Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Configuring General Policies<br />
Working with Trusted Applications policies<br />
7 Click Save to apply all changes.<br />
Creating and editing Trusted Application rules<br />
Use this task to create a new trusted application or edit an existing one from the Trusted<br />
Applications policy page.<br />
Task<br />
For option definitions, click ? on the page displaying the options.<br />
1 On the Trusted Applications policy page, click Add Rule to create a new rule; click<br />
Edit under Actions to edit an existing rule.<br />
NOTE: You can also create trusted applications based on an event. For details, see Creating<br />
event-based exceptions and trusted applications.<br />
2 Type or edit the name and status of the application, including whether the application is<br />
trusted <strong>for</strong> IPS, firewall and application hooking.<br />
Figure 36: Trusted Application<br />
3 Type or edit the processes <strong>for</strong> the trusted application.<br />
4 Click OK to save changes.<br />
<strong>McAfee</strong> <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> 7.0 <strong>Product</strong> <strong>Guide</strong> <strong>for</strong> use with ePolicy Orchestrator <strong>4.0</strong><br />
85