Adding a HIPS Agent Policy
You can add a policy to manage the HIPS agents.
- Select Policy from
the main menu on the top side of the web screen.
- Select Policy > Security
Program Policy tab.
- Click Add > HIPS/FW
Policy > HIPS Agent Policy. Set required information in
Agent.
- On the Agent
tab, you can configure the settings you need for the agent. First
enter the interval for checking the integrity of the agent.
- Select the Enable
HIPS Self-Defense checkbox to protect other programs from accessing
the install folder, process or registry of the HIPS agent.
- Select to Use
HIPS Watchdog service to check for any abnormal behaviors on
the agent.
- Specify whether to allow the user to uninstall
the agent. Available values are: Allow
after password input, Always
allow or Always deny.
- Specify the settings for log retention including
the maximum length and size of storing the logs.
- Click Save
and go to the Update settings
tab.
- To automatically check for the agent updates,
select the Enable automatic updates
checkbox and specify the interval for checking for updates.
- You can also enable updates to occur at a regular
interval. To do so, select the Enable
scheduled updates checkbox and select the repetition interval.
- In case the agent fails to connect to the server
for updates, specify the maximum limit for retrying the update under
Update Retry. You can enter
a value between 1 and 99.
- Click Save
and go to the Network Engine
settings tab.
- Select the mode for processing the packets of
the network engine.
- Inline: Processes the packet directly. This
is the generally used mode.
- Tab: Processes the packet separately after
copying the packet. This mode reduces traffic by minimizing delays
and conducts detection only.
- Bypass: Processes the packet by bypassing the
engine during an emergency such as engine failures and network failures.
- Select the Enable
oversubscription checkbox to process packets by forwarding
any volumes that exceed the amount that can be handled by the IPS.
This feature allows a stable processing of packets.
- Click Save
and go to the Internal Network
settings tab.
- To set an internal network to apply the IPS
and firewall policy, click Add.
- Enter a name for the network and the IP
address in the IPv4, IPv6, CIDR, or IP range format. E.g. 192.168.0.12,
2002:9b3d:1a32:4:208:74ff:fe39:6c43
- Enter a description for the network and click
OK to add to the list.
- Click Save
and go to the Exception IP
settings tab.
- To exclude an IP from the IPS and firewall policy,
click Add.
- Enter a name for the IP and the IP address in
the IPv4, IPv6, or CIDR format. E.g. 192.168.0.12, 2002:9b3d:1a32:4:208:74ff:fe39:6c43.
- Enter a description for the IP and click OK
to add to the exceptions.
- Click Save.