McAfee UTILITIES 4.0 Guide de l'utilisateur Page 81

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 112
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 80
Do this...To
Select from the list the message type to trigger logging of IPS
events. Debug logs all messages; Information logs Information,
Turn on IPS logging
Warning, and Error messages; Warning logs Warning and Error
messages; Error logs error messages; Disabled logs no messages.
The path of the log file on Windows clients is: C:\Documents and
Settings\All Users\Application Data\McAfee\Host Intrusion
Prevention\HipShield.log; on Windows Vista: C:\Program
Data\McAfee\Host Intrusion Prevention\HipShield.log
Select Log security violations.Include security violations in the IPS log
Deselect the checkbox to disable, select a checkbox to enable an
engine
Turn engines on and off
NOTE: For details on working with the HIP client directly, see
Working with Host Intrusion
Prevention Clients
.
Working with Trusted Network policies
The Trusted Networks policy enables you to maintain a list of network addresses and subnets,
which you can tag as trusted for clients on Windows.
This policy category contains a preconfigured policy, which includes local subnets automatically
but lists no network addresses, and an editable My Default policy. You can view and duplicate
the preconfigured policy; you can create, edit, rename, duplicate, delete, and export editable
custom policies.
On the Policy Catalog policy list page, click New Policy to create a new custom policy; click
Duplicate under Actions to create a new custom policy based on an existing policy.
Change the policy’s assignment on the Policy Assignment page. For a group, go to Systems
| System Tree, select a group, and then on the Policies tab click Edit Assignment.. For a
system go to Systems | System Tree, select a group that contains the system, and then on
the System tab, select the system and select More Actions | Modify Policies on a Single
System.
Tasks
Configuring a Trusted Networks policy
Configuring a Trusted Networks policy
Trusted Networks enable you to maintain a list of network addresses and subnets that you can
tag as trusted for clients on Windows. You can:
Set up trusted network options.
Add or delete addresses or subnets in the trusted list.
NOTE: If one trusted network trusts a specific IP address for network IPS and another trusted
network does not trust the same IP address for network IPS, like firewall rules, the entry listed
first takes precedence.
Use this task to set trusted network options and list trusted networks.
Configuring General Policies
Working with Trusted Network policies
81McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.0
Vue de la page 80
1 2 ... 76 77 78 79 80 81 82 83 84 85 86 ... 111 112

Commentaires sur ces manuels

Pas de commentaire