McAfee MTP08EMB3RUA Product Guide - Page 105

Inbound Events Blocked by Firewall report, Best practices (firewall protection), Report period, Groups

Page 105 highlights

Using Firewall Protection Best practices (firewall protection) 5 Inbound Events Blocked by Firewall report Use the Inbound Events Blocked by Firewall report to view a list of communications that firewall protection prevented from reaching client computers. For the purposes of this report, each attempt to communicate is called an event. To view this report, the Report blocked events option must be enabled on the Firewall Protection policy tab. When this option is enabled, blocked events are logged for all computers using the policy. Select the information that appears in this report Select this option... Report period View Groups To do this... Specify the period of time for which to display information. Select from the last week or one of the last 12 months. List the computers where inbound events were blocked, the computers where inbound events originated, or groups containing computers where inbound events were blocked. Display all the computers on your account or only the computers in a single group. How to use this report When you want to... Do this... Display computers or Click the triangle icon next to a name. detections • Under a computer name, show which detections were found. • Under a detection name, show the computers where it was found. Click a group name to display computers in that group. View details about events Click a quantity under Events to display the Inbound Event List, which shows the name of the event, the number of occurrences, and the date on which it was detected. View details about a Click a computer name to display the Computer Details page, which displays computer information about the computer, its service components, and its detections. Best practices (firewall protection) To effectively manage your strategy for guarding against suspicious activity, we recommend that you proactively track the types of threats being detected and where they are occurring. 1 Check your status emails or the SecurityCenter website for an overview of your account's status. Ensure that protection is installed on all computers. 2 To centralize management and more easily monitor the types of applications and communications allowed on client computers, configure client firewall protection settings in a policy. 3 Use McAfee's recommendations for commonly used, safe Internet applications. When this option is enabled, applications rated safe on McAfee's www.hackerwatch.org site are approved automatically, minimizing the need for you or users to approve applications manually. 4 Check the Unrecognized Programs report frequently to monitor the Internet applications that users are allowing on client computers. If you know some of the applications are safe and do not want them to be detected as threats, add them to policies. McAfee Total Protection Service 5.1.5 Product Guide 105

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Inbound Events Blocked by Firewall report
Use the Inbound Events Blocked by Firewall report to view a list of communications that firewall
protection prevented from reaching client computers. For the purposes of this report, each attempt to
communicate is called an
event
.
To view this report, the
Report blocked events
option must be enabled on the
Firewall Protection policy tab. When this option is enabled, blocked
events are logged for all computers using the policy.
Select the information that appears in this report
Select this
option...
To do this...
Report period
Specify the period of time for which to display information. Select from the last
week or one of the last 12 months.
View
List the computers where inbound events were blocked, the computers where
inbound events originated, or groups containing computers where inbound events
were blocked.
Groups
Display all the computers on your account or only the computers in a single group.
How to use this report
When you want to...
Do this...
Display computers or
detections
Click the triangle icon next to a name.
Under a computer name, show which detections were found.
Under a detection name, show the computers where it was found.
Click a group name to display computers in that group.
View details about
events
Click a quantity under
Events
to display the Inbound Event List, which shows
the name of the event, the number of occurrences, and the date on which it
was detected.
View details about a
computer
Click a computer name to display the Computer Details page, which displays
information about the computer, its service components, and its detections.
Best practices (firewall protection)
To effectively manage your strategy for guarding against suspicious activity, we recommend that you
proactively track the types of threats being detected and where they are occurring.
1
Check your status emails or the SecurityCenter website for an overview of your account’s status.
Ensure that protection is installed on all computers.
2
To centralize management and more easily monitor the types of applications and communications
allowed on client computers, configure client firewall protection settings in a policy.
3
Use McAfee’s recommendations for commonly used, safe Internet applications. When this option is
enabled, applications rated safe on McAfee’s www.hackerwatch.org site are approved automatically,
minimizing the need for you or users to approve applications manually.
4
Check the Unrecognized Programs report frequently to monitor the Internet applications that users
are allowing on client computers. If you know some of the applications are safe and do not want
them to be detected as threats, add them to policies.
Using Firewall Protection
Best practices (firewall protection)
5
McAfee Total Protection Service 5.1.5 Product Guide
105