McAfee HISCDE-AB-IA Product Guide - Page 21

FAQ — Adaptive mode, With IPS, With the firewall

Page 21 highlights

Managing Your Protection Policy management FAQ - Adaptive mode Adaptive mode is a setting you can apply to the IPS and firewall features when testing rollouts of new policies. It allows the Host Intrusion Prevention client to automatically create rules to allow activity while preserving minimum protection from vulnerabilities. The following questions and answers should help you in using this feature. How do you turn on adaptive mode? You turn on adaptive mode by enabling this option in the IPS Options or Firewall Options policy and applying this policy to the Host Intrusion Prevention client. How does adaptive mode work differently with IPS and Firewall? With IPS, the adaptive mode creates client-side rules that are exceptions to existing IPS signatures. With the firewall, the adaptive mode creates client-side rules to allow network packets not covered by existing firewall rules. IPS client exceptions are created on a per-user, per-process, per-signature basis and are path-based only. Firewall client rules are created on a per-process basis and the processes associated with firewall client rules are based on path, file description, digital signature, and MD5 hash. When is a rule not created automatically with adaptive mode? With IPS: • The signature in the effective IPS Rules policy does not allow a client rule to be created. (This setting is standard for most high-severity IPS signatures. These signatures are tuned to detect and prevent the most severe threats to your systems, so it is unlikely that normal business activity would require an automated exception.) • The reaction to the signature is "Ignore." • The associated action triggers a network IPS signature. • A user attempts to stop the McAfee Host IPS service, regardless of the client rule setting for service self-protection in signature 1000. • There is already an exception, which excludes the operation in question, in an applied IPS Rules policy. • The process associated with the action is trusted for IPS in an applied Trusted Applications policy, and the signature is not excluded from Trusted Applications. With the firewall: • There is no application associated with the packet when examined in the client activity log. Some of the most common examples include: • Incoming requests for services that are not running, such as file transfer protocol (FTP) or Telnet. • Incoming Internet Control Message Protocol (ICMP), such as an echo request. • Incoming or outgoing ICMP on the Microsoft Windows Vista operating system. • Transmission Control Protocol (TCP) packets to port 139 (NetBIOS SSN) or 445 (MSDS), which might be required for Windows file sharing. • Internet Protocol Security (IPsec) packets associated with virtual private network (VPN) client solutions. • There is already a rule in the applied Firewall Rules policy that blocks or allows the packet. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

FAQ — Adaptive mode
Adaptive mode is a setting you can apply to the IPS and firewall features when testing rollouts
of new policies. It allows the Host Intrusion Prevention client to automatically create rules to
allow activity while preserving minimum protection from vulnerabilities. The following questions
and answers should help you in using this feature.
How do you turn on adaptive mode?
You turn on adaptive mode by enabling this option in the IPS Options or Firewall Options policy
and applying this policy to the Host Intrusion Prevention client.
How does adaptive mode work differently with IPS and Firewall?
With IPS, the adaptive mode creates client-side rules that are exceptions to existing IPS
signatures. With the firewall, the adaptive mode creates client-side rules to allow network
packets not covered by existing firewall rules.
IPS client exceptions are created on a per-user, per-process, per-signature basis and are
path-based only. Firewall client rules are created on a per-process basis and the processes
associated with firewall client rules are based on path, file description, digital signature, and
MD5 hash.
When is a rule not created automatically with adaptive mode?
With IPS
:
The signature in the effective IPS Rules policy does not allow a client rule to be created.
(This setting is standard for most high-severity IPS signatures. These signatures are tuned
to detect and prevent the most severe threats to your systems, so it is unlikely that normal
business activity would require an automated exception.)
The reaction to the signature is "Ignore."
The associated action triggers a network IPS signature.
A user attempts to stop the McAfee Host IPS service, regardless of the client rule setting for
service self-protection in signature 1000.
There is already an exception, which excludes the operation in question, in an applied IPS
Rules policy.
The process associated with the action is trusted for IPS in an applied Trusted Applications
policy, and the signature is not excluded from Trusted Applications.
With the firewall
:
There is no application associated with the packet when examined in the client activity log.
Some of the most common examples include:
Incoming requests for services that are not running, such as file transfer protocol (FTP)
or Telnet.
Incoming Internet Control Message Protocol (ICMP), such as an echo request.
Incoming or outgoing ICMP on the Microsoft Windows Vista operating system.
Transmission Control Protocol (TCP) packets to port 139 (NetBIOS SSN) or 445 (MSDS),
which might be required for Windows file sharing.
Internet Protocol Security (IPsec) packets associated with virtual private network (VPN)
client solutions.
There is already a rule in the applied Firewall Rules policy that blocks or allows the packet.
Managing Your Protection
Policy management
21
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5