Week 5 Flashcards
Two ways to access ESX
- cmd line
- Vsphere client
Primary means of accessing VMs
- console tab
- console window
What does HBSS provide?
- signature and behavior based threat protection
- desktop firewall
What does the McAfee Agent do?
Tells point products what to do
What does HIPS do?
Provides capability to block known intrusion systems
What does RSD do?
- Rogue System Detection
- Notifies admin of any rogue/no agent/wrong agent
What does VSE do?
Active
-protects hosts from viruses, worms, Trojans
What does DCM/DLP do?
Module is what allows/prevents plug and play and USB devices
What does ABM do?
- asset baseline monitor
- passive
- notifies admin when host goes against compose baseline
What does PA do?
- policy auditor
- passive
- notifies admin when policies set in ePO are not enforced on host
Where are polices applied?
System Tree
Characteristics of Lost and Found group
- Cannot be deleted
- Cannot be renamed
- Sorting criteria cannot be changed from being a catch-all group
- Always appears last
- Users must be granted permissions to see contents
- When a system is sorted into L&F, it is placed in a subgroup named for the systems domain. If it doesn’t exist, it will be created
What contains all the necessary information that a client will need to install the McAfee Agent and communicate with ePO server?
Framepkg.exe
What are the HIP sub-agents?
- buffer overflow
- logon
- SQL
- registry
- services
- files
- HTTP
- HIP API
- Get Admin
- Illegal Use
- Program
How often is detected network device information forwarded to the ePO server?
5 minutes
What allows HBSS admins to configure and manage the instances of the rogue system sensor installed throughout the network?
RSD Policy Settings
What are the system statuses?
- Exceptions
- Inactive
- Managed
- Rogue
What are the Rogue System Sensor Statuses?
- Active
- Missing
- Passive
How many Rogue System Sensors should you have?
2 per subnet
What are the Subnet Statuses?
- Contains rogues
- Covered
- Uncovered
What is a policy?
Collection of settings that are created, configured, and then enforced
How are policy settings grouped?
By product then by category
What are the stackable policy rules?
Firewall rules can’t be stacked and only one policy can be applied at a time
How often is policy enforcement?
30 minutes
Admins can assign policies by?
- site or group level
- single systems
- node with multiple policies
What does HIP do?
- Provides the ability to protect systems from attacks such as buffer overflows and privilege escalation
- uses the IPS signature base to identify threats to the host from both the network and application later perspective
What is the detection methodology?
HIP uses both signature and ananomly (behavior) based methods
Elements that HIPS examines
- system calls
- file system access
- system registry settings
- host input/output
- host network traffic monitoring
- shielding
- enveloping of applications
What are the general policies?
- Client UI
- Trusted Networks
- trusted applications
How to navigate to threat event log
Menu>reporting>threat event log
What is the trusted application policy?
When you mark an application as trusted, it helps to eliminate creating exceptions
What do the IPS options tell you?
Whether it is on or off
What does protect mode mean?
Blocks according to policy
What is adapted mode?
- Blocks all high severity events
- allows everything else
What does learned mode require?
User interaction
What are the components of HIP policy?
- general
- IPS
- Firewall
- Application Blocking
What are the policy categories under General?
- Client UI
- Trusted Networks
- Trusted Application
What is the purpose of a Client UI?
To configure the HIP Agent interface