McAfee HISCDE-AB-IA Product Guide - Page 49

Creating an exception from an event, Actions | New, Exception, Actions | New Trusted Application

Page 49 highlights

Configuring IPS Policies Monitor IPS events 3 Determine how you want to view the list of events: To... Select columns to display Sort by a column Filter for groups Filter for events criteria Aggregate exceptions View details of the event Do this... Select Options | Choose Columns. In the Select Columns page, add, remove, or reorder the columns for the display. Click the column header. From the Filter menu, select This Group Only or This Group and All Subgroups. Select event type, marked status (read, unread, hidden, unhidden), severity level, or date of creation. Click Clear to remove filter settings. Click Aggregate, select the criteria on which to aggregate events, then click OK. Click Clear to remove aggregation settings. Click the event. The Event Log details page appears. 4 Mark events to facilitate their filtering and tracking: select the checkbox of one or more events, then select the appropriate command. Select... Actions | Mark Read Actions | Mark Unread Actions | Mark Hidden Actions | Mark Unhidden To... Mark the event as read Mark a read event as unread Hide the event Show hidden events. Note: You must first filter for hidden events to be able to select them. 5 Create an exception or trusted application rule. Select an event and select Actions | New Exception to create an exception; or select Actions | New Trusted Application to create an application rule. See Creating an exception from an event or Creating a trusted application from an event for details. Creating an exception from an event For an event that appears under Reporting in the Host IPS 8.0 Events tab or on the Event Log page, you have the option of creating an exception. Task For option definitions, click ? in the interface. 1 Select the checkbox of the event for which you want to create an exception. 2 Select Actions | New Exception. 3 In the dialog box that appears, select a destination IPS Rules policy and click OK. The exception is created and added automatically to the bottom of the list of exceptions of the destination IPS Rules policy. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

3
Determine how you want to view the list of events:
Do this...
To...
Select
Options | Choose Columns
. In the Select
Columns page, add, remove, or reorder the columns
for the display.
Select columns to display
Click the column header.
Sort by a column
From the Filter menu, select
This Group Only
or
This
Group and All Subgroups
.
Filter for groups
Select event type, marked status (read, unread, hidden,
unhidden), severity level, or date of creation. Click
Clear
to remove filter settings.
Filter for events criteria
Click
Aggregate
, select the criteria on which to
aggregate events, then click
OK
. Click
Clear
to remove
aggregation settings.
Aggregate exceptions
Click the event. The Event Log details page appears.
View details of the event
4
Mark events to facilitate their filtering and tracking: select the checkbox of one or more
events, then select the appropriate command.
To...
Select...
Mark the event as read
Actions | Mark Read
Mark a read event as unread
Actions | Mark Unread
Hide the event
Actions | Mark Hidden
Show hidden events. Note: You must first filter for
hidden events to be able to select them.
Actions | Mark Unhidden
5
Create an exception or trusted application rule. Select an event and select
Actions | New
Exception
to create an exception; or select
Actions | New Trusted Application
to
create an application rule. See
Creating an exception from an event
or
Creating a trusted
application from an event
for details.
Creating an exception from an event
For an event that appears under Reporting in the Host IPS 8.0 Events tab or on the Event Log
page, you have the option of creating an exception.
Task
For option definitions, click
?
in the interface.
1
Select the checkbox of the event for which you want to create an exception.
2
Select
Actions | New Exception
.
3
In the dialog box that appears, select a destination IPS Rules policy and click
OK
. The
exception is created and added automatically to the bottom of the list of exceptions of the
destination IPS Rules policy.
Configuring IPS Policies
Monitor IPS events
49
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5