
McAfee, Inc.
3965 Freedom Circle
Santa Clara, CA 95054
888 847 8766
www.mcafee.com
McAfee, Avert, ePolicy Orchestrator, ePO, and/or other noted McAfee related products contained herein are registered trademarks or
trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of
McAfee brand products. Any other non-McAfee related products, registered and/or unregistered trademarks contained herein is only by
reference and are the sole property of their respective owners. © 2009 McAfee, Inc. All rights reserved.
5345wp_tops_vse-hips_access-protection_0109
White Paper Access Protection in McAfee VirusScan Enterprise and
Host Intrusion Prevention
Rule type—Select the type of rule:
•
Key—This rule protects the specified key.
º
Value—this rule protects the specified value.
º
Registry actions to block—Select the actions you want the rule to block: read key/value, write
•
key/value, create key/value, delete key/value, or any combination of actions.
Read from key or value—Block reading from the specified key or value.
º
Write to key or value—Block writing to the specified key or value.
º
Create key or value—Block creating the specified key or value.
º
Delete key or value—Block deleting the specified key or value.
º
Summary
Access Protection, available in either McAfee VirusScan Enterprise or McAfee Host Intrusion Prevention,
proactively stops and removes threats, extends coverage for new security risks, and reduces the cost of
managing outbreak responses. Even without an update, it stops zero-day threats and mitigates your
window of vulnerability.
Enabling Access Protection rules gives you the flexibility to limit potential outbreak damage, even before
.DAT file is issued. You can also close ports, monitor applications and email engines, block files and
directories, and trace and block infection sources.
Access Protection prevents unwanted changes to your computer by restricting access to specified ports,
files and folders, shares, and registry keys and values. It also protects McAfee processes and services by
preventing users from stopping them. This protection is critical before and during outbreaks.
Kommentare zu diesen Handbüchern