HBSS Banner

HBSS COMPONENTS

PRINT PAGE Add This
Sign up to receive HBSS email updates (restricted to .mil email addresses)

HBSS SERVER COMPONENTS


(ePO) Management Suite

  • Central security manager suite
  • Enables the installation, management, and configuration of the HBSS components
  • View reports to help monitor deployments, vulnerabilities and protection levels
  • For additional information, refer to the (ePO) Management Suite product page (use CAC email certificate).

HBSS SIM Connector

  • Speeds attack detection, diagnosis, & reporting
  • Provides situational awareness
  • For additional information, refer to the HBSS SIM Connector  product page (use CAC email certificate).

Asset Publishing Service (APS)

  • Queries the HBSS ePO database at regularly scheduled intervals, collects and mediates data in accordance with Computer Network Defense (CND) and NetOps data schemas, and publishes that data to the consumer endpoint.
  • For additional information, refer to the Asset Publishing Service (APS)  product page (use CAC email certificate).

Operational Attribute Module (OAM)

  • Allows assets managed by an ePO to be associated with the functional owner attributes such as AOR, CNDSP, CC/S/As , POC, etc.
  • For additional information, refer to the Operational Attribute Module (OAM) product page (use CAC email certificate).

Rollup Extender, Symantec Integration, & WSUS (use CAC email certificate).

HBSS CLIENT COMPONENTS


Asset Configuration Compliance Module (ACCM)

  • Gathers detailed asset inventory on all hosts and provides near-real time situational awareness of asset inventory
  • For additional information, refer to the Asset Configuration Compliance Module (ACCM) product page (use CAC email certificate).

Antivirus/Antispyware (AV/AS)

  • Protect assets from SPAM and Malware (e.g. viruses, tro­jan horses, worms, bots, and rootkits) by filtering e-mail.
  • Identify unsafe websites during searches.
  • Protects against identity theft by securing, storing, and managing login credentials and personal information.
  • Prevents hackers from eavesdropping and stealing information while you type (i.e. keylogging).
  • Automatically finds and fixes PC problems while preserving bandwidth
  • For additional information, refer to the Antivirus/Antispyware (AV/AS) product page (use CAC email certificate)

McAfee Agent (MA)

  • Provides local management of all HBSS products collocated on the host
  • Runs silently in the background to gather information and events from managed systems
  • Sends collected data to the ePO server
  • Manages modules and software updates of other HBSS products on the host system
  • Enforces policies on the host machines
  • For additional information, refer to the McAfee Agent (MA) product page (use CAC email certificate).  

Asset Baseline Monitor (ABM)

  • Generates snapshots of asset configurations to facilitate detection of changes made to authorized baselines
  • For additional information, refer to the Asset Baseline Monitor (ABM) product page (use CAC email certificate).

Device Control Module (DCM)
  • Prevents unauthorized USB and flash media devices from being plugged into End-Point systems
  • Allows restrictions and/or exceptions based on specific hardware ids, vendor ids and serial numbers
  • For additional information, refer to the Device Control Module (DCM) product page (use CAC email certificate).  

Host Intrusion Prevention System (HIPS)

  • Enforces security policy
  • Adds a robust layer of protection to the MA end-point asset that includes known and unknown buffer overflow exploit protection, prevention of malicious code installation/execution, and identification of activities that deviate from DoD or organizational policy
  • Firewall
  • For additional information, refer to the Host Intrusion Prevention System (HIPS) product page (use CAC email certificate).  

Rogue System Detection

  • RSD Agents actively monitor the network for DHCP requests and send this information to its server
  • Systems unknown to the server or that haven't checked in within a defined period of time are marked as "Rogue"
  • For additional information, refer to the Rogue System Detection product page (use CAC email certificate).    

Policy Auditor (PA)
  • Scans remote computers to determine compliance with defined policies
  • Identifies host vulnerabilities on the network
  • For additional information, refer to the Policy Auditor (PA) product page (use CAC email certificate).