McAfee HISCDE-AB-IA Product Guide - Page 29

Configuring IPS Policies, Overview of IPS policies

Page 29 highlights

Configuring IPS Policies IPS policies turn host intrusion prevention protection on and off, set the reaction level to events, and provide protection through the application of exceptions, signatures, and application protection rules. IPS protection is kept up-to-date with monthly content updates that contain new and revised signatures and application protection rules. Contents Overview of IPS policies Enable IPS protection Set the reaction for IPS signatures Define IPS protection Monitor IPS events Monitor IPS client rules Overview of IPS policies The IPS (Intrusion Prevention System) feature monitors all system (kernel-level) and API (user-level) calls and blocks those that might result in malicious activity. Host Intrusion Prevention determines which process is using a call, the security context in which the process runs, and the resource being accessed. A kernel-level driver, which receives redirected entries in the user-mode system call table, monitors the system call chain. When calls are made, the driver compares the call request against a database of combined signatures and behavioral rules to determine whether to allow, block, or log an action. This hybrid method detects most known attacks as well as previously unknown or zero-day attacks. Protection also comes from exceptions, which override signatures that block legitimate activity, and application protection rules, which describe which processes to protect. Available policies There are three IPS policies: IPS Options - Enables IPS protection by turning on and off host and network IPS protection and applying options specific to Windows systems. IPS Protection - Tells the system how to react (block, ignore, log) when signatures of a specific severity (high, medium, low) are triggered. IPS Rules - Defines IPS protection by applying signatures and behavioral analysis to protect against known and zero-day attacks. Exceptions, which override signatures that block legitimate activity, and application protection rules, which indicate which processes to protect, complement the signatures. Like the Trusted Applications policy, this policy category can contain multiple policy instances. Content updates provide new and updated signatures and application protection rules to keep protection current. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Configuring IPS Policies
IPS policies turn host intrusion prevention protection on and off, set the reaction level to events,
and provide protection through the application of exceptions, signatures, and application
protection rules. IPS protection is kept up-to-date with monthly content updates that contain
new and revised signatures and application protection rules.
Contents
Overview of IPS policies
Enable IPS protection
Set the reaction for IPS signatures
Define IPS protection
Monitor IPS events
Monitor IPS client rules
Overview of IPS policies
The IPS (Intrusion Prevention System) feature monitors all system (kernel-level) and API
(user-level) calls and blocks those that might result in malicious activity.
Host Intrusion Prevention determines which process is using a call, the security context in which
the process runs, and the resource being accessed. A kernel-level driver, which receives
redirected entries in the user-mode system call table, monitors the system call chain. When
calls are made, the driver compares the call request against a database of combined signatures
and behavioral rules to determine whether to allow, block, or log an action. This hybrid method
detects most known attacks as well as previously unknown or zero-day attacks.
Protection also comes from exceptions, which override signatures that block legitimate activity,
and application protection rules, which describe which processes to protect.
Available policies
There are three IPS policies:
IPS Options
— Enables IPS protection by turning on and off host and network IPS protection
and applying options specific to Windows systems.
IPS Protection
— Tells the system how to react (block, ignore, log) when signatures of a
specific severity (high, medium, low) are triggered.
IPS Rules
— Defines IPS protection by applying signatures and behavioral analysis to protect
against known and zero-day attacks. Exceptions, which override signatures that block legitimate
activity, and application protection rules, which indicate which processes to protect, complement
the signatures. Like the
Trusted Applications
policy, this policy category can contain multiple
policy instances. Content updates provide new and updated signatures and application protection
rules to keep protection current.
29
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5