McAfee HISCDE-AB-IA Product Guide - Page 50

Creating a trusted application from an event, Monitor IPS client rules

Page 50 highlights

Configuring IPS Policies Monitor IPS client rules Creating a trusted application from an event For an event that appears under Reporting in the Host IPS 8.0 Events tab or on the Event Log page, you have the option of creating a trusted application. Task For option definitions, click ? in the interface. 1 Select the checkbox of the event for which you want to create a trusted application. 2 Select Actions | New Trusted Application. 3 In the dialog box that appears, select a destination Trusted Application policy and click OK. The exception is created and added automatically to the bottom of the list of exceptions of the destination Trusted Application policy. From there, you can view or edit details of the new application. Monitor IPS client rules You need to periodically analyze IPS client rules created automatically when clients are in adaptive mode, or manually on the client whenever the Client UI policy option allows manual creation of client rules. IPS client rules are exceptions created on a client to allow a functionality blocked by a signature. Pay particular attention to exceptions to high severity signatures, as these might indicate a serious issue or simply a false positive. If a false positive, move the exception to an IPS Rules policy or adjust the severity of the signature. NOTE: Access to IPS Client Rules on the Host IPS tab under Reporting requires additional permissions other than that for Host Intrusion Prevention IPS, including view permissions for Event Log, Systems, and System Tree access. You can sort, filter, and aggregate the exceptions and view their details. You can then promote some or all of the client exceptions to a particular IPS Rules policy to reduce false positives for a particular system environment. Use the aggregation feature to combine exceptions that have the same attributes, so that only one aggregated exception appears, while keeping track of the number of times the exceptions occur. This allows for easily finding IPS protection trouble spots on clients. Managing IPS client rules Viewing IPS client rules created automatically in adaptive mode or manually on a client and moving them to an IPS Rules or Trusted Application policy allows for easy tuning of IPS protection. NOTE: Access to IPS Client Rules on the Host IPS tab under Reporting requires additional permissions other than that for Host Intrusion Prevention IPS, including view permissions for Event Log, Systems, and System Tree access. Task For option definitions, click ? in the interface. 1 Click Menu | Reporting | Host IPS 8.0, then click IPS Client Rules. 2 Select the group in the System Tree for which you want to display client rules. 50 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Creating a trusted application from an event
For an event that appears under Reporting in the Host IPS 8.0 Events tab or on the Event Log
page, you have the option of creating a trusted application.
Task
For option definitions, click
?
in the interface.
1
Select the checkbox of the event for which you want to create a trusted application.
2
Select
Actions | New Trusted Application
.
3
In the dialog box that appears, select a destination Trusted Application policy and click
OK
.
The exception is created and added automatically to the bottom of the list of exceptions
of the destination Trusted Application policy. From there, you can view or edit details of
the new application.
Monitor IPS client rules
You need to periodically analyze IPS client rules created automatically when clients are in
adaptive mode, or manually on the client whenever the Client UI policy option allows manual
creation of client rules.
IPS client rules are exceptions created on a client to allow a functionality blocked by a signature.
Pay particular attention to exceptions to high severity signatures, as these might indicate a
serious issue or simply a false positive. If a false positive, move the exception to an IPS Rules
policy or adjust the severity of the signature.
NOTE:
Access to IPS Client Rules on the Host IPS tab under Reporting requires additional
permissions other than that for Host Intrusion Prevention IPS, including view permissions for
Event Log, Systems, and System Tree access.
You can sort, filter, and aggregate the exceptions and view their details. You can then promote
some or all of the client exceptions to a particular IPS Rules policy to reduce false positives for
a particular system environment.
Use the aggregation feature to combine exceptions that have the same attributes, so that only
one aggregated exception appears, while keeping track of the number of times the exceptions
occur. This allows for easily finding IPS protection trouble spots on clients.
Managing IPS client rules
Viewing IPS client rules created automatically in adaptive mode or manually on a client and
moving them to an IPS Rules or Trusted Application policy allows for easy tuning of IPS
protection.
NOTE:
Access to IPS Client Rules on the Host IPS tab under Reporting requires additional
permissions other than that for Host Intrusion Prevention IPS, including view permissions for
Event Log, Systems, and System Tree access.
Task
For option definitions, click
?
in the interface.
1
Click
Menu | Reporting | Host IPS 8.0
, then click
IPS Client Rules
.
2
Select the group in the System Tree for which you want to display client rules.
Configuring IPS Policies
Monitor IPS client rules
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
50