McAfee HISCDE-AB-IA Product Guide - Page 41

Creating custom signatures, Signatures, IPS Signature, Description, IPS Event, Subrules

Page 41 highlights

Configuring IPS Policies Define IPS protection To... Add a signature Delete a custom signature Copy a signature to another policy Do this... Multiple. In the page that appears, select the settings for the three editable items, then click OK . Click New or New (Wizard). Under Actions, click Delete. NOTE: Only custom signatures can be deleted. Select a signature and click Copy To to copy it to another policy. Indicate the policy to which to copy the signature and click OK. NOTE: You can copy several signatures at one time by selecting all the signatures before clicking Copy To. 4 Click Save to save any changes. Creating custom signatures Create custom host intrusion prevention signatures from the Signatures tab of the IPS Rules policy to protect specific operations not covered by default signatures. Task For option definitions, click ? in the interface. 1 On the IPS Rules policy Signatures tab, click New. A blank Signature page appears. 2 On the signature's IPS Signature tab, type a name (required) and select the platform, severity level, log status, and whether to allow the creation of client rules. For severity level, client rules, and log status, select the checkbox to change the default values. 3 On the Description tab, type a description of what the signature is protecting. This description appears in the IPS Event when the signature is triggered. 4 On the Subrules tab, select New Standard Sub-Rule or New Expert Subrule to create a rule. Standard method Expert method The Standard method limits the number of types you can include in the signature rule. The Expert method, recommended only for advanced users, enables you to provide the rule syntax without limiting the number of types you can include in the signature. Before writing a rule, make sure you understand rule syntax. 1 Type a name for the signature (required) and 1 Type the rule syntax for the signatures, which choose a rule class type. Options include: Files, can include a name for the rule. Use ANSI Hook, HTTP, Program, Registry, Services, and format and TCL syntax. SQL. 2 Click OK and the rule is added to the list at the 2 Specify the class operations that are blocked top of the Subrule tab. The rule is compiled and and will trigger the signature. the syntax is verified. If the rule fails verification, 3 Indicate whether to include or exclude a particular parameter, what the parameter is and a dialog box describing the error appears. Fix the error and verify the rule again. its value. 4 Include an executable as a parameter with information on at least one of these four values: McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 41

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Do this...
To...
Multiple
. In the page that appears, select the settings
for the three editable items, then click
OK
.
Click
New
or
New (Wizard)
.
Add a signature
Under
Actions
, click
Delete
.
NOTE:
Only custom signatures can be deleted.
Delete a custom signature
Select a signature and click
Copy To
to copy it to
another policy. Indicate the policy to which to copy the
signature and click
OK
.
NOTE:
You can copy several signatures at one time by
selecting all the signatures before clicking
Copy To
.
Copy a signature to another policy
4
Click
Save
to save any changes.
Creating custom signatures
Create custom host intrusion prevention signatures from the Signatures tab of the IPS Rules
policy to protect specific operations not covered by default signatures.
Task
For option definitions, click
?
in the interface.
1
On the IPS Rules policy
Signatures
tab, click
New
. A blank
Signature
page appears.
2
On the signature’s
IPS Signature
tab, type a name (required) and select the platform,
severity level, log status, and whether to allow the creation of client rules. For severity
level, client rules, and log status, select the checkbox to change the default values.
3
On the
Description
tab, type a description of what the signature is protecting. This
description appears in the
IPS Event
when the signature is triggered.
4
On the
Subrules
tab, select
New Standard Sub-Rule
or
New Expert Subrule
to create
a rule.
Expert method
Standard method
The Expert method, recommended only for advanced
users, enables you to provide the rule syntax without
The Standard method limits the number of types you
can include in the signature rule.
limiting the number of types you can include in the
signature. Before writing a rule, make sure you
understand rule syntax.
1
Type the rule syntax for the signatures, which
can include a name for the rule. Use ANSI
format and TCL syntax.
1
Type a name for the signature (required) and
choose a rule class type. Options include: Files,
Hook, HTTP, Program, Registry, Services, and
SQL.
2
Click
OK
and the rule is added to the list at the
top of the Subrule tab. The rule is compiled and
2
Specify the class operations that are
blocked
and will trigger the signature.
the syntax is verified. If the rule fails verification,
a dialog box describing the error appears. Fix
the error and verify the rule again.
3
Indicate whether to include or exclude a
particular parameter, what the parameter is and
its value.
4
Include an executable as a parameter with
information on at least one of these four values:
Configuring IPS Policies
Define IPS protection
41
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5