McAfee HISCDE-AB-IA Product Guide - Page 11

Tuning, Dashboards and queries, adaptive, exception rules, trusted applications, firewall rules

Page 11 highlights

Introducing Host Intrusion Prevention Host IPS policy tracking and tuning is permitted when clients are placed in adaptive mode. In adaptive mode, client rules are created without interaction from the user. After client rules are created, you need to carefully analyze them and decide which to convert to server-mandated policies. Often in a large organization, avoiding disruption to business takes priority over security concerns. For example, new applications might need to be installed periodically on some computers, and you might not have the time or resources to immediately tune them. Host Intrusion Prevention enables you to place specific computers in adaptive mode for IPS protection. Those computers can profile a newly installed application, and forward the resulting client rules to the ePolicy Orchestrator server. The administrator can promote these client rules to an existing or new policy, then apply the policy to other computers to handle the new software. Systems in adaptive mode have virtually no protection, so the adaptive mode should be used only for tuning an environment and eventually turned off to tighten the system's protection. Tuning As part of Host Intrusion Prevention deployment, you need to identify a small number of distinct usage profiles and create policies for them. The best way to achieve this is to set up a test deployment, then begin reducing the number of false positives and generated events. This process is called tuning. Stronger IPS rules target a wider range of violations and generate more events than in a basic environment. If you apply advanced protection, McAfee recommends using the IPS Protection policy to stagger the impact. This entails mapping each of the severity levels (High, Medium, Low, and Information) to a reaction (Prevent, Log, Ignore). By initially setting all severity reactions except High to Ignore, only the High severity signatures are applied. The other levels can be raised incrementally as tuning progresses. You can reduce the number of false positives by creating exception rules, trusted applications, and firewall rules. • Exception rules are mechanisms for overriding an IPS signature in specific circumstances. • Trusted applications are application processes that ignore all IPS or Firewall rules. • Firewall rules determine whether traffic is permissible, and block packet reception or allow or block packet transmission. Dashboards and queries Dashboards enable you to track your environment by displaying several queries at once. These queries can be constantly refreshed or run at a specified frequency. Queries enable you to obtain data about a particular item and filter the data for specific subsets of that data; for example, high-level events reported by particular clients for a specified time period. Reports can be scheduled and sent as an email message. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

is permitted when clients are placed in
adaptive
mode. In adaptive mode, client rules are created
without interaction from the user. After client rules are created, you need to carefully analyze
them and decide which to convert to server-mandated policies.
Often in a large organization, avoiding disruption to business takes priority over security concerns.
For example, new applications might need to be installed periodically on some computers, and
you might not have the time or resources to immediately tune them. Host Intrusion Prevention
enables you to place specific computers in adaptive mode for IPS protection. Those computers
can profile a newly installed application, and forward the resulting client rules to the ePolicy
Orchestrator server. The administrator can promote these client rules to an existing or new
policy, then apply the policy to other computers to handle the new software.
Systems in adaptive mode have virtually no protection, so the adaptive mode should be used
only for tuning an environment and eventually turned off to tighten the system’s protection.
Tuning
As part of Host Intrusion Prevention deployment, you need to identify a small number of distinct
usage profiles and create policies for them. The best way to achieve this is to set up a test
deployment, then begin reducing the number of false positives and generated events. This
process is called
tuning
.
Stronger IPS rules target a wider range of violations and generate more events than in a basic
environment. If you apply advanced protection, McAfee recommends using the IPS Protection
policy to stagger the impact. This entails mapping each of the severity levels (High, Medium,
Low, and Information) to a reaction (Prevent, Log, Ignore). By initially setting all severity
reactions except High to Ignore, only the High severity signatures are applied. The other levels
can be raised incrementally as tuning progresses.
You can reduce the number of false positives by creating
exception rules
,
trusted applications
,
and
firewall rules
.
Exception rules are mechanisms for overriding an IPS signature in specific circumstances.
Trusted applications are application processes that ignore all IPS or Firewall rules.
Firewall rules determine whether traffic is permissible, and block packet reception or allow
or block packet transmission.
Dashboards and queries
Dashboards enable you to track your environment by displaying several queries at once. These
queries can be constantly refreshed or run at a specified frequency.
Queries enable you to obtain data about a particular item and filter the data for specific subsets
of that data; for example, high-level events reported by particular clients for a specified time
period. Reports can be scheduled and sent as an email message.
Introducing Host Intrusion Prevention
Host IPS policy tracking and tuning
11
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5