
To do this...Select...
Filter the data to display events caused by applications.Filter Options - Applications
Filter the data to display intrusions.Filter Options - Intrusions
NOTE: You can enable and disable logging for the firewall traffic, but not for the IPS or
application blocking features. However, you can choose to hide these events in the log by
filtering them out.
Overview of the Solaris client
The Host Intrusion Prevention Solaris client identifies and prevents potentially harmful attempts
to compromise a Solaris server’s files and applications. It protects the server’s operating system
along with Apache and Sun web servers, with an emphasis on preventing buffer overflow attacks.
Policy enforcement with the Solaris client
Not all policies that protect a Windows client are available for the Solaris client. In brief, Host
Intrusion Prevention protects the host server from harmful attacks but does not offer firewall
protection. The valid policies are listed here.
These options are available...With this policy...
HIP 7.0 GENERAL:
None except admin or time-based password to allow use of the
troubleshooting tool.
Client UI
NoneTrusted Networks
Only Mark as trusted for IPS and New Process Name to add trusted
applications.
Trusted Applications
HIP 7.0 IPS:
IPS Options • Enable HIPS
• Enable Adaptive Mode
• Retain existing Client Rules
AllIPS Protection
IPS Rules • Exception Rules
• Signatures (default and custom HIPS rules only)
Note: NIPS signatures and Application Protection Rules are not
available.
AllIPS Events
AllIPS Client Rules
AllSearch IPS Exception Rules
NoneHIP7.0 FIREWALL
NoneHIP 7.0 APPLICATION BLOCKING
Working with Host Intrusion Prevention Clients
Overview of the Solaris client
99McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.0
Comentários a estes Manuais