This policy category contains a preconfigured policy, which provides a list of specific McAfee
applications and Windows processes. You can view and duplicate the preconfigured policy, or
edit, rename, duplicate, delete, and export custom policies.
Configuring a Trusted Applications policy
Configure settings in the policy to list applications deemed safe in a particular environment.
Task
For option definitions, click ? on the page displaying the options.
1
Click Menu | Policy | Policy Catalog and select Host Intrusion Prevention: General
in the Product list and Trusted Applications in the Category list. The list of policies
appears.
2
In the Trusted Applications policy list, click Edit under Actions to change the settings
for a custom policy.
3
Do any of the following:
Do this...
To...
Click Add Application. See Creating and editing
Trusted Application rules for details.
Add an application
Select them and click:
Perform an action on one or more applications at the
same time
•
Enable to enable a disabled application.
•
Disable to disable an enabled application.
•
Delete to delete applications.
•
Copy to to copy applications to another policy.
You are prompted to indicate the policy.
Click:
To perform an action on a single application
•
Edit to edit an existing application. See Creating
and editing Trusted Application rules for details.
•
Duplicate to make a copy of the application
within the same policy and named ‘copy of’ the
original application.
•
Delete to remove the application from the list.
4
Click Save to save changes.
Creating and editing Trusted Application rules
Edit existing or create new trusted applications to have a list of all applications deemed safe
for your environment.
Task
For option definitions, click ? on the page displaying the options.
Configuring General Policies
Define trusted applications
79
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5