Configuring A Trusted Applications Policy; Creating And Editing Trusted Application Rules - McAfee HISCDE-AB-IA - Host Intrusion Prevention Product Manual

Product guide for use with epolicy orchestrator 4.5
Table of Contents

Advertisement

Configuring General Policies
Define trusted applications
This policy category contains a preconfigured policy, which provides a list of specific McAfee
applications and Windows processes. You can view and duplicate the preconfigured policy, or
edit, rename, duplicate, delete, and export custom policies.

Configuring a Trusted Applications policy

Configure settings in the policy to list applications deemed safe in a particular environment.
Task
For option definitions, click ? on the page displaying the options.
1
Click Menu | Policy | Policy Catalog and select Host Intrusion Prevention: General
in the Product list and Trusted Applications in the Category list. The list of policies
appears.
2
In the Trusted Applications policy list, click Edit under Actions to change the settings
for a custom policy.
3
Do any of the following:
To...
Add an application
Perform an action on one or more applications at the
same time
To perform an action on a single application
4
Click Save to save changes.

Creating and editing Trusted Application rules

Edit existing or create new trusted applications to have a list of all applications deemed safe
for your environment.
Task
For option definitions, click ? on the page displaying the options.
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
Do this...
Click Add Application. See Creating and editing
Trusted Application rules for details.
Select them and click:
Enable to enable a disabled application.
Disable to disable an enabled application.
Delete to delete applications.
Copy to to copy applications to another policy.
You are prompted to indicate the policy.
Click:
Edit to edit an existing application. See Creating
and editing Trusted Application rules for details.
Duplicate to make a copy of the application
within the same policy and named 'copy of' the
original application.
Delete to remove the application from the list.
79

Advertisement

Table of Contents
loading

This manual is also suitable for:

Host intrusion prevention 8.0

Table of Contents