McAfee HISCDE-AB-IA Product Guide - Page 78

Configuring a Trusted Networks policy, Define trusted applications

Page 78 highlights

Configuring General Policies Define trusted applications Configuring a Trusted Networks policy Configure settings in this policy to set trusted network options and maintain a list of network addresses and subnets mark as trusted for Windows clients only. You can: • Set up trusted network options, including TrustedSource exceptions. • Add or delete addresses or subnets in the trusted list. NOTE: For firewall rules, you must set the remote address to Trusted to take advantage of this feature. Task For option definitions, click ? on the page displaying the options. 1 Click Menu | Policy | Policy Catalog and select Host Intrusion Prevention: General in the Product list and Trusted Networks in the Category list. The list of policies appears. 2 In the Trusted Networks policy list, click Edit under Actions to change the settings for a custom policy. 3 Do any of the following: To... Do this... Automatically treat all users on the same subnet as trusted, even those not in the list, Select Enabled under Include Local Subnet Automatically. Add a trusted network address to the list, Type a trusted IP address, address range, or subnet in the Trusted Networks text box. Mark the network as trusted for network IPS signatures Select Trust for IPS. or HTTP type host and custom IPS signatures, Remove or add a trusted network address entry, Click the Remove ( - ) or Add ( + ) button. 4 Click Save to save any changes. Define trusted applications The Trusted Applications policy is the mechanism you use to create a list of applications that are trusted and should cause no event to be generated. Maintaining a list of safe applications for a system reduces or eliminates most false positives. The Trusted Applications policy is a multiple instance policy, so you can assign more than one policy instance, which allows for a more detailed profile of trusted application usage. In tuning a deployment, creating IPS exception rules is one way to reduce false positives. This is not always practical when dealing with several thousand clients or having limited time and resources. A better solution is to create a list of trusted applications, which are applications known to be safe in a particular environment. For example, when you run a backup application, many false positive events can be triggered. To avoid this, make the backup application a trusted application. NOTE: A trusted application is susceptible to common vulnerabilities such as buffer overflow and illegal use. Therefore, a trusted application is still monitored and can trigger events to prevent exploits. 78 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Configuring a Trusted Networks policy
Configure settings in this policy to set trusted network options and maintain a list of network
addresses and subnets mark as trusted for Windows clients only.
You can:
Set up trusted network options, including TrustedSource exceptions.
Add or delete addresses or subnets in the trusted list.
NOTE:
For firewall rules, you must set the remote address to
Trusted
to take advantage of
this feature.
Task
For option definitions, click
?
on the page displaying the options.
1
Click
Menu | Policy | Policy Catalog
and select
Host Intrusion Prevention: General
in the
Product
list and
Trusted Networks
in the
Category
list. The list of policies
appears.
2
In the
Trusted Networks
policy list, click
Edit
under
Actions
to change the settings for
a custom policy.
3
Do any of the following:
Do this...
To...
Select
Enabled
under Include Local Subnet
Automatically.
Automatically treat all users on the same subnet as
trusted, even those not in the list,
Type a trusted IP address, address range, or subnet in
the Trusted Networks text box.
Add a trusted network address to the list,
Select
Trust for IPS
.
Mark the network as trusted for network IPS signatures
or HTTP type host and custom IPS signatures,
Click the Remove ( – ) or Add ( + ) button.
Remove or add a trusted network address entry,
4
Click
Save
to save any changes.
Define trusted applications
The Trusted Applications policy is the mechanism you use to create a list of applications that
are trusted and should cause no event to be generated. Maintaining a list of safe applications
for a system reduces or eliminates most false positives.
The Trusted Applications policy is a multiple instance policy, so you can assign more than one
policy instance, which allows for a more detailed profile of trusted application usage.
In tuning a deployment, creating IPS exception rules is one way to reduce false positives. This
is not always practical when dealing with several thousand clients or having limited time and
resources. A better solution is to create a list of trusted applications, which are applications
known to be safe in a particular environment. For example, when you run a backup application,
many false positive events can be triggered. To avoid this, make the backup application a trusted
application.
NOTE:
A trusted application is susceptible to common vulnerabilities such as buffer overflow
and illegal use. Therefore, a trusted application is still monitored and can trigger events to
prevent exploits.
Configuring General Policies
Define trusted applications
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
78