Increasing Host IPS Management Success McAfee Inc. External Use

Size: px
Start display at page:

Download "Increasing Host IPS Management Success McAfee Inc. External Use"

Transcription

1 Increasing Host IPS Management Success Tech 60 W ebinar Series

2 Webinar Viewing Click the arrow on the Grab Tab to open or close the control panel Audio options listen via your PC computer OR via the telephone Ask questions via the Questions pane 2 Increasing Host IPS Management Success

3 Today s Tech 60 Presenters Brad Gable Senior Tier III Product Engineer Endpoint Security Kary Tankink Senior Enterprise Product Engineer Endpoint Security 3 Increasing Host IPS Management Success

4 HIPS Troubleshooting and Tuning Brad Gable Senior Tier III Product Engineer Endpoint Security, McAfee Support 4 Increasing Host IPS Management Success

5 McAfee Host IPS Current Versions Host IPS 8.0 Version for Windows (Patch 2) Version for Windows (P2 + Hotfix rollup) Version for Solaris Version for Linux epo Extension HIPS Patch release cycle: Feb, Jun, Oct (see KB51560) Case for Keeping Up to Date Latest codebase is best Software landscape is constantly maturing and changing New fixes are put into next releases Management effort made easy Difficulty maintaining multiple versions Difficulty maintaining upgrade paths for older versions Many fixes cannot be backported to earlier versions 5 Increasing Host IPS Management Success

6 Host IPS The Basics Host IPS signature content provides protection from known system vulnerabilities and unknown zero-day threats Zero-day threats: Occur between disclosure of the vulnerability and patch deployment to all endpoints you have zero days to bridge the security gap Host IPS contains generic buffer overflow protection and other generic signature mechanisms to protect systems during this zero-day gap period McAfee recommends applying security updates ASAP to reduce frequent or repeated IPS signature detections 6 Increasing Host IPS Management Success

7 Best Practices What to Avoid Remember that endpoint systems will not use the same policies Don t perform too little testing or validation on standard enterprise image Don t set and forget Don t make multiple changes at once Don t leave Adaptive Mode on indefinitely For more information, refer to PD20796 Adopting HIPS Best Practices for Quick Success 7 Increasing Host IPS Management Success

8 Assessing Host IPS Security Events Identify the signature number that is being triggered and the description information from the IPS Rules policy in epolicy Orchestrator (epo) Review the references CVE description links if any are included in the description information for that signature Identify whether any Microsoft Technet Security Bulletins are linked to the applicable vulnerability, and if any updates have been released Verify whether systems reporting the IPS event have any applicable MS Security Updates applied If YES, the IPS Signature may be disabled on systems with the MS Security Updates applied If NO, McAfee recommends that you apply the applicable MS Security Updates to the affected systems ASAP 8 Increasing Host IPS Management Success

9 IPS Signature Descriptions 9 Increasing Host IPS Management Success

10 CVE Descriptions 10 Increasing Host IPS Management Success

11 MS Security Bulletin 11 Increasing Host IPS Management Success

12 Third-Party Program Interoperability Tuning Troubleshooting a network facing application or traffic is blocked by Host Intrusion Prevention Firewall (KB67055) Third-party application stops working or is impaired after HIPS is installed or content is updated (KB67056) HIPS 7.0 / 8.0 agent logging and troubleshooting on Microsoft Windows (KB51517) (Debug Logging) NOTE: If you have to escalate an unresolvable issue, it s important that you also engage the third-party vendor for analysis along with McAfee. Many interoperability issues require resolution by the thirdparty vendor. McAfee is committed to working closely with third-party vendors to resolve these issues. 12 Increasing Host IPS Management Success

13 Tips for Successful Firewall Tuning Host IPS 8.0 includes simplified default firewall policy rule templates on which to base your policy The firewall is considered stateful The use of Location Aware groups further define rule sets for remote users off the normal LAN Trusted Networks making networks trusted eliminates or reduces the need for network IPS exceptions and additional firewall rules (for Windows clients only) Trusted Applications designating applications as trusted eliminates or reduces the need for IPS exceptions and additional firewall rules 13 Increasing Host IPS Management Success

14 Firewall Adaptive Mode Only use Adaptive Mode temporarily on a small number of systems to aid in firewall rules tuning Review client adaptive rules daily or at a minimum, on a weekly basis Review firewall client rules and apply to a tuning firewall rules policy on the end system Tuning should be an iterative process NOTE: Some network traffic related to applications might not be recognized by the Adaptive Mode, and you might have to configure firewall rules manually. Consult with your application vendor for information on application-specific firewall configurations to ensure functionality. 14 Increasing Host IPS Management Success

15 Managing the Host IPS Environment Kary Tankink Senior Enterprise Product Engineer Endpoint Security, McAfee Support 15 Increasing Host IPS Management Success

16 HIPS in the Enterprise Deployment Recommendations Identify non-critical users/systems with different roles/functions (remote users, workstation users, file servers, web servers, etc.) to initially deploy the product and start tuning policies Ensure that deployment tasks are setup at the proper epo server organization levels to avoid unintended product deployments For detailed recommendations, refer to HIPS Best Practice Guide - KB70877 Documenting Configuration Changes Document policy changes using new timestamps, naming conventions, role names, etc. Duplicate or export copies of policies before changing Avoid making major changes to a policy, that could greatly affect product functionality, without first testing these changes in a separate test environment Enforcing Policy Changes on Clients Ensure that policy and assignment changes are made at the correct organizational level (e.g., editing policies at the single-system level does not limit changes to that system unless policy inheritance is broken and a different policy is assigned to the single system) Host IPS 8.0 reports Policy Names in epo server client node properties and the local client registry to verify policy enforcement changes 16 Increasing Host IPS Management Success

17 HIPS 8.0 Policy Names Reported in epo Client Node Properties 17 Increasing Host IPS Management Success

18 HIPS 8.0 Policy Names Reported in the Registry 18 Increasing Host IPS Management Success

19 Common HIPS Issues Network IPS exceptions (KB77236) Exceptions for Network IPS Signatures can now be created using IPS Exceptions in Host IPS 8.0 Entering IP addresses into the Trusted Networks policy and enabling Trust for IPS is an alternative method from previous HIPS versions 19 Increasing Host IPS Management Success

20 Common HIPS Issues Network IPS exceptions (KB77236) Exceptions for Network IPS Signatures can now be created using IPS Exceptions in Host IPS 8.0 Entering IP addresses into the Trusted Networks policy and enabling Trust for IPS is an alternative method from previous HIPS versions Executable File Description (KB71735) Description is not a COMMENT field. Incorrect Descriptions cause IPS exceptions and Firewall rules to fail since the defined application does not properly match the running application 20 Increasing Host IPS Management Success

21 Executable File Description 21 Increasing Host IPS Management Success

22 Common HIPS Issues Network IPS exceptions (KB77236) Exceptions for Network IPS Signatures can now be created using IPS Exceptions in Host IPS 8.0 Entering IP addresses into the Trusted Networks policy and enabling Trust for IPS is an alternative method from previous HIPS versions Executable File Description (KB71735) Description is not a COMMENT field. Incorrect Descriptions cause IPS exceptions and Firewall rules to fail since the defined application does not properly match the running application Multi-slot Policies (PD22894, Pg. 38) McAfee Default should always be assigned to the IPS Rules and Trusted Applications policies. This ensures that monthly Host IPS Content changes are applied properly Multiple policies can be utilized in the environment, depending on epo System Tree hierarchy; no specific order is required when assigning multiple policies Policy 1: McAfee Default Policy 2: All Servers Policy 3: Web Servers only 22 Increasing Host IPS Management Success

23 Multi-slot Policies Assigned Policies 23 Increasing Host IPS Management Success

24 Multi-slot Policies Viewing Assignments 24 Increasing Host IPS Management Success

25 Common Firewall Issues Loopback Network Adapter Traffic (KB71230) Loopback traffic is used by many different applications and in HIPS 8.0, a Firewall Rule is required to allow this Loopback adapter traffic to/from the system. Many customers did not have a firewall rule for Loopback address traffic because it was not needed in HIPS 7.0 policies, so migrated HIPS 7.0 policies will need to have this rule added. 25 Increasing Host IPS Management Success

26 Loopback Network Adapter Traffic Rule 26 Increasing Host IPS Management Success

27 Common Firewall Issues Loopback Network Adapter Traffic (KB71230) Loopback traffic is used by many different applications and in HIPS 8.0, a Firewall Rule is required to allow this Loopback adapter traffic to/from the system. Many customers did not have a firewall rule for Loopback address traffic because it was not needed in HIPS 7.0 policies, so migrated HIPS 7.0 policies will need to have this rule added. Allow Traffic for Unsupported Protocols (KB66899) Allows traffic for protocols unknown to Host IPS. Useful in determining if HIPS is blocking some unknown protocol traffic that is needed for applications in your environment. Firewall rules can be created for specific Ethertype protocols (which are typically listed in HIPS Activity log as 0x#### event entries). 27 Increasing Host IPS Management Success

28 Allow Traffic for Unsupported Protocols 28 Increasing Host IPS Management Success

29 Common Firewall Issues Loopback Network Adapter Traffic (KB71230) Loopback traffic is used by many different applications and in HIPS 8.0, a Firewall Rule is required to allow this Loopback adapter traffic to/from the system. Many customers did not have a firewall rule for Loopback address traffic because it was not needed in HIPS 7.0 policies, so migrated HIPS 7.0 policies will need to have this rule added. Allow Traffic for Unsupported Protocols (KB66899) Allows traffic for protocols unknown to Host IPS. Useful in determining if HIPS is blocking some unknown protocol traffic that is needed for applications in your environment. Firewall rules can be created for specific Ethertype protocols (which are typically listed in HIPS Activity log as 0x#### event entries). TrustedSource (GTI) Functionality (KB74925) Ratings are performed against IP Address, not domains. Will only block traffic to domains if the IP address (that resolves to that domain) matches the configured TrustedSource threshold (Unverified, Medium, or High Risk). 29 Increasing Host IPS Management Success

30 TrustedSource GTI Domain name is rated High Risk, but not the IP address that it resolves to. 30 Increasing Host IPS Management Success

31 Common Firewall Issues Loopback Network Adapter Traffic (KB71230) Loopback traffic is used by many different applications and in HIPS 8.0, a Firewall Rule is required to allow this Loopback adapter traffic to/from the system. Many customers did not have a firewall rule for Loopback address traffic because it was not needed in HIPS 7.0 policies, so migrated HIPS 7.0 policies will need to have this rule added. Allow Traffic for Unsupported Protocols (KB66899) Allows traffic for protocols unknown to Host IPS. Useful in determining if HIPS is blocking some unknown protocol traffic that is needed for applications in your environment. Firewall rules can be created for specific Ethertype protocols (which are typically listed in HIPS Activity log as 0x#### event entries). TrustedSource (GTI) Functionality (KB74925) Ratings are performed against IP Address, not domains. Will only block traffic to domains if the IP address (that resolves to that domain) matches the configured TrustedSource threshold (Unverified, Medium, or High Risk). Disadvantage of using BLOCK ALL rule in the Firewall Rule policy If a BLOCK ALL rule is configured in your Firewall Rule policy, Learn/Adaptive Mode functionality will cease to function (BLOCK ALL rule is processed before the Adaptive/Learn Mode rule). HIPS Client already includes a BLOCK ALL TRAFFIC rule. Network traffic that is not allowed by other firewall rules will automatically get blocked. 31 Increasing Host IPS Management Success

32 Disadvantage of Using BLOCK ALL Rule 32 Increasing Host IPS Management Success

33 Working with McAfee Support What You Can Do BEFORE You Call Review KB54960 How to isolate a suspect component in Host IPS 1. Disable HIPS components (IPS, Firewall, and HIPS 7.0 Application Blocking) to isolate which module may be causing the issue 2. Stop HIPS service 3. HIPS NDIS Driver testing a. HIPS Enable FWPassthru - KB75917 b. HIPS Remove NDIS drivers - KB51676 What You Should Have WHEN You Call 1. Detailed description of the issue 2. Host IPS build installed - KB Results of component isolation 4. HIPS full debugging enabled - KB Increasing Host IPS Management Success

34 Questions 34 Increasing Host IPS Management Success

35 McAfee Host IPS Current Versions Host IPS 8.0 Version for Windows (Patch 2) Version for Windows (P2 + Hotfix rollup) Version for Solaris Version for Linux epo Extension HIPS Patch release cycle: Feb, Jun, Oct (see KB51560) Case for Keeping Current Latest codebase is best Software landscape is constantly maturing and changing New fixes are put into next releases Management effort made easy Difficulty maintaining multiple versions Difficulty maintaining upgrade paths for older versions Many fixes cannot be backported to earlier versions 35 Increasing Host IPS Management Success

36 More questions? Go to community.mcafee.com click on Business then Host Intrusion Prevention under the Endpoint Security section Thank You for Attending!

37

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Host Intrusion Prevention Administration Course

McAfee Host Intrusion Prevention Administration Course McAfee Host Intrusion Prevention Administration Course Education Services administration course The McAfee Host Intrusion Prevention Administration course provides attendees with indepth training on the

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes 10.5.3 Contents About this release What's new Resolved issues Installation information Known issues Getting product information by email Where to find product documentation About this release

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security

McAfee Endpoint Security McAfee Endpoint Security Frequently Asked Questions Overview You re facing new challenges in light of the increase of advanced malware. Limited integration between threat detection, network, and endpoint

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Vendor: McAfee. Exam Code: MA Exam Name: McAfee Certified Product Specialist - HIPs. Version: Demo

Vendor: McAfee. Exam Code: MA Exam Name: McAfee Certified Product Specialist - HIPs. Version: Demo Vendor: McAfee Exam Code: MA0-102 Exam Name: McAfee Certified Product Specialist - HIPs Version: Demo QUESTION 1 Which of the following policy categories are considered to be mufti-slot policies? (Select

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Release Notes McAfee Application Control 6.1.2

Release Notes McAfee Application Control 6.1.2 Release Notes McAfee Application Control 6.1.2 About this release New features Resolved issues Install and upgrade instructions Known issues Product documentation About this release This document contains

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Endpoint Upgrade Assistant 1.5.0

McAfee Endpoint Upgrade Assistant 1.5.0 Release Notes McAfee 1.5.0 For use with epolicy Ochestrator Contents About this release What s new Resolved issues Installation information Known issues Additional information Getting product information

More information

McAfee Endpoint Security Installation Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Installation Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Endpoint Intelligence Agent 2.2.0

Endpoint Intelligence Agent 2.2.0 Release Notes Endpoint Intelligence Agent 2.2.0 Revision A Contents About this release New features Resolved issues Installation instructions Known issues Find product documentation About this release

More information

McAfee Application Control/ McAfee Change Control Administration

McAfee Application Control/ McAfee Change Control Administration McAfee Application Control/ McAfee Change Control Administration Education Services Administration Course The McAfee University McAfee Application Application Control/McAfee Change Control Administration

More information

McAfee Policy Auditor Installation Guide

McAfee Policy Auditor Installation Guide McAfee Policy Auditor 6.4.0 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Application Control 6.2.0

McAfee Application Control 6.2.0 Best Practices Guide McAfee Application Control 6.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision E McAfee Network Security Platform (9.1.7.11-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes) Contents About this release New features Enhancements Resolved issues Installation

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.96-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

McAfee Endpoint Security Firewall Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Firewall Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Firewall Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.3.6 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 Revision B McAfee Network Security Platform 9.2 (9.2.7.9-9.2.7.10 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Release Notes McAfee Change Control 8.0.0

Release Notes McAfee Change Control 8.0.0 Release Notes About this release New features Installation instructions Resolved issues Known issues Find product documentation Product documentation About this release This document contains important

More information

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments

More information

McAfee Endpoint Security Threat Prevention Product Guide - Windows

McAfee Endpoint Security Threat Prevention Product Guide - Windows McAfee Endpoint Security 10.6.0 - Threat Prevention Product Guide - Windows COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Embedded Control

McAfee Embedded Control McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Deploying the hybrid solution

Deploying the hybrid solution Deployment Guide McAfee Web Protection Hybrid Deploying the hybrid solution A McAfee Web Protection license provides all components needed to set up McAfee Web Gateway and McAfee Web Gateway Cloud Service

More information

McAfee Exploit Prevention Content Release Notes New Windows Signatures

McAfee Exploit Prevention Content Release Notes New Windows Signatures McAfee Exploit Prevention Content 7616 Release Notes 2017-03-14 Content package version for - McAfee Host Intrusion Prevention: 8.0.0.7616 Endpoint Security Exploit Prevention: 10.5.0.7616 Below is the

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.3.40 NTBA Appliance Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation Instructions Known issues Product

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018 How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Installation Guide Revision B. McAfee Active Response 2.2.0

Installation Guide Revision B. McAfee Active Response 2.2.0 Installation Guide Revision B McAfee Active Response 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Tenable for McAfee epolicy Orchestrator

Tenable for McAfee epolicy Orchestrator HOW-TO GUIDE Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision B McAfee Network Security Platform (9.2.9.3-9.2.5.34 Manager-NS3500 Release Notes) Contents About this release New Features Resolved issues Installation instructions Known issues Product documentation

More information

McAfee epolicy Orchestrator 5.x

McAfee epolicy Orchestrator 5.x Release Notes Hotfix 1241557 McAfee epolicy Orchestrator 5.x Contents About this release Resolved issues Installation information Additional information Getting product information by email Find product

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.3.124-2.11.9 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo New Deployments Only Windows Deployment

POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo New Deployments Only Windows Deployment POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo 5.0.1 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process

More information

McAfee Security for Microsoft SharePoint Hotfix

McAfee Security for Microsoft SharePoint Hotfix Release Notes McAfee Security for Microsoft SharePoint 3.5.0 Hotfix 1217273 For use with McAfee epolicy Orchestrator Contents About this release Resolved issues Files included with this release Installation

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Product Guide Revision A. Endpoint Intelligence Agent 2.2.0

Product Guide Revision A. Endpoint Intelligence Agent 2.2.0 Product Guide Revision A Endpoint Intelligence Agent 2.2.0 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Understanding the McAfee Endpoint Security 10 Threat Prevention Module

Understanding the McAfee Endpoint Security 10 Threat Prevention Module Understanding the McAfee Endpoint Security 10 Threat Prevention Module Key enhancements and new capabilities 1 Understanding the McAfee Endpoint Security 10 Threat Prevention Module Table of Contents 3

More information

BUFFERZONE Advanced Endpoint Security

BUFFERZONE Advanced Endpoint Security BUFFERZONE Advanced Endpoint Security Enterprise-grade Containment, Bridging and Intelligence BUFFERZONE defends endpoints against a wide range of advanced and targeted threats with patented containment,

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Vulnerability Manager 7.0.1

McAfee Vulnerability Manager 7.0.1 McAfee Vulnerability Manager 7.0.1 The McAfee Vulnerability Manager quarterly release brings important functionality to the product without having to wait for the next major release. This technical note

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.52-8.3.3.27-2.11.9 Manager-XC-Cluster Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision A McAfee Network Security Platform 8.1 (8.1.7.105-8.1.5.219 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.5.20 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes McAfee epolicy Orchestrator 5.9.1 Release Notes Contents About this release What's new Resolved issues Known issues Installation information Getting product information by email Where to find product documentation

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes September Update McAfee Endpoint Security 10.5.4 For use with epolicy Orchestrator Contents Rating Resolved issues Installation instructions Note: If the versions of 10.5.4 is prior to September

More information

Release Notes McAfee Change Control 7.0.0

Release Notes McAfee Change Control 7.0.0 Release Notes McAfee Change Control 7.0.0 About this release Release highlights Feature details Installation instructions Resolved issues Known issues Find product documentation Product documentation About

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.9-9.2.7.17 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision A McAfee Network Security Platform 9.1 (9.1.7.63-9.1.7.12 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.82-8.1.3.100 Manager-M-series Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.5-8.1.3.10 NTBA Appliance Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Find

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.3 Manager-NTBA Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

BUFFERZONE Advanced Endpoint Security

BUFFERZONE Advanced Endpoint Security BUFFERZONE Advanced Endpoint Security Enterprise-grade Containment, Bridging and Intelligence BUFFERZONE defends endpoints against a wide range of advanced and targeted threats with patented containment,

More information

Release Notes McAfee Application Control 6.1.0

Release Notes McAfee Application Control 6.1.0 Release Notes McAfee Application Control 6.1.0 About this document New features Known issues Resolved issues Installation instructions Find product documentation About this document Thank you for choosing

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

McAfee Data Loss Prevention Endpoint 10.0

McAfee Data Loss Prevention Endpoint 10.0 Release Notes Revision A McAfee Data Loss Prevention Endpoint 10.0 Hotfix 10.0.330 For use with McAfee epolicy Orchestrator Contents About this release What's new Installation instructions Known issues

More information

McAfee Virtual Network Security Platform 8.4 Revision A

McAfee Virtual Network Security Platform 8.4 Revision A 8.4.7.101-8.3.7.18 Manager-Virtual IPS Release Notes McAfee Virtual Network Security Platform 8.4 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes. Introducing MVISION Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls Jon Parkes McAfee 1 All information provided here is subject to non-disclosure

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Intelligent, Collaborative Endpoint Security

Intelligent, Collaborative Endpoint Security Intelligent, Collaborative Endpoint Security Improves Detection and Protection and Slashes User Impact US Insurance Company Customer Profile A leading American insurer Industry Financial IT Environment

More information

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Configuring Antivirus Devices

Configuring Antivirus Devices CHAPTER 9 Revised: November 11, 2007 Antivirus (AV) devices provide detection and prevention against known viruses and anomalies. This chapter describes how to configure and add the following devices and

More information

McAfee Security-as-a-Service

McAfee Security-as-a-Service Troubleshooting Solutions Guide McAfee Security-as-a-Service For use with epolicy Orchestrator 4.6.0 Software This guide provides supplemental information related to installing and using the McAfee Security-as-a-Service

More information