McAfee UTILITIES 4.0 Guía de usuario Pagina 16

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 112
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 15
SummaryHIP Query
Displays the number of IPS client rules created over time.Count of IPS Client Rules
Displays the top 10 blocked applications for the past three months.Top 10 Blocked
Applications
Displays the top 10 systems that were quarantined for the past three months.Top 10 Quarantined
Systems
Displays the top 10 triggered IPS signatures.Top 10 Triggered
Signatures
Displays the top 10 systems with the most IPS events.Top 10 IPS Events by
Target
Displays the top 10 network intrusion events by source IP addresses for the past three
months.
Top 10 IPS Events By
Source IP
Management of policies
Management of policies involves configuring and applying policies and the tuning of protection
for system resources and applications. Part of this process requires an analysis of events and
client rules.
How to set and tune protection
Host Intrustion Prevention works out-of-the box with little or no attention for basic protection.
It allows greater protection through custom settings obtained through manual or automatic
tuning.
Out-of-the-box protection
Host Intrusion Prevention ships with a set of default policies that provide basic, “out-of-the-box”
protection for your environment.
For advanced protection, switch from the default IPS policies to stronger preset policies, or
create custom policies.
Start with a sample deployment to monitor and tune the new settings. Tuning involves balancing
intrusion prevention protection and access to required information and applications per group
type.
Manual tuning
Manual tuning requires direct monitoring over a period of time of events and client rules being
created.
For IPS protection, monitor events for false positives and create rules for exceptions or
trusted applications to prevent these events from reoccurring.
For firewall protection, monitor network traffic and add trusted networks to allow appropriate
network traffic.
Monitor the effects of the new exception rules, trusted application rules, and trusted network
rules.
If these rules succeed in preventing false positives, keeping network traffic to a minimum,
and allowing legitimate activity, make them part of a new or existing policy.
Managing Your Protection
Management of policies
McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.016
Vista de pagina 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 111 112

Comentarios a estos manuales

Sin comentarios