Loading...

Knowledge Center


Host Intrusion Prevention 8.0 Patch 12 for Windows Known Issues
Technical Articles ID:   KB91008
Last Modified:  10/31/2018

Environment

McAfee Host Intrusion Prevention (Host IPS) 8.0 Patch 12 for Windows

Summary

Recent updates to this article
To receive email notification when this article is updated, click Subscribe on the right side of the page. You must be logged on to subscribe.

 
Date Update
October 31, 2018 Initial publication.

Issue resolutions in updates and major releases are cumulative; Technical Support recommends that you install the latest version. To find the most recent release for your product, visit the Product Downloads site at http://www.mcafee.com/us/downloads/downloads.aspx.

Known Issues

CRITICAL: There are currently no critical issues.
 
Non-critical:
 
Reference Number Related Article Found in
Host IPS Version

 
Resolved in
Host IPS Version
Issue Description
1257771   8.0 Patch 11   Issue: A cumulative upgrade to Host IPS 8.0 Patch 11 or Patch 12 fails for Host IPS clients when Host IPS 8.0 Patch 4 is installed in the upgrade chain. If you encounter this issue, the error 1636 will display in the client installation log.

Workaround: If you encounter this issue, to update to the latest version Host IPS 8.0 Patch 11 or Patch 12, you need to uninstall the existing version of the Host IPS 8.0 client. Then, after a successful uninstall, push a Host IPS 8.0 Patch 11 or Patch 12 full install or deployment task to the machine. A restart might be required after uninstalling the earlier version, if there any files to be updated that are in use.

Resolution: McAfee is actively working on this issue. Thank you for your patience, we hope to have this issue fixed soon.
1257380   8.0 Patch 10   Issue: Custom signatures intended to protect registry values do not work unless you use expert rules to create the rule.
1213517   8.0 Patch 10   Issue: Communication is blocked for Microsoft Edge with Application Guard when you use Host IPS Firewall.

Workaround: Create a firewall rule with the following criteria: Allow Inbound TCP/IPv4 and TCP/IPv6; Local Ports 80 and 443, or just the proxy port, when appropriate; Remote Ports 49700–65535; Virtual Media. McAfee is investigating whether further qualifying criteria can be set for this rule to avoid the issue.

NOTE: This rule also matches for VPN adapters. VPN traffic matching will be disrupted.

Rate this document

Beta Translate with

Select a desired language below to translate this page.

Glossary of Technical Terms


 Highlight Glossary Terms

Please take a moment to browse our Glossary of Technical Terms.