McAfee HISCDE-AB-IA Product Guide - Page 44

Application Protection Rules analysis

Page 44 highlights

Configuring IPS Policies Define IPS protection is blocked and the process is not protected; if it listens on a port or runs as a service, hooking is permitted and the process is protected. Figure 1: Application Protection Rules analysis The IPS component maintains an information cache on running processes, which tracks hooking information. The firewall component determines if a process listens on a network port, calls an API exported by the IPS component, and passes the information to the API to be added to the monitored list. When the API is called, the IPS component locates the corresponding entry in its running processes list. A process that is not already hooked and is not part of the static block list is then hooked. The firewall provides the PID (Process ID), which is the key for the cache lookup of a process. The API exported by the IPS component also allows the client user interface to retrieve the list of currently hooked processes, which is updated whenever a process is hooked or unhooked. A hooked process becomes unhooked if the server sends an updated process list that specifies that the already hooked process should no longer be hooked. When the process hooking list is 44 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

is blocked and the process is not protected; if it listens on a port or runs as a service, hooking
is permitted and the process is protected.
Figure 1: Application Protection Rules analysis
The IPS component maintains an information cache on running processes, which tracks hooking
information. The firewall component determines if a process listens on a network port, calls an
API exported by the IPS component, and passes the information to the API to be added to the
monitored list. When the API is called, the IPS component locates the corresponding entry in
its running processes list. A process that is not already hooked and is not part of the static block
list is then hooked. The firewall provides the PID (Process ID), which is the key for the cache
lookup of a process.
The API exported by the IPS component also allows the client user interface to retrieve the list
of currently hooked processes, which is updated whenever a process is hooked or unhooked.
A hooked process becomes unhooked if the server sends an updated process list that specifies
that the already hooked process should no longer be hooked. When the process hooking list is
Configuring IPS Policies
Define IPS protection
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
44