McAfee 6.1 Marine Radio User Manual


 
188
McAfee
®
Host Intrusion Prevention 6.1 Product Guide Glossary
behavioral rule
IPS rule that defines a profile of legitimate activity. Activity that does not match the profile triggers an
event.
See also signature.
blocked host
A specific host from which Host Intrusion Prevention allows you to block communication; it attempts to trace
the source of the packets received from the blocked host.
branch
Locations on the master repository that allow you to store and distribute different versions of selected
updates.
See also selective updating.
brute force
A hacking method used to find passwords or encryption keys by trying every possible combination of
characters until the code is broken.
buffer overflow attack
The method of overfilling a software buffer to insert and execute some other code with elevated privileges,
often a shell from which further commands can be issued.
camping out
A hacking technique of breaking into a system, and then finding a safe place from which to monitor the
system, store information, or re-enter the system at a later time.
category
A division of an Host Intrusion Prevention feature to which you can assign a policy. For example, the IPS
feature includes an IPS Options, IPS Protection, and IPS Rules category.
check in, checking in
The process of adding files to the master repository.
client computer
A computer on which the ePolicy Orchestrator agent and Host Intrusion Prevention client is installed.
client rules
An IPS, Firewall, or Application Blocking rule created on a client to allow legitimate activity that is otherwise
blocked. Client rules are not part of a server-side policy but can be moved to a policy for application to other
clients.
common framework
The architecture that allows different McAfee products to share the common components and code, which
are the Scheduler, AutoUpdate, and the ePolicy Orchestrator agent.
complete properties
The entire set of properties being exchanged during agent-to-server communication.
See also incremental properties.
computers
In the console tree, the physical computers on the network managed by ePolicy Orchestrator. Computers can
be added under existing sites or groups in the Directory.
configuration settings
See policy.
console tree item
The individual icons in the console tree of the ePolicy Orchestrator console.