McAfee HISCDE-AB-IA Product Guide - Page 153

General policies, Host IPS and, Network IPS and IP addresses

Page 153 highlights

Index Policy Catalog (continued) Trusted Applications 78 Trusted Networks 77 policy enforcement Host IPS 9 Host IPS clients and ePO 7 Linux client and 97 Solaris client and 94 policy management accessing Host IPS policies 16 analyzing Host IPS events and client rules 16 Linux client and 97 Policies tab, Host IPS 16 tracking Host IPS policies 10 tuning Host IPS 10, 18 ports blocked traffic and firewall rules 63 connections and firewall alerts 87 firewall and state table entries 60 FTP connections and stateful packet inspection 61 precedence firewall rules list 53 General policies, Host IPS and 73 Network IPS and IP addresses 78 Trusted Networks policy 78 preconfigured policies Client UI 74 Firewall Rules 67 IPS Options 33 IPS Protection 35 Trusted Applications 78 Trusted Networks 77 protocols tracking, and stateful firewall 62 Q queries, Host IPS custom, parameters for 13 managing information 12 predefined and custom 13 reports 10 tracking activities 13 R reactions about 32 firewall alerts, responding to 87 intrusion alerts, responding to 86 IPS Protection, configuring 35 mapping to IPS severity 10 setting, for signature severity levels 36 spoof detected alerts, responding to 87 types of 32 rule groups, Host IPS firewall rule groups, creating 69 rule structure custom signatures 101 rules lists exceptions for Host IPS 88 firewall rules for Host IPS 90 S server tasks, Host IPS checking in updates 27 server tasks, Host IPS (continued) Export Policies 25 Export Queries 25 managing deployment 23, 25 Property Translator 25 Purge Event Log 25 Purge Threat Event Log 25 Repository Pull 25 Run Query 25 severity levels, IPS events and 47 IPS Protection policy 35 mapping to a reaction 10 setting and tuning protection 18 setting reactions for 36 tuning 10, 17 working with signatures 39 shielding and enveloping IPS behavioral rules and 32 signature security levels types of 39 signatures alerts and NIPS signatures 86 configuring IPS Rules policy 40 creating custom host IPS 41 creating with expert method 41 creating with standard method 41 custom 39 default host IPS 39 defined 31 exception rules list 88 exceptions 32 HIPS, about 31 host 39 host IP, and exceptions 86 IPS Rules policy 36 network 39 NIPS, about 31 severity levels 39 severity levels for 35 tuning Host IPS policies 10 types of 39 using the wizard to create 42 working with 39 Solaris client installation files 96 overview 94 policy enforcement 94 preventing buffer overflow 94 stopping and restarting 96 troubleshooting 95 verifying client is running 96 Spoof Detected alerts 87 state table, firewall functionality 60 overview 60 stateful firewall how stateful filtering works 60 packet inspection, how it works 61 protocol tracking 62 system call interception 30 system management automatic responses for Host IPS events 26 server tasks for Host IPS 23, 25 updating Host IPS protection 27 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 153

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Policy Catalog
(continued)
Trusted Applications
78
Trusted Networks
77
policy enforcement
Host IPS
9
Host IPS clients and ePO
7
Linux client and
97
Solaris client and
94
policy management
accessing Host IPS policies
16
analyzing Host IPS events and client rules
16
Linux client and
97
Policies tab, Host IPS
16
tracking Host IPS policies
10
tuning Host IPS
10
,
18
ports
blocked traffic and firewall rules
63
connections and firewall alerts
87
firewall and state table entries
60
FTP connections and stateful packet inspection
61
precedence
firewall rules list
53
General policies, Host IPS and
73
Network IPS and IP addresses
78
Trusted Networks policy
78
preconfigured policies
Client UI
74
Firewall Rules
67
IPS Options
33
IPS Protection
35
Trusted Applications
78
Trusted Networks
77
protocols
tracking, and stateful firewall
62
Q
queries, Host IPS
custom, parameters for
13
managing information
12
predefined and custom
13
reports
10
tracking activities
13
R
reactions
about
32
firewall alerts, responding to
87
intrusion alerts, responding to
86
IPS Protection, configuring
35
mapping to IPS severity
10
setting, for signature severity levels
36
spoof detected alerts, responding to
87
types of
32
rule groups, Host IPS
firewall rule groups, creating
69
rule structure
custom signatures
101
rules lists
exceptions for Host IPS
88
firewall rules for Host IPS
90
S
server tasks, Host IPS
checking in updates
27
server tasks, Host IPS
(continued)
Export Policies
25
Export Queries
25
managing deployment
23
,
25
Property Translator
25
Purge Event Log
25
Purge Threat Event Log
25
Repository Pull
25
Run Query
25
severity levels, IPS
events and
47
IPS Protection policy
35
mapping to a reaction
10
setting and tuning protection
18
setting reactions for
36
tuning
10
,
17
working with signatures
39
shielding and enveloping
IPS behavioral rules and
32
signature security levels
types of
39
signatures
alerts and NIPS signatures
86
configuring IPS Rules policy
40
creating custom host IPS
41
creating with expert method
41
creating with standard method
41
custom
39
default host IPS
39
defined
31
exception rules list
88
exceptions
32
HIPS, about
31
host
39
host IP, and exceptions
86
IPS Rules policy
36
network
39
NIPS, about
31
severity levels
39
severity levels for
35
tuning Host IPS policies
10
types of
39
using the wizard to create
42
working with
39
Solaris client
installation files
96
overview
94
policy enforcement
94
preventing buffer overflow
94
stopping and restarting
96
troubleshooting
95
verifying client is running
96
Spoof Detected alerts
87
state table, firewall
functionality
60
overview
60
stateful firewall
how stateful filtering works
60
packet inspection, how it works
61
protocol tracking
62
system call interception
30
system management
automatic responses for Host IPS events
26
server tasks for Host IPS
23
,
25
updating Host IPS protection
27
Index
153
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5