HOST BASED SECURITY SYSTEM
(HBSS) LATEST UPDATE 2025
Host Based Security System (HBSS) - ANSWER provides protection for DoD endpoints.
Palo Alto - ANSWER a leader in network defense products
What is an endpoint? - ANSWER a remote computing device that communicates back
and forth with a network to which it is connected
HBSS - ANSWER Endpoint protection
McAfee Endpoint Protection - ANSWER cleans, deletes, or quarantines the malicious
file
Primary components - ANSWER Database
ePO Server
Endpoint
Database - ANSWER Policies
Agent List
User Accounts
Alerts and Logs
Endpoint - VirusScan Enterprise (OOABAD) - ANSWER On-Access Scans
On-Demand Scans
Access Protection
Buffer Overflow Protection
Artemis Alerts
DAT Files
Endpoint - Host Intrusion Prevention (NFA) - ANSWER Network IDS/IPS
Firewall
Application Protection
Endpoint McAFee Agent - ANSWER Rogue System Detection
Policy Auditor
Data Loss Prevention
VirusScan Enterprise (VSE) - ANSWER primarily provides protection from malicious
files such as viruses, worms, Trojans, spyware, and potentially unwanted programs
(PUPS);
(HBSS) LATEST UPDATE 2025
Host Based Security System (HBSS) - ANSWER provides protection for DoD endpoints.
Palo Alto - ANSWER a leader in network defense products
What is an endpoint? - ANSWER a remote computing device that communicates back
and forth with a network to which it is connected
HBSS - ANSWER Endpoint protection
McAfee Endpoint Protection - ANSWER cleans, deletes, or quarantines the malicious
file
Primary components - ANSWER Database
ePO Server
Endpoint
Database - ANSWER Policies
Agent List
User Accounts
Alerts and Logs
Endpoint - VirusScan Enterprise (OOABAD) - ANSWER On-Access Scans
On-Demand Scans
Access Protection
Buffer Overflow Protection
Artemis Alerts
DAT Files
Endpoint - Host Intrusion Prevention (NFA) - ANSWER Network IDS/IPS
Firewall
Application Protection
Endpoint McAFee Agent - ANSWER Rogue System Detection
Policy Auditor
Data Loss Prevention
VirusScan Enterprise (VSE) - ANSWER primarily provides protection from malicious
files such as viruses, worms, Trojans, spyware, and potentially unwanted programs
(PUPS);