© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Polices Configuring Groups
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Objectives At the end of this lesson, you will be able to meet these objectives: Identify the advantages of grouping hosts Describe how to configure a group
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Groups Desktops Group Web Servers Group Mail Servers Group Desktops Group Policies Mail Servers Group Policies Web Servers Group Policies CSA MC
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Grouping Criteria System function Business groups Geographical or topological location Importance to your enterprise
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups (Cont.)
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Mandatory Group Enrollment A registered host must be enrolled in one of these architectural groups based on its operating system: Windows Solaris Linux
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating and Distributing Rule Programs
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Summary To protect the hosts on a network, you need to apply a set of security policies to each host. Host groups streamline the process of assigning security policies to several hosts at once. Hosts with similar security requirements are placed in a group. Security policies are made up of sets of rules. Policies govern the hosts in a group. To distribute the CSA MC configuration changes to the Agents, you need to generate rule programs.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v