McAfee HISCDE-AB-IA Product Guide - Page 73

Configuring General Policies, Overview of General policies

Page 73 highlights

Configuring General Policies The General feature of Host Intrusion Prevention provides access to policies that are general in nature and not specific to either IPS or the firewall. Contents Overview of General policies Define client functionality Define trusted networks Define trusted applications Overview of General policies General policies work with both the IPS and firewall features and control client access and both trusted networks and applications. All policies and options apply to Windows operating systems. On non-Windows systems, only select policies and options apply. For details refer to Policy enforcement with the Solaris/Linux client under Working with Host IPS Clients. Available policies There are three General policies: Client UI - Determines which options are available for a Windows client computer, including whether the Host IPS client icon appears in the system tray, types of intrusion alerts, passwords for access to the client interface, and troubleshooting options. The password functionality is used for clients on both Windows and non-Windows platforms. Trusted Networks - Lists IP addresses and networks, including TrustedSource exceptions, that are safe for communication. Trusted networks can include individual IP addresses or ranges of IP addresses. Marking networks as trusted eliminates or reduces the need for network IPS exceptions and additional firewall rules. For Windows clients only. Trusted Applications - Lists applications that are safe and have no known vulnerabilities. Marking applications as trusted eliminates or reduces the need for IPS exceptions and additional firewall rules. Like the IPS Rules policy, this policy category can contain multiple policy instances. For clients on both Windows and non-Windows platforms. Settings for Trusted Networks and Trusted Applications policies can reduce or eliminate false positives, which aids in tuning a deployment. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 73

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Configuring General Policies
The General feature of Host Intrusion Prevention provides access to policies that are general
in nature and not specific to either IPS or the firewall.
Contents
Overview of General policies
Define client functionality
Define trusted networks
Define trusted applications
Overview of General policies
General policies work with both the IPS and firewall features and control client access and both
trusted networks and applications.
All policies and options apply to Windows operating systems. On non-Windows systems, only
select policies and options apply. For details refer to
Policy enforcement with the Solaris/Linux
client
under
Working with Host IPS Clients
.
Available policies
There are three General policies:
Client UI
— Determines which options are available for a Windows client computer, including
whether the Host IPS client icon appears in the system tray, types of intrusion alerts, passwords
for access to the client interface, and troubleshooting options. The password functionality is
used for clients on both Windows and non-Windows platforms.
Trusted Networks
— Lists IP addresses and networks, including TrustedSource exceptions,
that are safe for communication. Trusted networks can include individual IP addresses or ranges
of IP addresses. Marking networks as trusted eliminates or reduces the need for network IPS
exceptions and additional firewall rules. For Windows clients only.
Trusted Applications
— Lists applications that are safe and have no known vulnerabilities.
Marking applications as trusted eliminates or reduces the need for IPS exceptions and additional
firewall rules. Like the IPS Rules policy, this policy category can contain multiple policy instances.
For clients on both Windows and non-Windows platforms.
Settings for
Trusted Networks
and
Trusted Applications
policies can reduce or eliminate
false positives, which aids in tuning a deployment.
73
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5