Product guide
3
Click New Policy, type a name for the policy, then click OK.
4
On the Firewall Rules page, click New Group, type a name for the group, select Direction and Status, then
click Next.
5
On the Location tab, define the options according to your requirements, then click Next.
6
On the Network Options tab, define the needed options, then click Next.
7
On the Transport Options tab, define the Transport protocol, click Save, then click the Summary tab.
The Application and Schedule pages are used only for Windows configuration.
8
Verify the configuration details, then click Save. The rule group appears on the Firewall Rules page.
9
Select the rule group, then click
to expand the rule group.
10
Select the rule that you want to move to the rule group, then click Move Up or Move Down according to
the rule's position toward the rule group, until the rule is moved into the rule group.
• Click Move Up if the rule appears after the rule group.
• Click Move Down if the rule appears before the rule group.
Always expand the rule group before moving rules into the group. Otherwise, the rules are not
placed inside the rule group.
Create a DNS blocking policy
Create policies to block access to unwanted domains.
Task
For option definitions, click ? in the interface.
1
Log on to the ePolicy Orchestrator server as an administrator.
2
From the Policy Catalog, select Host Intrusion Prevention 8.0: Firewall as the product, then select DNS Blocking
(Windows, Mac) as the category.
3
Click New Policy, type a name for the policy, then click OK to open the policy page.
4
In Blocked Domains, type the domain name, click
, then click Save.
You can add more domains in a single policy by clicking
.
Create a trusted networks policy
The trusted networks policy maintains a list of network addresses and subnets that you can tag as
trusted. You can then apply the firewall rules to the tagged addresses.
You can include the local subnet address (with respect to the IP address of the managed Mac) as part
of the trusted list. Additional subnets and single IP addresses can be added or removed from this list
as needed.
Managing the software with ePolicy Orchestrator
Create a DNS blocking policy
5
McAfee Endpoint Protection for Mac 2.1.0 Product Guide
67