McAfee HISCDE-AB-IA Product Guide - Page 47

Creating exception rules, Monitor IPS events

Page 47 highlights

Configuring IPS Policies Monitor IPS events To... Edit an exception rule Add an exception rule Delete an exception rule Copy an exception rule to another policy Do this... Under Actions, click Edit. Click New. Under Actions, click Delete. Select a rule and click Copy To to copy it to another policy. Indicate the policy to which to copy the rule and click OK. NOTE: You can copy several rules at one time by selecting all the rules before clicking Copy To. 4 Click Save to save changes. Creating exception rules To allow behavior prevented by a signature, create an exception for that signature. This can entail defining exception parameters and values. See Writing Custom Signatures and Exceptions for details on this aspect. Task For option definitions, click ? in the interface. 1 On the IPS Rule policy Exception Rules tab, click New. 2 Name the exception, be sure it is enabled, then include the signatures to which the exception applies. 3 Set executables, parameters, or Domain groups that play a role as a behavioral exception to the signature. 4 Click Save. Monitor IPS events An IPS event is triggered when a security violation, as defined by a signature, is detected and reported to the ePO server. The IPS event appears on the Events tab of the Host IPS tab (or the Event Log tab along with all the other events for all the other products that ePolicy Orchestrator is managing) under Reporting with one of four severity level criteria: High, Medium, Low, and Information. NOTE: When two events are triggered by the same operation, the highest signature reaction is taken. From the list of events generated, you can determine which events are allowable and which indicate suspicious behavior. To allow events, configure the system with the following: • Exceptions - Rules that override a signature rule. • Trusted Applications - Applications that are labeled trusted whose operations might otherwise be blocked by a signature. This tuning process keeps the events that appear to a minimum, providing more time for analysis of the serious events that occur. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Do this...
To...
Under
Actions
, click
Edit
.
Edit an exception rule
Click
New
.
Add an exception rule
Under
Actions
, click
Delete
.
Delete an exception rule
Select a rule and click
Copy To
to copy it to another
policy. Indicate the policy to which to copy the rule and
click
OK
.
NOTE:
You can copy several rules at one time by
selecting all the rules before clicking
Copy To
.
Copy an exception rule to another policy
4
Click
Save
to save changes.
Creating exception rules
To allow behavior prevented by a signature, create an exception for that signature. This can
entail defining exception parameters and values. See
Writing Custom Signatures and Exceptions
for details on this aspect.
Task
For option definitions, click
?
in the interface.
1
On the IPS Rule policy
Exception Rules
tab, click
New
.
2
Name the exception, be sure it is enabled, then include the signatures to which the exception
applies.
3
Set executables, parameters, or Domain groups that play a role as a behavioral exception
to the signature.
4
Click
Save
.
Monitor IPS events
An IPS event is triggered when a security violation, as defined by a signature, is detected and
reported to the ePO server.
The IPS event appears on the Events tab of the Host IPS tab (or the Event Log tab along with
all the other events for all the other products that ePolicy Orchestrator is managing) under
Reporting with one of four severity level criteria: High, Medium, Low, and Information.
NOTE:
When two events are triggered by the same operation, the highest signature reaction
is taken.
From the list of events generated, you can determine which events are allowable and which
indicate suspicious behavior. To allow events, configure the system with the following:
Exceptions
— Rules that override a signature rule.
Trusted Applications
— Applications that are labeled trusted whose operations might
otherwise be blocked by a signature.
This tuning process keeps the events that appear to a minimum, providing more time for analysis
of the serious events that occur.
Configuring IPS Policies
Monitor IPS events
47
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5