
• Allows only UDP traffic necessary for accessing IP information (such as your own IP address
or the network time).
• Blocks Windows file sharing.
On the Policy Catalog policy list page, click New Policy to create a new custom policy; click
Duplicate under Actions to create a new custom policy based on an existing policy.
Change the policy’s assignment on the Policy Assignment page. For a group, go to Systems
| System Tree, select a group, and then on the Policies tab click Edit Assignment.. For a
system go to Systems | System Tree, select a group that contains the system, and then on
the System tab, select the system and select More Actions | Modify Policies on a Single
System.
Tasks
Configuring the Firewall Rules policy
Creating and editing firewall rules
Creating firewall rule groups
Creating firewall connection-aware groups
Adding predefined firewall rules
Managing Firewall client rules
Configuring the Firewall Rules policy
Use this task to add, edit, or remove firewall rules and rule groups, and reorder the list of rules.
Task
For option definitions, click ? on the page displaying the options.
1 On the Policy Catalog page, select Host Intrusion Prevention: Firewall on the Product
list and select Firewall Rules on the Category list. The list of policies appears.
2 Click Edit to make changes on the Firewall Rules page.
Figure 20: Firewall Rules list
3 Do any of the following:
Configuring Firewall Policies
Working with Firewall Rules policies
59McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.0
Comentarios a estos manuales