Configuring the IPS Protection policy
..................................................
36
Define IPS protection
......................................................................
36
Configuring the IPS Rules policy
......................................................
37
Assigning multiple instances of the policy
...............................................
37
FAQ — Multiple-instance policies
......................................................
38
How IPS signatures work
............................................................
39
How IPS application protection rules work
..............................................
43
How IPS exceptions work
............................................................
46
Monitor IPS events
........................................................................
47
Managing IPS events
...............................................................
48
Creating an exception from an event
..................................................
49
Creating a trusted application from an event
............................................
50
Monitor IPS client rules
.....................................................................
50
Managing IPS client rules
............................................................
50
Configuring Firewall Policies
............................................................
52
Overview of Firewall policies
................................................................
52
How firewall rules work
.............................................................
53
How firewall rule groups work
.......................................................
55
How the Host IPS catalog works
......................................................
58
Firewall stateful packet filtering and inspection
..........................................
59
How learn and adaptive modes affect the firewall
........................................
63
Firewall client rules
.................................................................
64
Enable firewall protection
...................................................................
64
Configuring the Firewall Options policy
................................................
65
FAQ — McAfee TrustedSource and the firewall
...........................................
66
Define firewall protection
...................................................................
67
Configuring the Firewall Rules policy
...................................................
68
Creating and editing firewall rules
....................................................
69
Creating and editing firewall rule groups
...............................................
69
Creating connection isolation groups
...................................................
70
Blocking DNS traffic
................................................................
70
Using the Host IPS catalog
...........................................................
70
Managing firewall client rules
.........................................................
71
FAQ — Use of wildcards in Firewall Rules
...............................................
72
Configuring General Policies
............................................................
73
Overview of General policies
................................................................
73
Define client functionality
...................................................................
74
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
4
Contents