McAfee HISCDE-AB-IA Product Guide - Page 5

Working with Host Intrusion Prevention Clients, Appendix A - Writing Custom Signatures

Page 5 highlights

Contents Configuring a Client UI policy 74 Setting Client UI general options 75 Setting Client UI advanced options and passwords 75 Setting Client UI troubleshooting options 76 Define trusted networks 77 Configuring a Trusted Networks policy 78 Define trusted applications 78 Configuring a Trusted Applications policy 79 Creating and editing Trusted Application rules 79 Assigning multiple instances of the policy 80 Working with Host Intrusion Prevention Clients 81 Overview of the Windows client 81 System tray icon menu 81 Client console for Windows clients 83 Unlocking the Windows client interface 83 Setting client UI options 83 Troubleshooting the Windows client 84 Windows client alerts 86 About the IPS Policy tab 88 About the Firewall Policy tab 89 About the Blocked Hosts tab 91 Editing the Blocked Hosts list 92 About the Application Protection List tab 92 About the Activity Log tab 93 Overview of the Solaris client 94 Policy enforcement with the Solaris client 94 Troubleshooting the Solaris client 95 Overview of the Linux client 97 Policy enforcement with the Linux client 97 Notes about the Linux client 97 Troubleshooting the Linux client 98 Appendix A - Writing Custom Signatures and Exceptions 101 Rule structure 101 Common sections 102 Optional common sections 104 Wildcards and variables 104 Windows custom signatures 107 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Configuring a Client UI policy
.........................................................
74
Setting Client UI general options
......................................................
75
Setting Client UI advanced options and passwords
.......................................
75
Setting Client UI troubleshooting options
...............................................
76
Define trusted networks
....................................................................
77
Configuring a Trusted Networks policy
.................................................
78
Define trusted applications
..................................................................
78
Configuring a Trusted Applications policy
...............................................
79
Creating and editing Trusted Application rules
...........................................
79
Assigning multiple instances of the policy
...............................................
80
Working with Host Intrusion Prevention Clients
.....................................
81
Overview of the Windows client
..............................................................
81
System tray icon menu
..............................................................
81
Client console for Windows clients
.....................................................
83
Unlocking the Windows client interface
.................................................
83
Setting client UI options
.............................................................
83
Troubleshooting the Windows client
...................................................
84
Windows client alerts
...............................................................
86
About the IPS Policy tab
.............................................................
88
About the Firewall Policy tab
.........................................................
89
About the Blocked Hosts tab
.........................................................
91
Editing the Blocked Hosts list
.........................................................
92
About the Application Protection List tab
...............................................
92
About the Activity Log tab
...........................................................
93
Overview of the Solaris client
...............................................................
94
Policy enforcement with the Solaris client
...............................................
94
Troubleshooting the Solaris client
.....................................................
95
Overview of the Linux client
................................................................
97
Policy enforcement with the Linux client
................................................
97
Notes about the Linux client
.........................................................
97
Troubleshooting the Linux client
......................................................
98
Appendix A — Writing Custom Signatures and Exceptions
.........................
101
Rule structure
...........................................................................
101
Common sections
.................................................................
102
Optional common sections
..........................................................
104
Wildcards and variables
............................................................
104
Windows custom signatures
................................................................
107
5
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
Contents