McAfee HISCDE-AB-IA Product Guide - Page 92

Editing the Blocked Hosts list, About the Application Protection List tab, DNS Lookup

Page 92 highlights

Working with Host Intrusion Prevention Clients Overview of the Windows client Column What it shows the list. If you specified that you wanted this address blocked until you manually removed it from the list, this column displays Until removed. Editing the Blocked Hosts list Edit the list of blocked addresses to add, remove, change, or view blocked hosts. Task 1 Click Add to add a host. 2 In the Blocked Host dialog box, enter the IP address you want to block. To search for an IPS address by domain name, click DNS Lookup. If you find the host name there, click Use. 3 Type the number of minutes, up to 60, to block the IP address. 4 Click OK. NOTE: After you create a blocked address, Host Intrusion Prevention adds a new entry to the list on the Application Protection tab. It blocks any communication attempt from that IP address until you remove it from the blocked addresses list, or a set period of time expires. 5 For other edits, do one of the following: To... View the details of or edit a blocked host Delete a blocked host Apply changes immediately Do this... Double-click a host entry, or select a host and click Properties. The Blocked Host dialog box displays information that can be edited. Select a host and click Remove. Click Apply. If you do not click this button after making changes, a dialog box appears asking you to save the changes. About the Application Protection List tab The Application Protection List tab displays a list of applications protected on the client. This is a view-only list populated by administrative policy and a client-specific application list created heuristically. This list shows all monitored processes on the client. Table 19: Application Protection tab Column What it shows Process The application process. PID The process ID, which is the key for the cache lookup of a process. Application Full Path The full path name of the application executable. 92 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

What it shows
Column
the list. If you specified that you wanted this address
blocked until you manually removed it from the list, this
column displays
Until removed
.
Editing the Blocked Hosts list
Edit the list of blocked addresses to add, remove, change, or view blocked hosts.
Task
1
Click
Add
to add a host.
2
In the Blocked Host dialog box, enter the IP address you want to block. To search for an
IPS address by domain name, click
DNS Lookup
. If you find the host name there, click
Use
.
3
Type the number of minutes, up to 60, to block the IP address.
4
Click
OK
.
NOTE:
After you create a blocked address, Host Intrusion Prevention adds a new entry to
the list on the
Application Protection
tab. It blocks any communication attempt from
that IP address until you remove it from the blocked addresses list, or a set period of time
expires.
5
For other edits, do one of the following:
Do this...
To...
Double-click a host entry, or select a host and click
Properties
. The
Blocked Host
dialog box displays
information that can be edited.
View the details of or edit a blocked host
Select a host and click
Remove
.
Delete a blocked host
Click
Apply
. If you do not click this button after making
changes, a dialog box appears asking you to save the
changes.
Apply changes immediately
About the Application Protection List tab
The Application Protection List tab displays a list of applications protected on the client. This is
a view-only list populated by administrative policy and a client-specific application list created
heuristically.
This list shows all monitored processes on the client.
Table 19: Application Protection tab
What it shows
Column
The application process.
Process
The process ID, which is the key for the cache lookup of
a process.
PID
The full path name of the application executable.
Application Full Path
Working with Host Intrusion Prevention Clients
Overview of the Windows client
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
92