24.10.2014 Views

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring Firewall Policies<br />

The Firewall policies of <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> protect computers by filtering all network<br />

traffic, allowing legitimate traffic through the firewall, and blocking the rest. Stateful filtering<br />

and packet inspection identify packets <strong>for</strong> different types of connections, and hold in memory<br />

the attributes of network connections from start-to-finish of transmission.<br />

Contents<br />

Overview of Firewall policies<br />

Working with Firewall Options policies<br />

Working with Firewall Rules policies<br />

Working with Quarantine Options policies<br />

Working with Quarantine Rules policies<br />

Overview of Firewall policies<br />

The <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> firewall protects a networked computer from intrusions that<br />

compromise data, applications, or the operating system. It protects by working at several layers<br />

of the network architecture, where different criteria are used to restrict network traffic. This<br />

<strong>McAfee</strong> <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> 7.0 <strong>Product</strong> <strong>Guide</strong> <strong>for</strong> use with ePolicy Orchestrator <strong>4.0</strong><br />

45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!