McAfee HISCDE-AB-IA Product Guide - Page 101

Appendix A — Writing Custom Signatures and Exceptions, Rule structure

Page 101 highlights

Appendix A - Writing Custom Signatures and Exceptions This section describes the structure of IPS signatures, including a list of classes, parameters, and directives, and provides information on how to create custom signatures for the various client platforms. This information can also be used when working with the advanced details page for exceptions. Contents Rule structure Windows custom signatures Non-Windows custom signatures Rule structure Every signature contains one or more rules written in ANSI Tool Command Language (TCL) syntax. Each rule contains mandatory and optional sections, with one section per line. Optional sections vary according to the operating system and the class of the rule. Each section defines a rule category and its value. One section always identifies the class of the rule, which defines the rule's overall behavior. The basic structure of a rule is the following: Rule { SectionA value SectionB value SectionC value ... } NOTE: Be sure to review the syntax for writing strings and escape sequences in TCL before attempting to write custom rules. A quick review of any standard reference on TCL should ensure that you enter proper values correctly. A rule to prevent a request to the web server that has "subject" in the http request query has the following format: Rule { Class Isapi Id 4001 level 4 query { Include *subject* } McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Appendix A — Writing Custom Signatures and
Exceptions
This section describes the structure of IPS signatures, including a list of classes, parameters,
and directives, and provides information on how to create custom signatures for the various
client platforms. This information can also be used when working with the advanced details
page for exceptions.
Contents
Rule structure
Windows custom signatures
Non-Windows custom signatures
Rule structure
Every signature contains one or more rules written in ANSI Tool Command Language (TCL)
syntax. Each rule contains mandatory and optional sections, with one section per line. Optional
sections vary according to the operating system and the class of the rule. Each section defines
a rule category and its value. One section always identifies the class of the rule, which defines
the rule’s overall behavior.
The basic structure of a rule is the following:
Rule {
SectionA value
SectionB value
SectionC value
...
}
NOTE:
Be sure to review the syntax for writing strings and escape sequences in TCL before
attempting to write custom rules. A quick review of any standard reference on TCL should
ensure that you enter proper values correctly.
A rule to prevent a request to the web server that has “subject” in the http request query has
the following format:
Rule {
Class Isapi
Id 4001
level 4
query { Include *subject* }
101
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5