Loading...

Knowledge Center


Differences between Endpoint Protection for Mac 2.x Firewall and Host Intrusion Protection for Windows 8.0 (firewall)
Technical Articles ID:   KB78546
Last Modified:  5/18/2016
Rated:


Environment

McAfee Endpoint Protection for Mac (EPM) 2.x
McAfee Host Intrusion Prevention (Host IPS) 8.x

Apple Mac OS X 10.7.x (and later)

Summary

When you configure EPM 2.x through ePolicy Orchestrator (ePO), not all features and options available in the HIPS Firewall extension are applicable to EPM.

Check the following table to find the supported features for Mac and see the differences between Host IPS and EPM:

Feature

EPM 2.x

HIPS

Firewall Rules: Rule name

Firewall Rules: Rule Action

Firewall Rules: Treat match as intrusion

Firewall Rules: Log matching traffic

Firewall Rules: Direction

Firewall Rules: Status

Firewall Rules: Any protocol

Firewall Rules: IPv4

Firewall Rules: IPv6

Firewall Rules: Non-IP Protocol

Firewall Rules: Media Types

Firewall Rules: Add an IPv6 Address (Local/Remote)

Firewall Rules: Add IP Address options: Single, Subnet, Local Subnet, Range, Trusted, Full qualified domain name, Any local IP address, Any IPv4 address (Local/Remote)

Firewall Rules: Transport Protocol Common: TCP, UDP, ICMP, All Protocols

Firewall Rules: Transport Protocol Common: ICMP v6

Firewall Rules: Transport Protocol: Others

Firewall Rules: ICMP v4 Options: All, Echo Request, Echo Reply

Firewall Rules: ICMP v4 Options: Other than Echo Request, Echo Reply and All

Firewall Rules: Application Association

Firewall Rules: Rule Scheduling

Client UI: General Settings

Client UI: Advance Options

Client UI: Troubleshooting: Activity log size, IPS Logging, Enable IPS Engines

Client UI: Troubleshooting: Firewall logging

Trusted Networks: Enable/Disable

Trusted Networks: Definition

Trusted Networks: Trust for IPS

Firewall Options: Enable/Disable

Firewall Options: Regular Protection

Firewall Options: Adaptive mode

Firewall Options: Learn mode

Firewall Options: Allow traffic for unsupported protocols

Firewall Options: Allow bridged traffic

Firewall Options: Retain Client Rules

Firewall Options: Startup Protection

Firewall Options: IP Spoofing

Firewall Options: Send event for Trustedsource violations

Firewall Options: Incoming/outgoing Trustedsource block threshold

Firewall Options: Use FTP protocol inspection

Firewall Options: TCP Connection Timeout

Firewall Options: UDP and ICMP echo virtual connection timeout

DNS Blocking

HIPS Policy: Category IPS and Trusted Applications

Firewall Groups: Rule name

Firewall Groups: Direction

Firewall Groups: Status

Firewall Groups: Any protocol

Firewall Groups: IPv4

Firewall Groups: IPv6

Firewall Groups: Non-IP Protocol

Firewall Groups: Nested Groups

Firewall Groups: Media Types

Firewall Groups: Add an IPv6 Address (Local/Remote)

Firewall Groups: Add IP Address options: Single, Subnet, Local Subnet, Range, Trusted, Full qualified domain name, Any local IP address, Any IPv4 address (Local/Remote)

Firewall Groups: Transport Protocol Common: TCP, UDP, ICMP, All Protocols

Firewall Groups: Transport Protocol Common: ICMP v6

Firewall Groups: Transport Protocol: Others

Firewall Groups: ICMP v4 Options: All, Echo Request, Echo Reply

Firewall Groups: ICMP v4 Options: Other than Echo Request, Echo Reply and All

Firewall Groups: Application Association

Firewall Groups: Rule Scheduling

Firewall Groups: Location Status (Enable/Disable)

Firewall Groups: Location Name

Firewall Groups: Connection Isolation

Firewall Groups: ePO Reachability

Firewall Groups: Connection Specific DNS Suffix

Firewall Groups: Default Gateway

Firewall Groups: DHCP Server

Firewall Groups: DNS Server

Firewall Groups: Primary WINS

Firewall Groups: Secondary WINS

Firewall Groups: Registry Key

Rate this document

Glossary of Technical Terms


 Highlight Glossary Terms

Please take a moment to browse our Glossary of Technical Terms.