McAfee HISCDE-AB-IA Product Guide - Page 39

How IPS signatures work, Medium, Information, Host IPS signatures

Page 39 highlights

Configuring IPS Policies Define IPS protection • Marking an application as Trusted for IPS or Firewall takes precedence even if the same application is not marked as Trusted for that feature in another assigned Trusted Applications policy. How IPS signatures work Signatures describe security threats, attack methodologies, and network intrusions. Each signature has a default severity level, which describes the potential danger of an attack: • High - Signatures that protect against clearly identifiable security threats or malicious actions. Most of these signatures are specific to well-identified exploits and are mostly non-behavioral in nature. They should be prevented on every host. • Medium - Signatures that are behavioral in nature and deal with preventing applications from operating outside of their environment (relevant for clients protecting web servers and Microsoft SQL Server 2000). On critical servers, you might want to prevent those signatures after fine-tuning. • Low - Signatures that are behavioral in nature and shield applications. Shielding means locking down application and system resources so that they cannot be changed. Preventing these signatures increases the security of the underlying system, but requires additional fine-tuning. • Information - Indicates a modification to the system configuration that might create a benign security risk or an attempt to access sensitive system information. Events at this level occur during normal system activity and generally are not evidence of an attack. Types of signatures The IPS Rules policy can contain three types of signatures: • Host IPS signatures - Default host intrusion prevention signatures. • Custom IPS signatures - Custom host intrusion prevention signatures that you create. • Network IPS signatures - Default network intrusion prevention signatures. Host IPS signatures Host-based intrusion prevention signatures detect and prevent system operations activity attacks, and includes File, Registry, Service, and HTTP rules. They are developed by the Host Intrusion Prevention security experts and are delivered with the product and with content updates. Each signature has a description and a default severity level. With appropriate privilege levels, an administrator can modify the severity level of a signature. When triggered, host-based signatures generate an IPS event that appears in the Events tab of the Host IPS tab under Reporting. Custom IPS signatures Custom signatures are host-based signatures that you can create for protection beyond the default protection. For example, when you create a new folder with important files, you can create a custom signature to protect it. NOTE: You cannot create network-based custom signatures. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Marking an application as Trusted for IPS or Firewall takes precedence even if the same
application is not marked as Trusted for that feature in another assigned Trusted Applications
policy.
How IPS signatures work
Signatures describe security threats, attack methodologies, and network intrusions. Each
signature has a default severity level, which describes the potential danger of an attack:
High
— Signatures that protect against clearly identifiable security threats or malicious
actions. Most of these signatures are specific to well-identified exploits and are mostly
non-behavioral in nature. They should be prevented on every host.
Medium
— Signatures that are behavioral in nature and deal with preventing applications
from operating outside of their environment (relevant for clients protecting web servers and
Microsoft SQL Server 2000). On critical servers, you might want to prevent those signatures
after fine-tuning.
Low
— Signatures that are behavioral in nature and shield applications. Shielding means
locking down application and system resources so that they cannot be changed. Preventing
these signatures increases the security of the underlying system, but requires additional
fine-tuning.
Information
— Indicates a modification to the system configuration that might create a
benign security risk or an attempt to access sensitive system information. Events at this
level occur during normal system activity and generally are not evidence of an attack.
Types of signatures
The IPS Rules policy can contain three types of signatures:
Host IPS signatures
— Default host intrusion prevention signatures.
Custom IPS signatures
— Custom host intrusion prevention signatures that you create.
Network IPS signatures
— Default network intrusion prevention signatures.
Host IPS signatures
Host-based intrusion prevention signatures detect and prevent system operations activity attacks,
and includes File, Registry, Service, and HTTP rules. They are developed by the Host Intrusion
Prevention security experts and are delivered with the product and with content updates.
Each signature has a description and a default severity level. With appropriate privilege levels,
an administrator can modify the severity level of a signature.
When triggered, host-based signatures generate an IPS event that appears in the Events tab
of the Host IPS tab under Reporting.
Custom IPS signatures
Custom signatures are host-based signatures that you can create for protection beyond the
default protection. For example, when you create a new folder with important files, you can
create a custom signature to protect it.
NOTE:
You cannot create network-based custom signatures.
Configuring IPS Policies
Define IPS protection
39
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5