
Best Practices for Quick Success
McAfee Host Intrusion Prevention delivers great value to your organization by reducing patching
frequency and urgency, preserving business continuity and employee productivity, protecting
data confidentiality, and supporting regulatory compliance. It offers signature and behavioral
intrusion prevention system (IPS) protection and a stateful firewall to protect all endpoints —
desktops, laptops, and servers — from known and unknown threats.
Getting started
Anything that touches users and business-critical applications needs to be deployed with care
to avoid disrupting business. We present here a breakdown of the rollout of the product into
small, manageable stages that raise protection levels carefully, allow fine-tuning of policies to
support business nuances, and minimize user change. This slow-but-steady approach provides
the maximum protection benefit for the minimum administrative effort, with an elapsed time
between one and three months.
If you have purchased both IPS and firewall protection, we suggest you start with the IPS
feature, unless regulatory or risk reasons make the firewall your first priority. The IPS function
offers critical, universally needed protection against known and zero-day threats. With McAfee
predefined policy settings and a modest investment in time, you can quickly get McAfee Host
Intrusion Prevention started protecting your systems against vulnerabilities and attacks.
If you have successfully the activated IPS protection, you are ready to focus with confidence
on activating the firewall. The piloting strategy described here is applicable in the firewall rollout,
although the specific policies, reaction responses, and rules vary.
NOTE: If you have purchased firewall protection only, or simply prefer to start with deployment
of a firewall, use the strategy described here, but see the product guide or help for details on
defining and activating firewall policies. The key is to roll out in stages, so we recommend this
order:
• IPS on laptops and standard desktops
• IPS on critical servers
• IPS on power-user desktops
• Firewall on laptops
• Firewall on servers
• Firewall on power-user desktops
Most administrators can perform the steps outlined here. If needed, contact McAfee partners
and service professionals to assist you.
The recommended sequence involves seven steps:
1 Strategy and planning
2 Preparing the environment
3 Installation and configuration
4 Initial tuning
11McAfee Host Intrusion Prevention 8.0 Installation Guide
Komentáře k této Příručce