You must use ePolicy Orchestrator to configure and manage Host Intrusion Prevention, which consists of these basic tasks:
Use the Host Intrusion Prevention installer to check in the Host Intrusion Prevention NAP file (server UI), policy data with default signatures and rules, and reports to the ePolicy Orchestrator Repository. Check in the Host Intrusion Prevention agent package to the ePolicy Orechestrator Repository. For details, see the Host Intrusion Prevention 6.0 Installation Guide.
Use the ePolicy Orchestrator console to deploy Host Intrusion Prevention agents to computers in the Directory console tree. For details, see the ePolicy Orchestrator 3.6 Product Guide.
Configure the IPS, firewall, application blocking, and general policies you want to apply to the agents. The default settings in each policy provide basic protection, but for tighter security you need to tune the deployment and configure policy to fit your environment. See the appropriate chapters in this guide for details.
Ownership is assigned in the Policy Catalog, For details see the ePolicy Orchestrator 3.6 Product Guide.
ePolicy Orchestrator sends update information to Host Intrusion Prevention agents. The agents enforce the policies, collect event information, and transmit the information back to ePolicy Orchestrator. The interaction between agent and server is determined by the ePolicy Orchestrator agent policy settings. For details, see the ePolicy Orchestrator 3.6 Product Guide.
For details, see the ePolicy Orchestrator 3.6 Product Guide.
Information on Host Intrusion Prevention agent activity is sent to ePolicy Orchestrator and stored in its database. Use the console to run reports on Host Intrusion Prevention protection.
For more information on using Host Intrusion Prevention with ePolicy Orchestartor, see the following topics: