Protect what you value. Understanding Permission Sets for Host Intrusion Prevention in McAfee ePolicy Orchestrator (ePO) 4.0 Abstract McAfee® ePolicy Orchestrator® (ePO™ ) allows security administrators to grant permission to users for specific products or features of a product. This centralized control for permission setting minimizes the risk of error by the security team. It also reduces the number of places an administrator has to go to make necessary changes to user permissions. This tech note explains: • How permission sets are defined in McAfee ePO • McAfee Host Intrusion Prevention (HIPS) permission sets • Various permission levels and what they mean to the user • How to easily assign and modify permissions Understanding Permission Sets in ePO A permission set in McAfee ePO is a group of permissions granted to a user account for specific products or features of a product. One can assign one or more permission sets to a user account. When multiple permission sets are applied to a user account, they are combined into one. For example, if one permission set does not provide any permission to server tasks, but another permission set applied to the same account grants all permissions to server tasks, then that account has all permissions to server tasks. For global administrators, all permissions to all products and features are automatically assigned. As a matter of fact, permission sets only grant permissions, they never remove permissions. Ways of Assigning Permission Sets in ePO There are two ways in ePO 4.0 that global administrators can assign permissions: 1.They can assign permission sets while creating or editing user accounts. 2.They can assign permission sets while creating or editing permission sets. Every point product adds a section to the permission sets. When the HIPS extension is installed, it also adds a section to the permission sets with “no permissions” applied by default. It’s up to the global administrator to make use of different permissions for HIPS and create new permission sets. Understanding HIPS Permission Sets When you install the HIPS extension, it adds the following permission set section on the Permission Sets page under the Configuration section of ePO Console: Technical Brief Host Intrusion Prevention 7.0 The following HIPS permissions appear on the page when you click on the Edit link for this permission set section: 1. Host Intrusion Prevention 7.0.0: Application Blocking 2. Host Intrusion Prevention 7.0.0: Firewall 3. Host Intrusion Prevention 7.0.0: General 4. Host Intrusion Prevention 7.0.0: IPS of the common set of permissions are: • No Permissions • View Settings • View and Change Settings How do different permissions work for these HIPS features? What a user is able to do when a particular permission is assigned to him is explained below: No Permissions If No Permissions is assigned for any of the above four features of HIPS, then the user will not be able to view any of the HIPS components in the ePO Console. As an example, an individual with these permissions will not be able to view or change any policies, events, or client rules related to HIPS. Use this permission if you do not want to give any type of permission related to HIPS to a particular user account in ePO. View Settings If View Settings is assigned for any of the above four features of HIPS, then the user will be able to view only the policies and client rules related to HIPS in ePO Console. When this permission is assigned, the user will not be able to change or edit any of the HIPS-related policies or client rules. For example, if you want to give an individual “view only” permission to the application blocking feature of HIPS, you would select the View Settings radio button for the Host Intrusion Prevention 7.0.0: Application Blocking component of the Host Intrusion Prevention 7.0 permission set section. By granting this permission, the user would be able to: 1.View the HIPS: Application Blocking policies only. 2.View the Host IPS tab under Reporting and view only the Application Blocking Client Rules. Note: If a user wants to see the assignments of HIPS Application Blocking policy for a particular node in the ePO directory tree, then you need to provide the following permissions for respective permission sections. The following permissions are also required to view the Host IPS tab under Reporting: 1.Systems: View System Tree tab. 2.System Tree access: Select the required Groups/My Organization on which you want to provide access to the user. View and Change Settings If View and Change Settings is assigned for any of the above four features of HIPS, then the user will be able to view and edit the policies, client rules, and events related to HIPS in ePO Console. This allows the user to modify or change any settings in the HIPS policy. Technical Brief For example, if you want to create a user who has View and Change Settings permissions for the firewall feature of HIPS, you would select the View and Change Settings radio button for the Host Intrusion Prevention 7.0.0: Firewall component of the Host Intrusion Prevention 7.0 section under Permissions Sets. By granting this permission, the user would be able to: 1.Edit, rename, duplicate, delete, and export the custom policies related to firewall feature of HIPS. 2.View and duplicate the default policies of the firewall. 3.View the Host IPS tab under the reporting section, and view or edit the Firewall Client Rules only. Note: In order to view the Host IPS tab under the reporting section, the following permissions should be assigned as well. 1.Systems: View System Tree tab. 2.System Tree Access permission. HIPS Permissions Assigned in ePO Default Permission Sets ePO 4.0 ships with four default permission sets that provide permissions to ePO functionality. The default permissions sets that are available for HIPS are: 1. Executive Reviewer: Provides view-only permissions to public dashboards, events, contacts, and public queries, and the ability to view information related to the entire system tree. HIPS Permissions • Does not have any kind of access to the HIPS extension • Users assigned with this permission set cannot access any features of HIPS 2. Global Reviewer: Provides view-only access globally across functionality, products, and the system tree, except for extensions, multi-server roll-up data, registered servers, and software. HIPS Permissions • Users assigned with this permission set can see the HIPS-related events under the Host IPS tab present in the Reporting section • Users can select these events to perform actions like Mark Hidden, Unhidden, Read, and Unread, and Show Related Systems • Users can view (not edit) the HIPS-related server task (provided the HIPS extension is installed) • Users can view the HIPS content package in the ePO Repository • Users can view (but not edit) the HIPS-related policies and its assignments 3. Group Admin: Provides view and change permissions across ePO features. Users that are assigned this permission set each require at least one more permission set that grants access to needed products and groups of the system tree. HIPS Permissions • Users assigned with this permission set can see the HIPS-related events under the Host IPS tab present in the Reporting section • Users can select those events to perform actions like Mark Hidden, Unhidden, Read, and Unread, and Show Related Systems • Users can view the HIPS content package in the ePO Repository Technical Brief • Users can modify HIPS-related policies and client tasks for the groups or nodes for which he has permissions • Users can view (but not edit) the HIPS-related server task (provided the HIPS extension is installed) • Users can create a new notification specifically for HIPS-related events 4. Group Reviewer: Provides view-only permissions across ePO features. Users that are assigned this permission set each require at least one more permission set that grants access to needed products and groups of the system tree. HIPS Permissions • Users assigned with this permission set can view only the HIPS-related server task (provided the HIPS extension is installed) Assigning Permissions to HIPS-Related ePO Features There are various other HIPS-related ePO features to which an individual can assign permissions. The following table shows a list of all the HIPS-related ePO features. To access these features, the user needs to have permissions assigned to the sections shown in the third column of the table. Based on what kind of permission you assign to these Additional Permission Sections, the user would be able to access the HIPS-related ePO features. HIPS-Related ePO Features Additional Permissions Required For? Is It Mandatory? HIPS dashboards Dashboards Yes HIPS queries Queries Yes HIPS client tasks Systems Yes System tree access HIPS server tasks Server tasks Yes HIPS packages in Repository Software Yes Let’s try to understand this with some real world examples: Scenario 1: A non-global admin user who has write access to a group called “APAC” in the directory tree. He has permissions only on two products, HIPS and McAfee Agent. This user should be able to view server tasks related to HIPS. Also this user should be able to use public dashboards and queries related to HIPS. This user should not have access to the repository. Lastly, this user should not be able to delete HIPS extension. Technical Brief A permission set that provides the user the access described above would look similar to the following: Resultant Permission Set: Name and users: APAC HIPS Admin Dashboards: Use public dashboards Extensions: No permissions HIPS: View and change settings for all the four features of HIPS under this permission section McAfee Agent: View and change settings Queries: Use public queries Server tasks: View server tasks; view server task log Software: No permissions Systems: “View Systems Tree” tab checked. System tree access: Can access the following nodes and portions of the system tree: APAC For rest of the permission sections, no permissions should be assigned. Note: APAC is the name of the group created under My Organization in the ePO system tree. Scenario 2: A help-desk admin who is able to change HIPS general settings to assign timebased passwords to a group of systems in an organization. Resultant Permission Set: Name and users: APAC Help Desk User Audit log: View audit log Dashboard: Use public dashboard; create and edit personal dashboard Event log: View events Queries: Use public queries; create and edit personal queries Extension: No permissions Data Sheet HIPS: View and change settings on HIPS: General McAfee Agent: View and change settings Software: View packages and repository Systems: "View System Tree” tab; edit system tree, groups, and systems System tree access: Can access the following nodes and portions of the system tree: APAC Note: APAC is the name of the group created under My Organization in the ePO system tree. If you create a new user and assign him this permission set, he should be able to access the group called “APAC” under My Organization of the ePO system tree and change the HIPS: General Policies. Since he can edit the HIPS: General Policies, this user now can assign timebased passwords to systems and sub-groups under “APAC.” Also, with other permissions assigned, this user can be treated as a help desk user who would typically be a site admin for a subset of systems in an organization. In this way, permissions sets can be used to assign permissions at product level or at the feature level of any point product. This flexibility in assigning permissions lets you to create users who can do very specific tasks on specific products and systems within the ePO Console. McAfee, ePolicy Orchestrator, ePO, and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other non-McAfee related products, registered and/ or unregistered trademarks contained herein is only by reference and are the sole property of their respective owners. © 2008 McAfee, Inc. All rights reserved. 18-na-cor-hipsuptb-001-0808
© Copyright 2026 Paperzz