McAfee M-1250 IPS Configuration Guide - Page 168

Alert filter association using the Threat Analyzer, Managing HTTP response scanning

Page 168 highlights

McAfee® Network Security Platform 5.1 The IPS Sensor_Name node Alert filter association using the Threat Analyzer You can select a particular alert and configure an Alert Filter. If necessary, you can create a new Alert Filter and apply it to the selected alert. You apply an Alert Filter to the resource for which the alert is raised and the attack for which the alert is raised and the direction of the attack. Managing HTTP response scanning The HTTP Response settings enables you to configure Network Security Platform to inspect HTTP responses for exploits on a per-monitoring port and direction basis. The Sensor will be able to scan plain HTML text responses (but not traffic containing zipped, encrypted or MIME-encoded content) Note the following: • HTTP response processing is disabled by default. • You can enable it in each direction on an interface pair. • McAfee recommends that you enable HTTP response processing only if you anticipate malicious traffic activity on your Web server. • To minimize the potential performance impact on the Sensor, enable HTTP response processing on the minimum number of ports and in only the required directions to achieve your protection goals. For performance information, see Best Practices Guide. Based on the needs of your organization, you may want to enable HTTP response inspection for inbound traffic, outbound traffic, or both directions. Consider the examples below. Example 1 Assume a scenario where port 1A on your Sensor is connected to the outside network and 1B is connected to your internal network [for example, a Web server]. When a client machine from outside your network sends a connect request and the Web Server responds back with malicious traffic, this is treated as outgoing attack. However, since the origin of the attack is outside your network, enable HTTP response scan on the inbound traffic. Steps: 1 Go to IPS Settings > Policies > HTTP Response Scanning or IPS Settings > Sensor_Name > IPS Sensor / IPS Failover Pair > HTTP Response Scanning page. 160

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
The IPS Sensor_Name node
160
Alert filter association using the Threat Analyzer
You can select a particular alert and configure an Alert Filter. If necessary, you can create
a new Alert Filter and apply it to the selected alert. You apply an Alert Filter to the resource
for which the alert is raised and the attack for which the alert is raised and the direction of
the attack.
Managing HTTP response scanning
The HTTP Response settings enables you to configure Network Security Platform to
inspect HTTP responses for exploits on a per-monitoring port and direction basis. The
Sensor will be able to scan plain HTML text responses (but not traffic containing zipped,
encrypted or MIME-encoded content)
Note the following:
HTTP response processing is disabled by default.
You can enable it in each direction on an interface pair.
McAfee recommends that you enable HTTP response processing only if you
anticipate malicious traffic activity on your Web server.
To minimize the potential performance impact on the Sensor, enable HTTP response
processing on the minimum number of ports and in only the required directions to
achieve your protection goals. For performance information, see
Best Practices Guide
.
Based on the needs of your organization, you may want to enable HTTP response
inspection for inbound traffic, outbound traffic, or both directions. Consider the examples
below.
Example 1
Assume a scenario where port 1A on your Sensor is connected to the outside network and
1B is connected to your internal network [for example, a Web server]. When a client
machine from outside your network sends a connect request and the Web Server
responds back with malicious traffic, this is treated as outgoing attack. However, since the
origin of the attack is outside your network, enable HTTP response scan on the inbound
traffic.
Steps:
1
Go to
IPS Settings > Policies > HTTP Response Scanning
or
IPS Settings > Sensor_Name > IPS
Sensor / IPS Failover Pair > HTTP Response Scanning
page.