McAfee Host Intrusion Prevention for Desktop

McAfee Host Intrusion Prevention for Desktop

Industry-leading, proactive protection against zero-day threats for desktops and laptops

Next Steps:


McAfee Host Intrusion Prevention for Desktops safeguards your business against complex security threats that may otherwise be unintentionally introduced or allowed by desktops and laptops. Host Intrusion Prevention for Desktops is easy to deploy, configure, and manage.

Comprehensive security — Three layers of protection (signature analysis, behavioral analysis, and dynamic stateful firewall with global reputation technology) prevent intrusions, protect assets, and defend your company against known and emerging exploits, including zero-day attacks.

Advanced vulnerability shielding — Stronger protection against exploits that target new vulnerabilities means your IT staff has more time for planning, testing, and deploying patches.

Automatic updates — Security content updates are delivered automatically to target specific vulnerabilities and block emerging threats (including buffer-overflow attacks) from executing.

Customized security control — Easily apply different levels of protection based on location (corporate network, VPN, or public network). Host Intrusion Prevention travels with the laptop and can provide varying degrees of protection, depending on whether you are in the office, at home, or on the road.

Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Host Intrusion Prevention for Desktop uses the McAfee GTI network connection reputation service to identify suspicious domains/IP addresses that are infected or hosting malware attacks, and block those attacks.

Features & Benefits

Keep your business running smoothly

Prevent intrusions, protect assets, and enforce intrusion prevention system (IPS) and zero-day threat protection coverage at all levels: network, endpoint, and application. Integrated reputation-based global intelligence in the desktop firewall (Microsoft Windows only) blocks threats such as botnets and denial of service before attacks can occur.

Get the broadest intrusion prevention coverage

Trust McAfee behavioral protection to secure endpoints against unknown attacks. Our signature protection identifies and blocks known attacks while a stateful firewall applies policies, bars unsolicited inbound traffic, and controls outbound traffic.

Save time and cut costs with simplified, centralized management

Protect and manage all desktops across your entire enterprise with the McAfee ePolicy Orchestrator (ePO) console, the scalable, centralized platform for easy deployment, management, reporting, and auditing.

Create custom, location-based policies

Apply different levels of security using rules based on the endpoint’s connection — on the corporate network, over VPN, or from a public network — with connection-aware protection.

Spot and block new vulnerabilities

Count on automatic security content updates targeting specific vulnerabilities to recognize unknown exploits and stop them from executing. Security content updates do not require system reboots, and updating signatures is similar to updating .DAT files.

Avoid trouble with prioritized patching

Reduce patching frequency and deploy patches on a priority basis for the most effective and efficient use of IT resources.

Prove compliance without headaches

Use McAfee’s easy-to-understand actionable views, workflow, event monitoring, and reporting to quickly remediate threats and maintain compliance.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Operating Systems

  • Microsoft Windows (English, French, German, Spanish, Japanese, Korean, traditional Chinese)
  • Microsoft Windows Vista with Service Pack 1 (SP1) (32-bit and 64-bit)
  • Microsoft Windows XP Home with SP3
  • Microsoft Windows XP Professional with SP3
  • Microsoft Windows XP Tablet PC
  • Microsoft Windows 7

Customer Stories

Blackburn with Darwen Council

Blackburn with Darwen Council, a borough in the county of Lancashire, England, uses McAfee endpoint security, email management, and SIEM solutions to build an integrated, centrally managed security architecture.

City of Chicago

Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.

  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.

Kleberg Bank

Kleberg Bank relies on Intel Security for comprehensive protection, time savings, and to support compliance.

Large Retail Chain

This global membership-style retailer secures virtual business infrastructure from sophisticated threats with McAfee MOVE AntiVirus.

Major U.S. State Government

State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.


Data Sheets

McAfee Host Intrusion Prevention for Desktop

For a technical summary on the McAfee product listed above, please view the product data sheet.



  • Five Website Security Do’s and Don’ts for Online Merchants
    Sarah Grayson - August 30, 2013
    As we get closer to the end of summer, most merchants are already in the midst of preparing for another busy fall/winter shopping season. However, amid the chaos, it’s important to take a look at your website’s current features—most importantly security—in order to assess what needs improvement before it’s too late. Aside from cosmetic and [...]
  • What is a Next-Generation Firewall?
    Mike Fey - August 5, 2013
    In my last post, I outlined the business case for converting to a next-generation firewall. Essentially, it’s about protecting valuable IT assets in the face of advanced malware with sophisticated evasion capabilities that make them much harder to detect, and much more dangerous given their ability to hold payloads with multiple, often persistent exploits. How [...]
  • Developing the Ultimate Defense against Advanced Malware
    Pat Calhoun - July 25, 2013
    It is clear cybercrime is getting more organized and cybercriminals are becoming so much more sophisticated.  Today, they not only have experience, but are using powerful, easy-to-access resources to wreak havoc within the data networks of organizations.  The unfortunate truth, as discovered by McAfee Labs in the McAfee Threats Report: First Quarter 2013, is that [...]
  • End-to-end Protection Thwarts Malware
    Rick Simon - July 11, 2013
    Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m going to highlight the importance of end-to-end protection in fighting the malware war. Over the past three months, McAfee has made three important [...]
  • Microsoft Patch Tuesday Report: Critical Mass
    Scott Taschler - July 10, 2013
    This is probably one of the most important Patch Tuesdays we have seen in a while, with Microsoft releasing seven patches that address 34 individual vulnerabilities. Of the seven patches released, six are identified by Microsoft as “critical.” The remaining patch is labeled “important” by Microsoft. This month’s patches are as follows: MS13-052 Vulnerabilities in [...]