Contents
Introducing Host Intrusion Prevention
..................................................
7
Host IPS protection
.........................................................................
7
Host IPS policies
...........................................................................
8
Host IPS policy management
.................................................................
9
Host IPS policy tracking and tuning
...........................................................
10
Managing Your Protection
...............................................................
12
Information management
...................................................................
12
Host IPS dashboards
...............................................................
12
Host IPS queries
...................................................................
13
Policy management
........................................................................
16
Where to find policies
...............................................................
16
Configuring polices
.................................................................
17
Default protection and tuning
........................................................
18
Host IPS policy migration
............................................................
22
System
management
......................................................................
23
Host IPS permission sets
............................................................
23
Host IPS server tasks
...............................................................
25
Host IPS event responses
............................................................
26
Host IPS protection updates
.........................................................
27
Configuring IPS Policies
..................................................................
29
Overview of IPS policies
....................................................................
29
Methods for delivery of IPS protection
.................................................
30
Signatures
........................................................................
31
Behavioral rules
....................................................................
32
Reactions
.........................................................................
32
Exceptions
........................................................................
32
Application protection rules
..........................................................
33
Events
...........................................................................
33
Enable IPS protection
......................................................................
33
Configuring the IPS Options policy
....................................................
34
Set the reaction for IPS signatures
...........................................................
35
3
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5