Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Configuring Firewall Policies<br />
The Firewall policies of <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> protect computers by filtering all network<br />
traffic, allowing legitimate traffic through the firewall, and blocking the rest. Stateful filtering<br />
and packet inspection identify packets <strong>for</strong> different types of connections, and hold in memory<br />
the attributes of network connections from start-to-finish of transmission.<br />
Contents<br />
Overview of Firewall policies<br />
Working with Firewall Options policies<br />
Working with Firewall Rules policies<br />
Working with Quarantine Options policies<br />
Working with Quarantine Rules policies<br />
Overview of Firewall policies<br />
The <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> firewall protects a networked computer from intrusions that<br />
compromise data, applications, or the operating system. It protects by working at several layers<br />
of the network architecture, where different criteria are used to restrict network traffic. This<br />
<strong>McAfee</strong> <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> 7.0 <strong>Product</strong> <strong>Guide</strong> <strong>for</strong> use with ePolicy Orchestrator <strong>4.0</strong><br />
45