Editing The Blocked Hosts List; About The Application Protection List Tab - McAfee HISCDE-AB-IA - Host Intrusion Prevention Product Manual

Product guide for use with epolicy orchestrator 4.5
Table of Contents

Advertisement

Working with Host Intrusion Prevention Clients
Overview of the Windows client
Column

Editing the Blocked Hosts list

Edit the list of blocked addresses to add, remove, change, or view blocked hosts.
Task
1
Click Add to add a host.
2
In the Blocked Host dialog box, enter the IP address you want to block. To search for an
IPS address by domain name, click DNS Lookup. If you find the host name there, click
Use.
3
Type the number of minutes, up to 60, to block the IP address.
4
Click OK.
NOTE:
After you create a blocked address, Host Intrusion Prevention adds a new entry to
the list on the Application Protection tab. It blocks any communication attempt from
that IP address until you remove it from the blocked addresses list, or a set period of time
expires.
5
For other edits, do one of the following:
To...
View the details of or edit a blocked host
Delete a blocked host
Apply changes immediately

About the Application Protection List tab

The Application Protection List tab displays a list of applications protected on the client. This is
a view-only list populated by administrative policy and a client-specific application list created
heuristically.
This list shows all monitored processes on the client.
Table 19: Application Protection tab
Column
Process
PID
Application Full Path
92
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
What it shows
the list. If you specified that you wanted this address
blocked until you manually removed it from the list, this
column displays Until removed.
Do this...
Double-click a host entry, or select a host and click
Properties. The Blocked Host dialog box displays
information that can be edited.
Select a host and click Remove.
Click Apply. If you do not click this button after making
changes, a dialog box appears asking you to save the
changes.
What it shows
The application process.
The process ID, which is the key for the cache lookup of
a process.
The full path name of the application executable.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Host intrusion prevention 8.0

Table of Contents