McAfee HISCDE-AB-IA Product Guide - Page 43

How IPS application protection rules work, Which wildcards can I use for all other values?

Page 43 highlights

Configuring IPS Policies Define IPS protection Which wildcards can I use for all other values? For values that normally do not contain path information with slashes, use these wildcards; Character ? (question mark) * (one asterisk) | (pipe) Definition A single character. Multiple characters, including / and \ . Wildcard escape. Which wildcards can I use for signature expert subrule values? For all values when creating a subrule using the expert method: Character ? (question mark) * (one asterisk) & (ampersand) ! (exclamation point) Definition A single character. Multiple characters, including / and \. Example: files { Include "C:\*.txt" " } Multiple characters except / and \. Use to match the root-level contents of a folder but not any subfolders. Example: files { Include "C:\test\\&.txt" } Wildcard escape. Example: files { Include "C:\test\\yahoo!.txt" } How IPS application protection rules work Application protection rules control which processes receive generic buffer overflow protection from Host Intrusion Prevention. These rules permit or block user-level API hooking for defined and generated lists of processes. Kernel-level file and registry hooking are not affected. Only processes in the list with the inclusion status of included receive the buffer overflow protection. Host Intrusion Prevention provides a static list of processes that are permitted or blocked. This list is updated with content update releases that apply in the McAfee Default IPS Rules policy. In addition, processes that are permitted to hook are added dynamically to the list when process analysis is enabled. This analysis is performed under these circumstances: • Each time the client is started and running processes are enumerated. • Each time a process starts. • Each time the application protection list is updated by the ePolicy Orchestrator server. • Each time the list of processes that listen on a network port is updated. NOTE: For the dynamic update of the list, the IPS Options policy option to "automatically include network-facing and service-based applications in the application protection list" must be selected. This option implicitly includes all Windows services and applications that listen on network ports. This analysis involves checking first if the process is excluded from the Application Protection list. If not, it checks whether the process is included in the Application Protection list. If not, the process is analyzed to see if it listens on a network port or runs as a service. If not, hooking McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 43

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Which wildcards can I use for all other values?
For values that normally do not contain path information with slashes, use these wildcards;
Definition
Character
A single character.
? (question mark)
Multiple characters, including / and \ .
* (one asterisk)
Wildcard escape.
| (pipe)
Which wildcards can I use for signature expert subrule values?
For all values when creating a subrule using the expert method:
Definition
Character
A single character.
? (question mark)
Multiple characters, including / and \. Example:
files {
Include “C:\*.txt” ” }
* (one asterisk)
Multiple characters except / and \. Use to match the
root-level contents of a folder but not any subfolders.
Example:
files { Include “C:\test\\&.txt” }
& (ampersand)
Wildcard escape. Example:
files { Include
“C:\test\\yahoo!.txt” }
! (exclamation point)
How IPS application protection rules work
Application protection rules control which processes receive generic buffer overflow protection
from Host Intrusion Prevention. These rules permit or block user-level API hooking for defined
and generated lists of processes. Kernel-level file and registry hooking are not affected. Only
processes in the list with the inclusion status of
included
receive the buffer overflow protection.
Host Intrusion Prevention provides a static list of processes that are permitted or blocked. This
list is updated with content update releases that apply in the McAfee Default IPS Rules policy.
In addition, processes that are permitted to hook are added dynamically to the list when process
analysis is enabled. This analysis is performed under these circumstances:
Each time the client is started and running processes are enumerated.
Each time a process starts.
Each time the application protection list is updated by the ePolicy Orchestrator server.
Each time the list of processes that listen on a network port is updated.
NOTE:
For the dynamic update of the list, the IPS Options policy option to "automatically include
network-facing and service-based applications in the application protection list" must be selected.
This option implicitly includes all Windows services and applications that listen on network ports.
This analysis involves checking first if the process is excluded from the Application Protection
list. If not, it checks whether the process is included in the Application Protection list. If not,
the process is analyzed to see if it listens on a network port or runs as a service. If not, hooking
Configuring IPS Policies
Define IPS protection
43
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5