McAfee M-1250 Network Protection - Page 23

Overly coarse traffic VIDS definition that contains very disparate applications.

Page 23 highlights

McAfee® Network Security Platform 6.0 Configure policies can use against your network: the fact that the attack failed can help him zero in on the type of Web server you use. Users can also better manage this type of events through policy customization or installing attack filters. The noise-to-incorrect-identification ratio can be fairly high, particularly in the following conditions: • The configured policy includes a lot of Informational alerts, or scan alerts which are based on request activities (such as the All Inclusive policy) • Deployment links where there is a lot of hostile traffic, such as in front of a firewall • Overly coarse traffic VIDS definition that contains very disparate applications. For example: a highly aggregated link in dedicated interface mode Users can effectively manage the noise level by defining appropriate VIDS and customize the policy accordingly. For dealing with exceptional hosts, such as a dedicated pentest machine, attack filters can also be used. 15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

McAfee® Network Security Platform 6.0
Configure policies
can use against your network: the fact that the attack failed can help him zero in on the
type of Web server you use. Users can also better manage this type of events through
policy customization or installing attack filters.
The noise-to-incorrect-identification ratio can be fairly high, particularly in the following
conditions:
The configured policy includes a lot of Informational alerts, or scan alerts which are
based on request activities (such as the All Inclusive policy)
Deployment links where there is a lot of hostile traffic, such as in front of a firewall
Overly coarse traffic VIDS definition that contains very disparate applications. For
example: a highly aggregated link in dedicated interface mode
Users can effectively manage the noise level by defining appropriate VIDS and customize
the policy accordingly. For dealing with exceptional hosts, such as a dedicated pentest
machine, attack filters can also be used.
15