McAfee QUICKCLEAN 1.0 Manual de usuario Pagina 13

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 29
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 12
2
Using Threat Intelligence Exchange
Contents
Getting started with Threat Intelligence Exchange
Blocking or allowing files and certificates
Changing default threat reputations
Determine where a file ran in your environment
Monitoring events
Managing Data Exchange Layer brokers
Getting started with Threat Intelligence Exchange
After you install Threat Intelligence Exchange, what do you do next?
The following examples provide an overview about how to use the Threat Intelligence Exchange
module for VirusScan Enterprise and the Threat Intelligence Exchange server to detect and prevent
threats in your environment. Detailed steps about using the module and server are in the following
chapters.
Building file prevalence and observing
After installation and deployment, start building file prevalence and current threat information.
You can see what's running in your environment and add file and certificate reputation information to
the Threat Intelligence Exchange database. This information also populates the graphs and
dashboards available in the module where you view detailed reputation information about files and
certificates.
To get started, create one or more Threat Intelligence Exchange policies to run on a few systems in
your environment. The policies determine
When a file or certificate with a specific reputation level is allowed to run on a system
When a file or certificate is blocked
When the user is prompted for what to do
While building file prevalence, you can run the policies in Observation mode. File and certificate
reputations are added to the database but no action is taken. You can see what Threat Intelligence
Exchange blocks or allows if the policy is enforced.
For details, see Create a Threat Intelligence Exchange module policy on page 16.
Monitoring and making adjustments
As the policies run in your environment, reputation data is added to the database.
2
McAfee Threat Intelligence Exchange 1.0.0 Product Guide
13
Vista de pagina 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 28 29

Comentarios a estos manuales

Sin comentarios