McAfee HISCDE-AB-IA Product Guide - Page 3

Contents, Introducing Host Intrusion Prevention, Managing Your Protection, Configuring IPS Policies

Page 3 highlights

Contents Introducing Host Intrusion Prevention 7 Host IPS protection 7 Host IPS policies 8 Host IPS policy management 9 Host IPS policy tracking and tuning 10 Managing Your Protection 12 Information management 12 Host IPS dashboards 12 Host IPS queries 13 Policy management 16 Where to find policies 16 Configuring polices 17 Default protection and tuning 18 Host IPS policy migration 22 System management 23 Host IPS permission sets 23 Host IPS server tasks 25 Host IPS event responses 26 Host IPS protection updates 27 Configuring IPS Policies 29 Overview of IPS policies 29 Methods for delivery of IPS protection 30 Signatures 31 Behavioral rules 32 Reactions 32 Exceptions 32 Application protection rules 33 Events 33 Enable IPS protection 33 Configuring the IPS Options policy 34 Set the reaction for IPS signatures 35 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Contents
Introducing Host Intrusion Prevention
..................................................
7
Host IPS protection
.........................................................................
7
Host IPS policies
...........................................................................
8
Host IPS policy management
.................................................................
9
Host IPS policy tracking and tuning
...........................................................
10
Managing Your Protection
...............................................................
12
Information management
...................................................................
12
Host IPS dashboards
...............................................................
12
Host IPS queries
...................................................................
13
Policy management
........................................................................
16
Where to find policies
...............................................................
16
Configuring polices
.................................................................
17
Default protection and tuning
........................................................
18
Host IPS policy migration
............................................................
22
System
management
......................................................................
23
Host IPS permission sets
............................................................
23
Host IPS server tasks
...............................................................
25
Host IPS event responses
............................................................
26
Host IPS protection updates
.........................................................
27
Configuring IPS Policies
..................................................................
29
Overview of IPS policies
....................................................................
29
Methods for delivery of IPS protection
.................................................
30
Signatures
........................................................................
31
Behavioral rules
....................................................................
32
Reactions
.........................................................................
32
Exceptions
........................................................................
32
Application protection rules
..........................................................
33
Events
...........................................................................
33
Enable IPS protection
......................................................................
33
Configuring the IPS Options policy
....................................................
34
Set the reaction for IPS signatures
...........................................................
35
3
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5