McAfee MTP08EMB3RUA Product Guide - Page 93

Use learn mode to discover Internet applications, The role of IP addresses

Page 93 highlights

Using Firewall Protection The role of IP addresses 5 How policy options are implemented in the three protection modes Use the following table to determine how policy options are implemented in the different protection modes. Mode Behavior of firewall protection Report • Users are not prompted about detections. • Detections are reported to the SecurityCenter. • Administrator can select allowed applications, which are not reported as detections. • Can be used as a "learn" mode to discover which applications to allow and block. Prompt • Users are prompted about detections. • Detections are reported to the SecurityCenter. • Administrator can select allowed applications. These applications are not reported as detections, and users are not prompted for a response to them. • Users can approve additional applications in response to prompts. These are reported to the SecurityCenter. Protect • Users are not prompted about detections. • Users are notified about blocked applications. • Detections are reported to the SecurityCenter. • Administrator can select allowed applications, which are not reported as detections. If the policy is changed from Prompt mode to Protect mode or Report mode, firewall protection saves user settings for allowed applications. If the policy is then changed back to Prompt mode, these settings are reinstated. Use learn mode to discover Internet applications Report mode can be used as a "learn mode" to help you determine which applications to allow. In Report mode, firewall protection tracks but does not block unrecognized Internet applications. You can review detected applications in the Unrecognized Programs report and approve those that are appropriate for your policy. When you no longer see applications you want to allow in the report, change the policy setting to Prompt or Protect mode. The role of IP addresses An IP address is used to identify any device that originates or receives a request or a message over networks and the Internet (which comprises a very large group of networks). Each IP address uses a unique set of hexadecimal characters to identify a network, a subnetwork (if applicable), and a device within the network. An IP address enables: • The request or message to be delivered to the correct destination. • The receiving device to know where the request or message originated and where to send a response if one is required. McAfee Total Protection Service 5.1.5 Product Guide 93

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

How policy options are implemented in the three protection modes
Use the following table to determine how policy options are implemented in the different protection
modes.
Mode
Behavior of firewall protection
Report
Users are not prompted about detections.
Detections are reported to the SecurityCenter.
Administrator can select allowed applications, which are not reported as detections.
Can be used as a "learn" mode to discover which applications to allow and block.
Prompt
Users are prompted about detections.
Detections are reported to the SecurityCenter.
Administrator can select allowed applications. These applications are not reported as
detections, and users are not prompted for a response to them.
Users can approve additional applications in response to prompts. These are reported to
the SecurityCenter.
Protect
Users are not prompted about detections.
Users are notified about blocked applications.
Detections are reported to the SecurityCenter.
Administrator can select allowed applications, which are not reported as detections.
If the policy is changed from Prompt mode to Protect mode or Report
mode, firewall protection saves user settings for allowed applications. If
the policy is then changed back to Prompt mode, these settings are
reinstated.
Use learn mode to discover Internet applications
Report mode can be used as a “learn mode” to help you determine which applications to allow.
In Report mode, firewall protection tracks but does not block unrecognized Internet applications. You
can review detected applications in the Unrecognized Programs report and approve those that are
appropriate for your policy. When you no longer see applications you want to allow in the report,
change the policy setting to Prompt or Protect mode.
The role of IP addresses
An IP address is used to identify any device that originates or receives a request or a message over
networks and the Internet (which comprises a very large group of networks).
Each IP address uses a unique set of hexadecimal characters to identify a network, a subnetwork (if
applicable), and a device within the network.
An IP address enables:
The request or message to be delivered to the correct destination.
The receiving device to know where the request or message originated and where to send a
response if one is required.
Using Firewall Protection
The role of IP addresses
5
McAfee Total Protection Service 5.1.5 Product Guide
93