Many
Manuals
search
Kategorie
Marki
Strona główna
Internet Security Systems
Oprogramowanie
Desktop Protector Version 3.5
Instrukcja Użytkownika
Internet Security Systems Desktop Protector Version 3.5 Instrukcja Użytkownika Strona 61
Pobierz
Podziel się
Dzielenie się
Dodaj do moich podręczników
Drukuj
Strona
/
126
Spis treści
BOOKMARKI
Oceniono
.
/ 5. Na podstawie
oceny klientów
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
Collecting Evidence Files
53
3.
Click
OK
.
For more information
about setting yo
ur evidence logging preferences, see
“
The Evidence
Log T
ab
”
on page 74.
1
2
...
56
57
58
59
60
61
62
63
64
65
66
...
125
126
Desktop Protector
1
User Guide
1
Contents
3
ÆCompare
7
Getting Technical Support
8
RealSecure Desktop
9
Protection Levels
11
Adaptive Protection
12
Application Protection
14
Application Control
15
Communications Control
16
Desktop Protector Alerts
17
● as an icon beside the event
18
Collecting Information
19
Filtering Information
20
Overview
21
Protector
22
ÆEdit BlackICE Settings
23
● over the Internet
25
● through a proxy server
25
RSDPSetup.exe
30
192.168.0.101:8082
31
Stopping Desktop Protector
32
ÆSettingsÆControl Panel
33
ÆSettings ÆControl Panel
33
Restarting Desktop Protector
34
■ If yes, click Yes
37
■ If no, click No
37
Connecting to ICEcap Manager
40
Setting Your Protection Level
42
Using Adaptive Protection
43
6. Click OK
44
Blocking Intrusions
45
Trusting Intruders
47
Ignoring Events
48
● create a new baseline
50
ÆClear Files
56
ÆBlackICE Settings
56
ÆFreeze
57
Back Tracing
58
Collecting Evidence Files
60
3. Click OK
61
Log Tab” on page 74
61
Collecting Packet Logs
62
Tab” on page 72
63
Procedure To export data:
65
Appendixes
67
Operating Tabs
69
The Events Tab
70
Optional columns on
71
Appendix A: Operating Tabs
72
The Intruders Tab
73
The History Tab
75
Help Displays the Help
76
Table 19: History tab buttons
76
Configuration Tabs
77
The Firewall Tab
78
The Packet Log Tab
80
Packet Log tab
81
The Evidence Log Tab
82
Evidence Log tab
83
The Back Trace Tab
84
The Intrusion Detection Tab
85
The ICEcap Tab
86
The Notifications Tab
89
Notifications tab
90
The Prompts Tab
91
The Application Control Tab
92
Protector window
95
Advanced Firewall Settings
97
The Firewall Rules Tab
98
The Add Firewall Entry Dialog
102
Add Firewall Entry
103
Modify Firewall
104
Entry dialog
104
Entry dialog buttons
105
Settings
107
The Known Applications Tab
109
The Baseline Tab
110
The Main Menu
113
The File Menu
114
The Edit Menu
115
The View Menu
116
The Tools Menu
117
The Help Menu
118
The System Tray Menu
119
Appendix E: The Main Menu
120
Chapter 0:
126
Revised May 14, 2002
126
Komentarze do niniejszej Instrukcji
Brak uwag
Publish
Drukuj dokument
Drukuj stronę 61
Komentarze do niniejszej Instrukcji