McAfee M-1250 IPS Configuration Guide - Page 71

Pre-con d rule sets and policies, Attack Categories

Page 71 highlights

McAfee® Network Security Platform 5.1 Managing IPS settings • Rule Set / Policy Name: the name given to the rule set or policy. Several rule sets and policies are provided with names that represent the network area best protected by the rule set and policy. • Owner: admin domain in which rule set/policy was created. • Inbound / Outbound Rule Set (Policy Editor only): the name given to the rule set which has been configured to protect different operating systems, protocols, applications, and so forth. Several rule sets are provided which are designed for use with the provided policies, but may be used with your custom-created policies. • Editable: a check mark in this field indicates the rule set/policy can be edited. Pre-configured rule sets and policies McAfee provides many pre-configured rule sets and policies for immediate application in a number of different network areas. Each pre-configured policy is matched with an identically named rule set designed to address the common attacks targeting specific network environments. To provide the most efficient attack detection options, these policies take into account distinct factors such as protocols (HTTP, SMTP, DNS), applications (email, FTP, web), and operating systems (Windows, Solaris, Linux). Note: You cannot edit or delete pre-configured policies or rule sets. However, you may clone a pre-configured rule set or policy, then rename and customize it. Attack Categories Attacks are classified into four general categories: • Denial of Service (DoS), including DDoS: all of the conditions indicative of activities that lead to service disruption, including the slowing down or crashing of applications, servers, or networks. Distributed Denial of Service (DDoS) are also included. • Exploit: all malicious activities, other than DoS and Reconnaissance, carried out through specific traffic content. This includes buffer overflows, viruses, and worms. • Policy Violation: all activities for which the underlying traffic content may not be malicious by itself, but are explicitly forbidden by the usage policies of the administrative domain. This includes application protocol behaviors that violate common usage practices. • Reconnaissance: all activities for the purpose of intelligence gathering to prepare for further attacks; for example, a port scan or probe conducted to enumerate or identify services and possible vulnerabilities. Note: All provided policies, except for the two All-Inclusive policies, enable attacks with a minimum Severity of 2 (Low) and a maximum Benign Trigger Probability of 4 (Medium). The Severity and Benign Trigger Probability settings exclude known noisy signatures in an effort to limit spurious alerts. Rule Sets Default IDS Default Inline IPS Outside Firewall Designed to Protect Against: All attacks. All attacks and McAfee-recommended blocking of selected attacks All attacks except for Reconnaissance category. 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
Managing IPS settings
63
Rule Set / Policy Name
: the name given to the rule set or policy. Several rule sets and
policies are provided with names that represent the network area best protected by
the rule set and policy.
Owner
: admin domain in which rule set/policy was created.
Inbound / Outbound Rule Set
(Policy Editor only): the name given to the rule set which has
been configured to protect different operating systems, protocols, applications, and so
forth. Several rule sets are provided which are designed for use with the provided
policies, but may be used with your custom-created policies.
Editable
: a check mark in this field indicates the rule set/policy can be edited.
Pre-configured rule sets and policies
McAfee provides many pre-configured rule sets and policies for immediate application in a
number of different network areas. Each pre-configured policy is matched with an
identically named rule set designed to address the common attacks targeting specific
network environments. To provide the most efficient attack detection options, these
policies take into account distinct factors such as protocols (HTTP, SMTP, DNS),
applications (email, FTP, web), and operating systems (Windows, Solaris, Linux).
Note:
You cannot edit or delete pre-configured policies or rule sets. However, you
may clone a pre-configured rule set or policy, then rename and customize it.
Attack Categories
Attacks are classified into four general categories:
Denial of Service (DoS), including DDoS
: all of the conditions indicative of activities that lead
to service disruption, including the slowing down or crashing of applications, servers,
or networks. Distributed Denial of Service (DDoS) are also included.
Exploit
: all malicious activities, other than DoS and Reconnaissance, carried out
through specific traffic content. This includes buffer overflows, viruses, and worms.
Policy Violation
: all activities for which the underlying traffic content may not be
malicious by itself, but are explicitly forbidden by the usage policies of the
administrative domain. This includes application protocol behaviors that violate
common usage practices.
Reconnaissance
: all activities for the purpose of intelligence gathering to prepare for
further attacks; for example, a port scan or probe conducted to enumerate or identify
services and possible vulnerabilities.
Note:
All provided policies, except for the two All-Inclusive policies, enable attacks
with a minimum Severity of 2 (Low) and a maximum Benign Trigger Probability of 4
(Medium). The Severity and Benign Trigger Probability settings exclude known noisy
signatures in an effort to limit spurious alerts.
Rule Sets
Designed to Protect Against:
Default IDS
All attacks.
Default Inline IPS
All attacks and McAfee-recommended blocking of
selected attacks
Outside Firewall
All attacks except for Reconnaissance category.