McAfee HISCDE-AB-IA Product Guide - Page 94

Overview of the Solaris client, Policy enforcement with the Solaris client

Page 94 highlights

Working with Host Intrusion Prevention Clients Overview of the Solaris client Select... Filter Options - Intrusions To do this... Filter the data to display intrusions. NOTE: You can enable and disable logging for the firewall traffic, but not for the IPS feature. However, you can choose to hide these events in the log by filtering them out. 3 Do any of the following to change the display: To... Refresh the display Permanently delete the contents of the log Save the contents of the log and delete the list from the tab Apply changes immediately Do this... Click Refresh. Click Clear. Click Export. In the dialog box that appears, name and save the .txt file. Click Apply. If you do not click this button after making changes, a dialog box appears asking you to save the changes. Overview of the Solaris client The Host Intrusion Prevention Solaris client identifies and prevents potentially harmful attempts to compromise a Solaris server's files and applications. It protects the server's operating system along with Apache and Sun web servers, with an emphasis on preventing buffer overflow attacks. Policy enforcement with the Solaris client Not all policies that protect a Windows client are available for the Solaris client. In brief, Host Intrusion Prevention protects the host server from harmful attacks but does not offer firewall protection. The valid policies are listed here. Table 20: Solaris client policies Policy Available options Host Intrusion Prevention 8.0 IPS IPS Options • Enable HIPS • Enable Adaptive Mode • Retain existing Client Rules IPS Protection IPS Rules All • Exception Rules • Signatures (default and custom HIPS rules only) NOTE: NIPS signatures and Application Protection Rules are not available. Host Intrusion Prevention 8.0 General Client UI Trusted Networks None except administrative or time-based password to allow use of the troubleshooting tool. None 94 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

To do this...
Select...
Filter the data to display intrusions.
Filter Options - Intrusions
NOTE:
You can enable and disable logging for the firewall traffic, but not for the IPS feature.
However, you can choose to hide these events in the log by filtering them out.
3
Do any of the following to change the display:
Do this...
To...
Click
Refresh
.
Refresh the display
Click
Clear
.
Permanently delete the contents of the log
Click
Export
. In the dialog box that appears, name and
save the .txt file.
Save the contents of the log and delete the list
from the tab
Click
Apply
. If you do not click this button after making
changes, a dialog box appears asking you to save the
changes.
Apply changes immediately
Overview of the Solaris client
The Host Intrusion Prevention Solaris client identifies and prevents potentially harmful attempts
to compromise a Solaris server’s files and applications. It protects the server’s operating system
along with Apache and Sun web servers, with an emphasis on preventing buffer overflow attacks.
Policy enforcement with the Solaris client
Not all policies that protect a Windows client are available for the Solaris client. In brief, Host
Intrusion Prevention protects the host server from harmful attacks but does not offer firewall
protection. The valid policies are listed here.
Table 20: Solaris client policies
Available options
Policy
Host Intrusion Prevention 8.0 IPS
IPS Options
Enable HIPS
Enable Adaptive Mode
Retain existing Client Rules
All
IPS Protection
IPS Rules
Exception Rules
Signatures (default and custom HIPS rules only)
NOTE:
NIPS signatures and Application Protection Rules
are not available.
Host Intrusion Prevention 8.0 General
None except administrative or time-based password to
allow use of the troubleshooting tool.
Client UI
None
Trusted Networks
Working with Host Intrusion Prevention Clients
Overview of the Solaris client
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
94