24.10.2014 Views

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring Firewall Policies<br />

Working with Firewall Rules policies<br />

• Allows only UDP traffic necessary <strong>for</strong> accessing IP in<strong>for</strong>mation (such as your own IP address<br />

or the network time).<br />

• Blocks Windows file sharing.<br />

On the Policy Catalog policy list page, click New Policy to create a new custom policy; click<br />

Duplicate under Actions to create a new custom policy based on an existing policy.<br />

Change the policy’s assignment on the Policy Assignment page. For a group, go to Systems<br />

| System Tree, select a group, and then on the Policies tab click Edit Assignment.. For a<br />

system go to Systems | System Tree, select a group that contains the system, and then on<br />

the System tab, select the system and select More Actions | Modify Policies on a Single<br />

System.<br />

Tasks<br />

Configuring the Firewall Rules policy<br />

Creating and editing firewall rules<br />

Creating firewall rule groups<br />

Creating firewall connection-aware groups<br />

Adding predefined firewall rules<br />

Managing Firewall client rules<br />

Configuring the Firewall Rules policy<br />

Use this task to add, edit, or remove firewall rules and rule groups, and reorder the list of rules.<br />

Task<br />

For option definitions, click ? on the page displaying the options.<br />

1 On the Policy Catalog page, select <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong>: Firewall on the <strong>Product</strong><br />

list and select Firewall Rules on the Category list. The list of policies appears.<br />

2 Click Edit to make changes on the Firewall Rules page.<br />

Figure 20: Firewall Rules list<br />

3 Do any of the following:<br />

<strong>McAfee</strong> <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> 7.0 <strong>Product</strong> <strong>Guide</strong> <strong>for</strong> use with ePolicy Orchestrator <strong>4.0</strong><br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!