McAfee HISCDE-AB-IA Product Guide - Page 17

Configuring polices, the day-to-day work of users, adjust the severity to a lower level.

Page 17 highlights

Managing Your Protection Policy management • View the settings and owner of a policy • View assignments where policy enforcement is disabled To... Create a policy Edit a policy View a policy Rename a policy Duplicate a policy Delete a policy Do this... Click New Policy, name it, and edit the settings. Click Edit (only available for My Default or custom policies). Click View (only available for McAfee Default or preconfigured policies). Click Rename and change the name of the policy (not available for default or preconfigured policies). Click Duplicate, change the name of the policy, and edit the settings. Click Delete (not available for default or preconfigured policies). NOTE: When you delete a policy, all groups to which it is currently applied inherit the policy of this category from their parent. Before deleting a policy, look at all of the systems where it is assigned, and assign a different policy if you don't want the policy to inherit from the parent. If you delete a policy that is applied at the top level, the default policy of this category is applied. Assign a policy owner Export a policy Export all policies Import policies Click the owner of the policy and select another owner from a list (not available for default or preconfigured policies). Click Export, then name and save the policy (an XML file) to the desired location. Click Export all policies, then name and save the policy XML file to the desired location. Click Import at the top of the Policy Catalog page, select the policy XML file, then click OK. For details on any of these features, see the ePolicy Orchestrator documentation. Configuring polices After you install the Host Intrusion Prevention software, McAfee recommends that you configure policies to provide the greatest amount of security without conflicting with day-to-day activities. The default policies in Host Intrusion Prevention fit the broadest set of customer environments and might meet your needs. To tune policies to fit your particular setting, we recommend the following: • Carefully define your Host Intrusion Prevention security configuration. Evaluate who is responsible for configuring particular parts of the system and grant them appropriate permissions. • Change the default IPS Protection or Firewall Rules policies, which provide increasing levels of preset protection. • Modify severity levels of specific signatures. For example, when a signature is triggered by the day-to-day work of users, adjust the severity to a lower level. • Configure dashboards for a quick overview of compliance and issues. • Configure automatic responses to alert specific individuals when particular events occur. For example, a notification can be sent when an activity that triggers a High severity event occurs on a particular server. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

View the settings and owner of a policy
View assignments where policy enforcement is disabled
Do this...
To...
Click
New Policy
, name it, and edit the settings.
Create a policy
Click
Edit
(only available for My Default or custom policies).
Edit a policy
Click
View
(only available for McAfee Default or preconfigured policies).
View a policy
Click
Rename
and change the name of the policy (not available for default
or preconfigured policies).
Rename a policy
Click
Duplicate
, change the name of the policy, and edit the settings.
Duplicate a policy
Click
Delete
(not available for default or preconfigured policies).
NOTE:
When you delete a policy, all groups to which it is currently applied
inherit the policy of this category from their parent. Before deleting a policy,
Delete a policy
look at all of the systems where it is assigned, and assign a different policy
if you don’t want the policy to inherit from the parent. If you delete a policy
that is applied at the top level, the default policy of this category is applied.
Click the owner of the policy and select another owner from a list (not available
for default or preconfigured policies).
Assign a policy owner
Click
Export
, then name and save the policy (an XML file) to the desired
location.
Export a policy
Click
Export all policies
, then name and save the policy XML file to the
desired location.
Export all policies
Click
Import
at the top of the Policy Catalog page, select the policy XML file,
then click
OK
.
Import policies
For details on any of these features, see the ePolicy Orchestrator documentation.
Configuring polices
After you install the Host Intrusion Prevention software, McAfee recommends that you configure
policies to provide the greatest amount of security without conflicting with day-to-day activities.
The default policies in Host Intrusion Prevention fit the broadest set of customer environments
and might meet your needs. To tune policies to fit your particular setting, we recommend the
following:
Carefully define your Host Intrusion Prevention security configuration. Evaluate who is
responsible for configuring particular parts of the system and grant them appropriate
permissions.
Change the default IPS Protection or Firewall Rules policies, which provide increasing levels
of preset protection.
Modify severity levels of specific signatures. For example, when a signature is triggered by
the day-to-day work of users, adjust the severity to a lower level.
Configure dashboards for a quick overview of compliance and issues.
Configure automatic responses to alert specific individuals when particular events occur. For
example, a notification can be sent when an activity that triggers a High severity event
occurs on a particular server.
Managing Your Protection
Policy management
17
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5