McAfee M-1250 IPS Configuration Guide - Page 250

Understanding attack descriptions, Policy, Threat Analyzer, Network Security Platform KnowledgeBase

Page 250 highlights

CHAPTER 4 Understanding attack descriptions Every attack detected by McAfee® Network Security Platform includes an attack description. The information in each attack description is designed to give reference to what the attack does and how to defend against the attack in the future. Attack descriptions can be accessed from a number of areas: • Policy: during policy viewing/creation. Includes all Exploit, DoS, and Reconnaissance attacks. • Threat Analyzer: within the details of a detected attack. • Network Security Platform KnowledgeBase: all entries within the Attack Encyclopedia. When you click an Attack Description button, a HTML file opens in an Internet Explorer browser window. Figure 234: Attack Description Example The Attack Information & Description fields are as follows: • Name: McAfee Network Security Platform-designated name for an attack. • Vulnerability Type: type of inherent system flaw that can be exploited by attackers. • Impact Category: type of impact that can be performed to a system. • Impact Subcategory: type of inherent system flaw that can be exploited by attackers. • Severity: malicious impact potential of the attack. High, Medium, Low. 242

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

242
C
HAPTER
4
Understanding attack descriptions
Every attack detected by McAfee
®
Network Security Platform includes an attack
description. The information in each attack description is designed to give reference to
what the attack does and how to defend against the attack in the future.
Attack descriptions can be accessed from a number of areas:
Policy:
during policy viewing/creation. Includes all Exploit, DoS, and Reconnaissance
attacks.
Threat Analyzer
: within the details of a detected attack.
Network Security Platform KnowledgeBase
: all entries within the Attack Encyclopedia.
When you click an Attack Description button, a HTML file opens in an Internet Explorer
browser window.
Figure 234: Attack Description Example
The Attack Information & Description fields are as follows:
Name
: McAfee Network Security Platform-designated name for an attack.
Vulnerability Type
: type of inherent system flaw that can be exploited by attackers.
Impact Category
: type of impact that can be performed to a system.
Impact Subcategory
: type of inherent system flaw that can be exploited by attackers.
Severity
: malicious impact potential of the attack. High, Medium, Low.