McAfee HISCDE-AB-IA Product Guide - Page 115

Advanced details, For example, the GET request

Page 115 highlights

Appendix A - Writing Custom Signatures and Exceptions Windows custom signatures Advanced details Some or all of the following parameters appear in the Advanced Details tab of security events for the class Isapi. The values of these parameters can help you understand why a signature is triggered. GUI name url query web server type method local file raw url user source server content len Explanation Decoded and normalized location part of an incoming HTTP request (the part before the '?'). Decoded and normalized query part of an incoming HTTP request (the part after the first '?'). Type and version of the Web server application used. Method of the incoming HTTP request (for example, Get, Put, Post, and Query). Physical name of the file that is retrieved or attempted to be retrieved by the request. Decoded and normalized under IIS. "Raw" (undecoded and not normalized) Request Line of the incoming HTTP request. Request Line is " CRLF". User name of the client making the request; only available if the request is authenticated. Client name or IP address of the computer where the HTTP request originated. The address contains three parts: host name: address: port number. Information about the Web server where the event is created (that's the machine where the client is installed) in the manner ::. The host name is the host variable from the HTTP header; it is left blank if not available. Number of bytes in the body of the message part of the query. The following rule would prevent a request to the web server that has "subject" in the query part of the HTTP request: Rule { tag "Sample7" Class Isapi Id 4001 level 1 query { Include "*subject*" } method { Include "GET" } Executable { Include "*"} user_name { Include "*" } directives isapi:request } For example, the GET request http://www.myserver.com/test/ abc.exe?subject=wildlife&environment=ocean would be prevented by this rule. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 115

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Advanced details
Some or all of the following parameters appear in the Advanced Details tab of security events
for the class Isapi. The values of these parameters can help you understand why a signature
is triggered.
Explanation
GUI name
Decoded and normalized location part of an incoming HTTP
request (the part before the ‘?’).
url
Decoded and normalized query part of an incoming HTTP
request (the part after the first ‘?’).
query
Type and version of the Web server application used.
web server type
Method of the incoming HTTP request (for example, Get,
Put, Post, and Query).
method
Physical name of the file that is retrieved or attempted to
be retrieved by the request. Decoded and normalized under
IIS.
local file
“Raw” (undecoded and not normalized) Request Line of
the incoming HTTP request. Request Line is “<method>
<location[?query]> <http version> CRLF”.
raw url
User name of the client making the request; only available
if the request is authenticated.
user
Client name or IP address of the computer where the HTTP
request originated. The address contains three parts: host
name: address: port number.
source
Information about the Web server where the event is
created (that’s the machine where the client is installed)
server
in the manner <host name>:<IP address>:<port>. The
host name is the host variable from the HTTP header; it
is left blank if not available.
Number of bytes in the body of the message part of the
query.
content len
The following rule would prevent a request to the web server that has “subject” in the query
part of the HTTP request:
Rule {
tag "Sample7"
Class Isapi
Id 4001
level 1
query { Include “*subject*” }
method { Include “GET” }
Executable { Include “*”}
user_name { Include “*” }
directives isapi:request
}
For example, the GET request http://www.myserver.com/test/
abc.exe?subject=wildlife&environment=ocean would be prevented by this rule.
Appendix A — Writing Custom Signatures and Exceptions
Windows custom signatures
115
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5