
• Allows Windows file sharing requests from computers in the same subnet, and blocks file
sharing requests from anyone else. (The Trusted Networks policy must have Include Local
Subnet Automatically selected.)
• Allows you to browse Windows domains, workgroups, and computers.
• Allows all high incoming and outgoing UDP traffic.
• Allows traffic that uses BOOTP, DNS, and Net Time UDP ports.
Learning Starter
• Blocks incoming ICMP traffic that an attacker could use to gather information about your
computer. Host Intrusion Prevention allows all other ICMP traffic.
• Allows Windows file sharing requests from computers in the same subnet, and blocks file
sharing requests from anyone else. (The Trusted Networks policy must have Include Local
Subnet Automatically selected.)
• Allows you to browse Windows domains, workgroups, and computers.
• Allows traffic that uses BOOTP, DNS, and Net Time UDP ports.
Client High
Use this protection level if you are under attack or at high risk of an attack. This protection level
allows only minimal traffic in and out of your system.
• Allows only ICMP traffic necessary for proper networking. This protection blocks both incoming
and outgoing pings.
• Allows only UDP traffic necessary for accessing IP information (such as your own IP address
or the network time).
• Blocks Windows file sharing.
Minimal (Default)
• Blocks any incoming ICMP traffic that an attacker could use to gather information about
your computer. Host Intrusion Prevention allows all other ICMP traffic.
• Allows Windows file sharing requests from computers in the same subnet, and blocks file
sharing requests from anyone else. (The Trusted Networks policy must have Include Local
Subnet Automatically selected.)
• Allows you to browse Windows domains, workgroups, and computers.
• Allows all high incoming and outgoing UDP traffic.
• Allows traffic that uses BOOTP, DNS, and Net Time UDP ports.
Learning Starter
• Blocks incoming ICMP traffic that an attacker could use to gather information about your
computer. Host Intrusion Prevention allows all other ICMP traffic.
• Allows Windows file sharing requests from computers in the same subnet, and blocks file
sharing requests from anyone else. (The Trusted Networks policy must have Include Local
Subnet Automatically selected.)
• Allows you to browse Windows domains, workgroups, and computers.
• Allows traffic that uses BOOTP, DNS, and Net Time UDP ports.
Client High
Use this protection level if you are under attack or at high risk of an attack. This protection level
allows only minimal traffic in and out of your system.
• Allows only ICMP traffic necessary for proper networking. This protection blocks both incoming
and outgoing pings.
Configuring Firewall Policies
Working with Firewall Rules policies
McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.058
Commenti su questo manuale