McAfee HISCDE-AB-IA - Host Intrusion Prevention Product Manual page 153

Product guide for use with epolicy orchestrator 4.5
Table of Contents

Advertisement

Index
Policy Catalog (continued)
Trusted Applications
78
Trusted Networks
77
policy enforcement
Host IPS
9
Host IPS clients and ePO
7
Linux client and
97
Solaris client and
94
policy management
accessing Host IPS policies
analyzing Host IPS events and client rules
Linux client and
97
Policies tab, Host IPS
16
tracking Host IPS policies
10
tuning Host IPS 10,
18
ports
blocked traffic and firewall rules
connections and firewall alerts
firewall and state table entries
FTP connections and stateful packet inspection
precedence
firewall rules list
53
General policies, Host IPS and
Network IPS and IP addresses
Trusted Networks policy
78
preconfigured policies
Client UI
74
Firewall Rules
67
IPS Options
33
IPS Protection
35
Trusted Applications
78
Trusted Networks
77
protocols
tracking, and stateful firewall
Q
queries, Host IPS
custom, parameters for
13
managing information
12
predefined and custom
13
reports
10
tracking activities
13
R
reactions
about
32
firewall alerts, responding to
intrusion alerts, responding to
IPS Protection, configuring
mapping to IPS severity
10
setting, for signature severity levels
spoof detected alerts, responding to
types of
32
rule groups, Host IPS
firewall rule groups, creating
rule structure
custom signatures
101
rules lists
exceptions for Host IPS
88
firewall rules for Host IPS
90
S
server tasks, Host IPS
checking in updates
27
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
16
16
63
87
60
61
73
78
62
87
86
35
36
87
69
server tasks, Host IPS (continued)
Export Policies
25
Export Queries
25
managing deployment 23,
25
Property Translator
25
Purge Event Log
25
Purge Threat Event Log
25
Repository Pull
25
Run Query
25
severity levels, IPS
events and
47
IPS Protection policy
35
mapping to a reaction
10
setting and tuning protection
setting reactions for
36
tuning 10,
17
working with signatures
39
shielding and enveloping
IPS behavioral rules and
32
signature security levels
types of
39
signatures
alerts and NIPS signatures
configuring IPS Rules policy
creating custom host IPS
41
creating with expert method
creating with standard method
custom
39
default host IPS
39
defined
31
exception rules list
88
exceptions
32
HIPS, about
31
host
39
host IP, and exceptions
86
IPS Rules policy
36
network
39
NIPS, about
31
severity levels
39
severity levels for
35
tuning Host IPS policies
10
types of
39
using the wizard to create
42
working with
39
Solaris client
installation files
96
overview
94
policy enforcement
94
preventing buffer overflow
stopping and restarting
96
troubleshooting
95
verifying client is running
96
Spoof Detected alerts
87
state table, firewall
functionality
60
overview
60
stateful firewall
how stateful filtering works
packet inspection, how it works
protocol tracking
62
system call interception
30
system management
automatic responses for Host IPS events
server tasks for Host IPS 23,
updating Host IPS protection
18
86
40
41
41
94
60
61
26
25
27
153

Advertisement

Table of Contents
loading

This manual is also suitable for:

Host intrusion prevention 8.0

Table of Contents