McAfee Host Intrusion Prevention for Server

McAfee Host Intrusion Prevention for Server

Proactive, zero-day protection for servers


McAfee Host Intrusion Prevention for Server proactively secures against known and new zero-day attacks. It boosts security and lowers costs by reducing the frequency and urgency of patching. Host Intrusion Prevention integrates with the McAfee ePolicy Orchestrator (ePO) platform for centralized reporting and management that’s accurate, scalable, easy to use, and works with other McAfee and non-McAfee security products.

Comprehensive security — Host Intrusion Prevention for Server uses multiple proven methods, including behavioral and signature analysis, plus a dynamic stateful firewall buttressed with global reputation technology to block emerging attacks.

Advanced vulnerability-shielding capabilities — Better protection against exploits that target new vulnerabilities means your IT staff has more time for planning, testing, and deploying patches.

Customized server protection – Host Intrusion Prevention for Server helps maintain server uptime with specialized protection for web and database servers.

Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Host Intrusion Prevention for Server uses the McAfee GTI file reputation service and network connection reputation service to find suspicious files before they are identified as carrying malicious payloads, as well as domains/IP addresses that are infected or hosting malware attacks, and block those attacks.

Features & Benefits

Keep your business safe, up, and running

Prevent intrusions, protect assets, and enforce intrusion prevention system (IPS) and zero-day threat protection coverage at all levels: network, endpoint, and application.

Save time and cut costs with simplified, centralized management

Protect and manage servers across your entire enterprise with the McAfee ePolicy Orchestrator (ePO) console, the scalable and centralized platform for deployment, management, reports, and audits.

Get customized protection for web and database servers

Maintain system uptime and productivity with specialized protection that secures critical servers against attacks, including directory traversal and SQL injection attacks.

Stop new threats on contact

Trust integrated reputation-based global intelligence in the system firewall (Microsoft Windows only) to block threats such as botnets and denial of service before attacks can occur.

Save trouble with prioritized patches

Reduce patching frequency and deploy patches on a priority basis for the most effective and efficient use of IT resources.

Prove compliance without headaches

Use McAfee’s easy-to-understand actionable views, workflow, event monitoring, and reporting to quickly remediate threats and maintain compliance.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Operating Systems

  • Microsoft Windows (English, French, German, Japanese, Korean, Spanish, traditional Chinese)
  • Microsoft Windows Server 2008 (32-bit and 64-bit)
  • Microsoft Windows Server 2003 Standard with Service Pack 2 (SP2) or higher (32-bit and 64-bit)
  • Microsoft Windows Server 2003 R2 Standard (32-bit and 64-bit)
  • Microsoft Windows Server 2003 Enterprise with SP2 or higher (32-bit and 64-bit)
  • Microsoft Windows Server 2003 R2 Enterprise (32-bit and 64-bit)
  • Microsoft Windows Server 2003 Web with SP1 or higher
  • Microsoft Windows Server 2003 R2 Web
  • Microsoft Windows 2000 Advanced Server with SP4 or higher
  • Microsoft Windows 2000 Datacenter Server with SP4 or higher
  • Microsoft Windows 2000 Professional with SP4 or higher
  • Microsoft Windows 2000 Server with SP4 or higher
  • Red Hat Enterprise Linux 4.0 (32-bit); kernel modules supported:
    • 2.6.9-42.EL
    • 2.6.9-42.EL-smp
    • 2.6.9-34.EL
    • 2.6.9-34.EL-smp
    • 2.6.9-22.EL
    • 2.6.9-22.EL-smp
  • Sun Solaris
    • SPARC Solaris 10
    • SPARC Solaris 9 (32-bit or 64-bit kernel)
    • SPARC Solaris 8 (32-bit or 64-bit kernel)
  • SUSE Linux Enterprise
    • 10, 11 (32-bit or 64-bit kernel)

Supported Web Server Platforms

  • IIS 4.0, 5.0, and 6.0 (Microsoft Windows)
  • Apache Web Server 2.0.42 or higher
  • Apache Web Server 1.3.6 or higher
  • Sun Java Web Server 6.1
  • Sun ONE Web Server 6.0

Supported Database Server Platforms

  • Microsoft SQL Server 2005 and 2008

Demos / Tutorials


For guidance on how to use Host Intrusion Prevention for Server, watch this Quick Tips video.

Customer Stories

Blackburn with Darwen Council

Blackburn with Darwen Council, a borough in the county of Lancashire, England, uses McAfee endpoint security, email management, and SIEM solutions to build an integrated, centrally managed security architecture.

City of Chicago

Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.

  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.


Data Sheets

McAfee Host Intrusion Prevention for Server

For a technical summary on the McAfee product listed above, please view the product data sheet.



  • Five Website Security Do’s and Don’ts for Online Merchants
    Sarah Grayson - August 30, 2013
    As we get closer to the end of summer, most merchants are already in the midst of preparing for another busy fall/winter shopping season. However, amid the chaos, it’s important to take a look at your website’s current features—most importantly security—in order to assess what needs improvement before it’s too late. Aside from cosmetic and [...]
  • What is a Next-Generation Firewall?
    Mike Fey - August 5, 2013
    In my last post, I outlined the business case for converting to a next-generation firewall. Essentially, it’s about protecting valuable IT assets in the face of advanced malware with sophisticated evasion capabilities that make them much harder to detect, and much more dangerous given their ability to hold payloads with multiple, often persistent exploits. How [...]
  • Developing the Ultimate Defense against Advanced Malware
    Pat Calhoun - July 25, 2013
    It is clear cybercrime is getting more organized and cybercriminals are becoming so much more sophisticated.  Today, they not only have experience, but are using powerful, easy-to-access resources to wreak havoc within the data networks of organizations.  The unfortunate truth, as discovered by McAfee Labs in the McAfee Threats Report: First Quarter 2013, is that [...]
  • End-to-end Protection Thwarts Malware
    Rick Simon - July 11, 2013
    Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m going to highlight the importance of end-to-end protection in fighting the malware war. Over the past three months, McAfee has made three important [...]
  • Microsoft Patch Tuesday Report: Critical Mass
    Scott Taschler - July 10, 2013
    This is probably one of the most important Patch Tuesdays we have seen in a while, with Microsoft releasing seven patches that address 34 individual vulnerabilities. Of the seven patches released, six are identified by Microsoft as “critical.” The remaining patch is labeled “important” by Microsoft. This month’s patches are as follows: MS13-052 Vulnerabilities in [...]