McAfee HISCDE-AB-IA Product Guide - Page 4

Configuring Firewall Policies - state

Page 4 highlights

Contents Configuring the IPS Protection policy 36 Define IPS protection 36 Configuring the IPS Rules policy 37 Assigning multiple instances of the policy 37 FAQ - Multiple-instance policies 38 How IPS signatures work 39 How IPS application protection rules work 43 How IPS exceptions work 46 Monitor IPS events 47 Managing IPS events 48 Creating an exception from an event 49 Creating a trusted application from an event 50 Monitor IPS client rules 50 Managing IPS client rules 50 Configuring Firewall Policies 52 Overview of Firewall policies 52 How firewall rules work 53 How firewall rule groups work 55 How the Host IPS catalog works 58 Firewall stateful packet filtering and inspection 59 How learn and adaptive modes affect the firewall 63 Firewall client rules 64 Enable firewall protection 64 Configuring the Firewall Options policy 65 FAQ - McAfee TrustedSource and the firewall 66 Define firewall protection 67 Configuring the Firewall Rules policy 68 Creating and editing firewall rules 69 Creating and editing firewall rule groups 69 Creating connection isolation groups 70 Blocking DNS traffic 70 Using the Host IPS catalog 70 Managing firewall client rules 71 FAQ - Use of wildcards in Firewall Rules 72 Configuring General Policies 73 Overview of General policies 73 Define client functionality 74 4 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Configuring the IPS Protection policy
..................................................
36
Define IPS protection
......................................................................
36
Configuring the IPS Rules policy
......................................................
37
Assigning multiple instances of the policy
...............................................
37
FAQ — Multiple-instance policies
......................................................
38
How IPS signatures work
............................................................
39
How IPS application protection rules work
..............................................
43
How IPS exceptions work
............................................................
46
Monitor IPS events
........................................................................
47
Managing IPS events
...............................................................
48
Creating an exception from an event
..................................................
49
Creating a trusted application from an event
............................................
50
Monitor IPS client rules
.....................................................................
50
Managing IPS client rules
............................................................
50
Configuring Firewall Policies
............................................................
52
Overview of Firewall policies
................................................................
52
How firewall rules work
.............................................................
53
How firewall rule groups work
.......................................................
55
How the Host IPS catalog works
......................................................
58
Firewall stateful packet filtering and inspection
..........................................
59
How learn and adaptive modes affect the firewall
........................................
63
Firewall client rules
.................................................................
64
Enable firewall protection
...................................................................
64
Configuring the Firewall Options policy
................................................
65
FAQ — McAfee TrustedSource and the firewall
...........................................
66
Define firewall protection
...................................................................
67
Configuring the Firewall Rules policy
...................................................
68
Creating and editing firewall rules
....................................................
69
Creating and editing firewall rule groups
...............................................
69
Creating connection isolation groups
...................................................
70
Blocking DNS traffic
................................................................
70
Using the Host IPS catalog
...........................................................
70
Managing firewall client rules
.........................................................
71
FAQ — Use of wildcards in Firewall Rules
...............................................
72
Configuring General Policies
............................................................
73
Overview of General policies
................................................................
73
Define client functionality
...................................................................
74
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
4
Contents