McAfee® Host Intrusion Prevention 6.1 Product Guide | IPS Policies |
| IPS Events |
4
You can create
Creating exceptions and trusted applications allows you to weed out false positive alerts, and ensures that the notifications you receive are meaningful communications.
Example
For example, during the process of testing clients, you may find clients recognizing the signature
You may also find, for example, that a number of clients are triggering the signature startup programs, which indicates either the modification or creation of a value under the registry keys:
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunOnce
As the values stored under these keys indicate programs that are started when the computer boots, recognition of this signature may indicate that someone is attempting to tamper with the system. Or it might indicate something as benign as one of your employees installing RealAudio on their computer. The installation of RealAudio adds the value RealTray to the Run registry key.
To eliminate the triggering of events every time someone installs authorized software, you create exceptions to these events. The client will no longer generate events to this authorized installation.
To create an event-based exception:
1Select an event and click Create Exception on the shorcut menu or the toolbar. A prefilled New Exception dialog box appears.
2Follow the directions for creating an exception in Exception Rules on page 42.
To create an event-based trusted application:
1Select an event and click Create Trusted Application on the shorcut menu or the toolbar.
A prefilled New Trusted Application dialog box appears.
2Follow the directions for creating a trusted application in Creating and applying Trusted Applications policies on page 112.
62