McAfee HISCDE-AB-IA Product Guide - Page 22

Host IPS policy migration, Automation

Page 22 highlights

Managing Your Protection Policy management • The applied Firewall Rules policy has a location-aware group with connection isolation enabled, an active network interface card (NIC) matches the group, and the packet is sent or received on a NIC that does not match the group. • The packet is not TCP, user datagram protocol (UDP), or ICMP . • More than one user is logged on to the system, or no user is logged on to the system. Are there other limitations? • IPS might fail to detect the user associated with some client rules (displayed as "domain unknown/user unknown" in the client rule on ePolicy Orchestrator). Exceptions can still be created with these client rules, but they apply to all users. • Some incoming TCP connections such as remote desktop or Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) might require multiple attempts to create a firewall rule. Host IPS policy migration You cannot use McAfee Host Intrusion Prevention version 6.1 or 7.0 policies with version 8.0 clients without first migrating version 6.1 or 7.0 policies to version 8.0 format. Host Intrusion Prevention 8.0 provides an easy means to migrate policies with the ePolicy Orchestrator Host IPS Policy Migration feature under Automation. This migration involves translating and moving policies. After the policy is migrated it appears under the Policy Catalog's corresponding Host IPS 8.0 product feature and category with [6.1] or [7.0] following the name of the policy. All policies are translated and migrated to corresponding version 8.0 policies, except for the following: • Application Blocking Options policies are not migrated (these policies were removed in version 8.0). • Application Blocking Rules policies are migrated into IPS Rules policies named Application Hooking and Invocation Protection [6.1 or 7.0] (these policies were removed in version 8.0). After these policies are migrated into IPS Rules policies, their Application Protection Rules list is blank, and the Exceptions list contains exceptions for all default trusted application set to "Trusted for Application Hooking." To use this migrated policy you must also assign the My Default IPS Rules policy in a multiple-policy instance setting, as it contains the latest application protection list through content updates. NOTE: Applications for which hooking is blocked in Application Blocking Rules policies are not migrated and need to be manually added to the Application Protection Rules in the IPS Rules policy after migration. Also, if you migrate a Trusted Applications policy with applications marked "Trusted for application hooking" to version 8.0, you must create an exception for that application in signature 6010 (Generic Application Hooking Protection)in a Host IPS Rules policy to preserve the application hooking protection. • Firewall Quarantine Options policies are not migrated (these policies were removed in version 8.0). • Firewall Quarantine Rules policies are not migrated (these policies were removed in version 8.0). • IPS Client Rules and Firewall Client Rules are not migrated. NOTE: Policy assignments are carried over during migration. If inheritance is broken at a particular location in the System Tree, the assignment is not overwritten, but inheritance may be broken at other points of the System Tree, as migrated assignments are merged. Always review policy assignment after migrating policies. 22 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

The applied Firewall Rules policy has a location-aware group with connection isolation
enabled, an active network interface card (NIC) matches the group, and the packet is sent
or received on a NIC that does not match the group.
The packet is not TCP, user datagram protocol (UDP), or ICMP .
More than one user is logged on to the system, or no user is logged on to the system.
Are there other limitations?
IPS might fail to detect the user associated with some client rules (displayed as "domain
unknown/user unknown" in the client rule on ePolicy Orchestrator). Exceptions can still be
created with these client rules, but they apply to all users.
Some incoming TCP connections such as remote desktop or Hypertext Transfer Protocol
over Secure Socket Layer (HTTPS) might require multiple attempts to create a firewall rule.
Host IPS policy migration
You cannot use McAfee Host Intrusion Prevention version 6.1 or 7.0 policies with version 8.0
clients without first migrating version 6.1 or 7.0 policies to version 8.0 format. Host Intrusion
Prevention 8.0 provides an easy means to migrate policies with the ePolicy Orchestrator
Host
IPS Policy Migration
feature under
Automation
. This migration involves translating and
moving policies. After the policy is migrated it appears under the Policy Catalog's corresponding
Host IPS 8.0 product feature and category with
[6.1]
or
[7.0]
following the name of the policy.
All policies are translated and migrated to corresponding version 8.0 policies, except for the
following:
Application Blocking Options policies are not migrated (these policies were removed in version
8.0).
Application Blocking Rules policies are migrated into IPS Rules policies named Application
Hooking and Invocation Protection <name> [6.1 or 7.0] (these policies were removed in
version 8.0). After these policies are migrated into IPS Rules policies, their Application
Protection Rules list is blank, and the Exceptions list contains exceptions for all default trusted
application set to "Trusted for Application Hooking." To use this migrated policy you must
also assign the My Default IPS Rules policy in a multiple-policy instance setting, as it contains
the latest application protection list through content updates.
NOTE:
Applications for which hooking is blocked in Application Blocking Rules policies are
not migrated and need to be manually added to the Application Protection Rules in the IPS
Rules policy after migration. Also, if you migrate a Trusted Applications policy with applications
marked "Trusted for application hooking" to version 8.0, you must create an exception for
that application in signature 6010 (Generic Application Hooking Protection)in a Host IPS
Rules policy to preserve the application hooking protection.
Firewall Quarantine Options policies are not migrated (these policies were removed in version
8.0).
Firewall Quarantine Rules policies are not migrated (these policies were removed in version
8.0).
IPS Client Rules and Firewall Client Rules are not migrated.
NOTE:
Policy assignments are carried over during migration. If inheritance is broken at a
particular location in the System Tree, the assignment is not overwritten, but inheritance may
be broken at other points of the System Tree, as migrated assignments are merged. Always
review policy assignment after migrating policies.
Managing Your Protection
Policy management
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
22