McAfee HISCDE-AB-IA Product Guide - Page 97

Overview of the Linux client, Policy enforcement with the Linux client, Notes about the Linux client

Page 97 highlights

Working with Host Intrusion Prevention Clients Overview of the Linux client Task 1 Run the command: /sbin/rc2.d/S99hip restart. 2 Enable IPS protection. Use one of these procedures, depending on which you used to stop the client: • Set IPS Options to On in the ePO console and apply the policy to the client. • Logged in at root, run the command: hipts engines MISC:on Overview of the Linux client The Host Intrusion Prevention Linux client identifies and prevents potentially harmful attempts to compromise a Linux server's files and applications. It protects the server's operating system along with Apache web servers, with an emphasis on preventing buffer overflow attacks. Policy enforcement with the Linux client Not all policies that protect a Windows client are available for the Linux client. In brief, Host Intrusion Prevention protects the host server from harmful attacks but does not offer network intrusion protection, including buffer overflow. The policies that are valid are listed here. Table 21: Linux client policies Policy Available options Host Intrusion Prevention 8.0 IPS IPS Options • Enable HIPS • Enable Adaptive Mode • Retain existing Client Rules IPS Protection IPS Rules All • Exception Rules • Signatures (default and custom HIPS rules only) NOTE: NIPS signatures and Application Protection Rules are not available. Host Intrusion Prevention 8.0 General Client UI Trusted Networks Trusted Applications Host Intrusion Prevention 8.0 Firewall None except administrative or time-based password to allow use of the troubleshooting tool. None Only Mark as trusted for IPS and New Process Name to add trusted applications. None Notes about the Linux client • The Host IPS 8.0 Linux client is incompatible with SELinux in enforce mode. To disable the enforce mode, run the command: system-config-securitylevel, change the setting to disabled, and restart the client system. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Task
1
Run the command:
/sbin/rc2.d/S99hip restart.
2
Enable IPS protection. Use one of these procedures, depending on which you used to stop
the client:
Set
IPS Options
to
On
in the ePO console and apply the policy to the client.
Logged in at root, run the command:
hipts engines MISC:on
Overview of the Linux client
The Host Intrusion Prevention Linux client identifies and prevents potentially harmful attempts
to compromise a Linux server’s files and applications. It protects the server’s operating system
along with Apache web servers, with an emphasis on preventing buffer overflow attacks.
Policy enforcement with the Linux client
Not all policies that protect a Windows client are available for the Linux client. In brief, Host
Intrusion Prevention protects the host server from harmful attacks but does not offer network
intrusion protection, including buffer overflow. The policies that are valid are listed here.
Table 21: Linux client policies
Available options
Policy
Host Intrusion Prevention 8.0 IPS
IPS Options
Enable HIPS
Enable Adaptive Mode
Retain existing Client Rules
All
IPS Protection
IPS Rules
Exception Rules
Signatures (default and custom HIPS rules only)
NOTE:
NIPS signatures and Application Protection Rules
are not available.
Host Intrusion Prevention 8.0 General
None except administrative or time-based password to
allow use of the troubleshooting tool.
Client UI
None
Trusted Networks
Only Mark as trusted for IPS and New Process Name to
add trusted applications.
Trusted Applications
None
Host Intrusion Prevention 8.0 Firewall
Notes about the Linux client
The Host IPS 8.0 Linux client is incompatible with SELinux in enforce mode. To disable the
enforce mode, run the command:
system-config-securitylevel
, change the setting to disabled,
and restart the client system.
Working with Host Intrusion Prevention Clients
Overview of the Linux client
97
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5