Visão Geral
Este curso fornece um conhecimento profundo sobre a implementação e gestão de uma solução de Prevenção de Intrusão Host, utilizando o software McAfee ePolicy Orchestrator.
Através de uma mistura de laboratórios práticos e palestras interactivas, aprenderá como esta solução utiliza uma série de regras de protecção, marcação e reacção de dispositivos para salvaguardar informação sensível e melhorar a segurança geral dos dados.
Conteúdo Programatico
Introduction to McAfee Host Intrusion Prevention
- Protection Levels
- New Features
- Host Intrusion Prevention
- Vulnerabilities, Exploits, Buffer Overflows, Attacks, Threats
Security Connected and ePolicy Orchestrator Overview
- The manifestation of Security Connected
Managing Dashboards and Monitors
- Concurrent Users (Console Connections)
- Resizing, Moving, and Removing Monitors
- Changing the Default Session Timeout
- Adding Monitors to a Dashboard
- Editing the Automatic Refresh Interval
- Dashboard Permissions Guidelines
- Types of Dashboards
- Duplicating and Adding Dashboards
- Assigning Default Dashboards
- Results of Load
- Accessing the Dashboards Page
- Deleting a Dashboard
- Configuring Dashboard Monitors
McAfee Agent
- Forcing McAfee Agent Activity from ClientAgent Files and Directories
HIPS Server Planning and Installation
- Checking in the Host IPS Client
- Adding Software to the Master Repository
- Upgrading and Migrating Policies
- HIPS Installation on the ePO Server
- Installing Host IPS Extensions on the ePO Server
- Package into the Master Repository
Windows Host IPS Client
- Allowing the Disable of Features
- Installing the Client Remotely using ePO and Directly on the Client Computer
- Responding to Spoof Detected Alerts
- Client Services and Client-side Component Relationship
- Downgrading and Removing the Client
- Verifying the Client is Runnin
- Registry Implementation
- Verifying Host IPS Events are Triggered Correctly
- Direct Client-Side Management
- Host IPS installation requirements
- Investigating Performance Issues
- Unlocking the Windows Client Interface
- Post-Installation Client Changes
- Managing IPS Protection, Rules, Host Firewall Policy Options, and Blocked Hosts List
- Client Logging and Troubleshooting
- Enabling Timed Group
Host IPS General Policies
- Working with Multiple Instance Policies
- General Policies Overview
- Enabling Advanced Functionality and Client Control
- Trusted Networks Policy and Trusted Application
- Creating and Editing Executables
- Marking Applications as Trusted
- Configuring the Client User Interface Policy
- Configuring Display Options
Intrusion Prevention Policies
- IPS Options, Protection, Rules
- Using Preconfigured Policies
- Setting Protective Reaction for Signature Severity Levels
- Configuring IPS Options
- Intrusion Prevention Overview
- Creating and Editing Policies
- Benefits of Host Intrusion Prevention
- Moving from Basic to Advanced Protection
IPS Rules Policies
- Multiple Instance Policies and the Effective Policy
- Working with IPS Rules Policies and Signatures
- IPS Protection with IPS Rules Policies
- Host and Network IPS Signature Rules
- Signatures and Severity Levels
- Host Intrusion Prevention Clients
- Overview of the IPS Rules
- Signature and Behavioral Rules
- Multiple Instance Policies
- Effective Policy for IPS Signatures
- VirusScan Access Protection and IPS Rules
IPS Rules Policies – Application Protection
- Application Blocking and Hooking
- Create, Editing or Viewing Executable Details
- Blocking and Allowing Application Hooking
- Process Hooking
- Prevent an Executable from Running (Black List)
- Customizing and Managing Rules
Configuring IPS Exceptions
- Adjusting Signature Severity Levels
- Exception Rules
- Configuring IPS Rules Exceptions
- Tuning Methods
- Creating Trusted Applications
- Creating Exceptions for Network IPS Rules
- Applying OS Patches
Working with IPS Events
- IPS Signature Events
- Creating Event-based Exceptions
- Viewing Systems on which Selected Events Occur
- Viewing Common Vulnerabilities and Exposures (CVE) Information
- General Methodology for Reviewing Updates, Patch Systems and Applications
- Viewing Host IPS Events
- Creating an Exception Based on a Selected Event
- List of the HIPS Events Supported by ePO
- Events and Event Logging
Creating IPS Client Rules
- Adaptive Mode Sequence
- Using the Property Translator Server Task
- Retaining Existing Client Rules
- IPS Client Rules Overview
- Create Exceptions Using IPS Client Rules
- Adaptive Mode
- Refining Policies Based on Use
- Learning Mode
- Managing IPS Client Rules
- Reviewing Detail for IPS Client Rules
- Placing Clients in Adaptive or Learn Mode
Custom Signatures
- Creating a Custom Signature
- Creating Windows/Unix Files and Directories
- Creating Signatures-Windows Registry
- Adding and Editing Sub-rules
- Using the Signature Creation Wizard
- Methods for Creating Custom Signatures
- Using the Linux or Solaris Option to Create Signatures
- Editing the Severity Level, Client Exception Permission, and Log Status of a Signature
- Troubleshooting Custom Signatures
- File Rule Types and Examples
- Custom Signatures Components
- Custom Signatures Overview
- Viewing General Information about Signature
Automatic Responses and Threat Notification
- Determining Events Forwarding
- Creating Issues Executing Scheduled Tasks, and Running External Commands.
- Throttling and Aggregation
- Automatic Response Process
- Event Types, Formats, and Life Cycle
- Creating, Editing, Viewing, and Deleting Automatic Responses for Specific Event Types
- Creating and Editing Automatic Responses
- Creating Contacts
- Setting Filters, Aggregating Events, and Configuring Rule Actions
- Automatic Responses Permission Set
- Threat Notification and Tracing
- Variables Used in Notifications
- Default Automatic Response Rule
Firewall Policies
- Host IPS Firewall Overview
- Working with Firewall Options Policies
- Understanding the State Table
- Firewall DNS Blocking
- trusted source/Global Threat Intelligence
- Firewall Protocol Support
- Allowing Unsupported Protocols and Bridged Traffic
- How Firewall Rules Work
- Stateful Filtering and Protocol Tracking
- Startup Protection and Protection Options
Firewall Rules Policies
- Responding To Firewall Alerts
- Basic Design Philosophies
- Firewall Design Considerations
- Using the Firewall Rule Builder
- Typical Corporate Environment Policy
- Stateful Filtering in Adaptive or Learn Mode
- Creating Firewall Rule Groups
- Firewall Planning
- Adding Rules from the Catalog
- Firewall Theory
- Creating New Firewall Rule
- Configuring Firewall Policies
- Using the Host IPS Catalog
- Managing Firewall Client Rules
- Adaptive Mode versus Learn Mode
- Firewall Rules Console
- Firewall Groups
Firewall Rule Groups
- Connection-aware Firewall Groups
- Matching for Location-Aware Groups
- Timed Groups in Firewall Policy
- Location-enabled Firewall Groups
- Host IPS Firewall Groups
Host Intrusion Prevention Maintenance
- Creating Custom Host IPS Queries
- Running Predefined Host IPS Queries
- Client-side Policy Reporting
- McAfee Agent Update Task
- Dashboards and Queries
- Generating Host IPS Reports/Queries
- Clearing Events
- Server Tasks in ePO
- Manual Content Updating
- Creating an ePO Server Pull Task
- Vulnerability Shielding Updates
- Testing McAfee Host Intrusion Prevention Client
- McAfee Internet Sites
Host IPS Implementation and Best Practices
- Run Queries
- Best Practices with Adaptive Mode
- Potential Pitfalls in IPS Deployments
- Using ePolicy Orchestrator
- Lab or Real World?
- Notify End Users and Plan Escape Hatches
- Step 7: Maintenance and Expansion Beyond IPS
- Step 2: Prepare the Pilot Environment
- Step 6: Enhanced Protection and Advanced Tuning
- Pre-Installation Considerations and Deployment Planning
- Step 4: Initial Tuning
- Multiple Policy Instances
- Enlist the Help Desk Team
- Timing and Expectations
- Adaptive Mode: Refine Policies Based on Use
- Follow these Processes
- Step 5: Optional Adaptive Mode
- Adaptive Mode Limitations
- Create Trusted Applications
- Server Maintenance
- Confirm Your Rollout Strategy
- Install Host IPS to Pilot Hosts
- Step 1: Strategy and Planning
- Out-of-the-Box” Protection
- Check Pilot Systems for Proper Operation
- Managing Protection
- Understanding Adaptive Mode
- More Tuning
- Domain Controllers and Host IPS
- Create Exceptions
- Step 3: Installation and Initial Configuration
- Heightened Protection and Advanced Tuning
- Fine-Tuning Policies
- Security Tightening
- Host IPS Configuration and Initial Tuning
ClientControl Utility
- Argument – /help
- Argument- /exportConfig
- Argument – /export
- Argument – /execInfo
- Argument – /defConfig
- Argument – /log
- ClientControl Logging
- Stopping Host IPS Services
- Major Arguments
- Argument – /fwPassthru
- Argument – /engine
- Argument – /readNaiLic
- Deploying Host IPS with 3rd Party Product
- Command Line Syntax
- Argument – /start and /stop
- Argument – /startupIPSProtection
- fwinfo Utility
Linux Client
- Troubleshooting the Linux Client
- Verifying Linux Installation Files
- Removing the Linux Client
- Stopping and Restarting the Linux Client
- HIPTS – Troubleshooting Tool
- Linux Client Installation Requirements
- Notes about the Linux Client
- Policy Enforcement with the Linux Client
Solaris Client
- Troubleshooting the Solaris Client
- Solaris Zone Support
- Removing the Solaris Client
- Verifying Solaris Installation Files
- Solaris Client Installation Requirements
- Policy Enforcement with the Solaris Client
- Installing the Solaris Client
- Stopping and Restarting the Solaris Client
Troubleshooting Host IPS Forums and Security Advisories
- Installation Issues
- Troubleshooting Host IPS
- Client Issues
- MERTool
- KnowledgeBase Articles for Host IPS
- Host IPS Engines
- Identify the Versions
- Applying Service Packs
- Verifying Policies – FireCore Policy
- Verifying Policies – Static Configuration
- McAfee Agent Logs
- Troubleshooting the Host IPS Firewall
- Policy Update Issues
- Escalation Process
- Activity Log
- Troubleshooting Firewall Issues
- Verifying Policies – Dynamic Policy
- fwinfo.exe
- Policy, Event, and Client Rule Issues