administer, and the owner of the policy modifies it,
all systems to which this policy is assigned receive these modifications.
Host IPS policy tracking and tuning
The deployment and management of Host Intrusion Prevention clients are handled from ePolicy
Orchestrator. In the ePO System Tree you can group systems hierarchically by attributes. For
example, you might group a first level by geographic location and a second level by operating
system platform or IP address. McAfee recommends grouping systems by Host Intrusion
Preventionn configuration criteria, including system type (server or desktop), use of major
applications (web, database, or mail server), and strategic locations (DMZ or intranet). You can
place systems that fit a common usage profile into a common group on the System Tree. In
fact, you might name a group after its usage profile, for example,
Web Servers
.
With computers grouped in the System Tree according to type, function, or geographic location,
you can easily divide administrative functions along the same lines. With Host Intrusion
Prevention you can divide administrative duties based on product features, such as IPS or
firewall.
Deploying Host Intrusion Prevention to thousands of computers is easily managed because
most computers fit into a few usage profiles. Managing a large deployment is reduced to
maintaining a few policy rules. As a deployment grows, newly added systems should fit one or
more existing profiles, and be placed under the correct group on the System Tree.
Preset protection
Host Intrusion Prevention offers two types of protection:
Basic protection is available through the McAfee Default policy settings. This protection
requires little or no tuning and generates few events. For many environments this basic
protection might be sufficient.
Advanced protection is also available from some preconfigured IPS and firewall policies or
by creating custom policies. Servers, for example, need stronger protection than that offered
in basic protection.
Both scenarios require some tuning of protection settings for actual working environments is
required.
Adaptive mode
To help tune protection settings, Host Intrusion Prevention clients can create client-side rules
to server-mandated policies that block legitimate activity. The automatic creation of client rules
Introducing Host Intrusion Prevention
Host IPS policy tracking and tuning
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
10