Contents
7
Chapter 6 | Controlling access to protected computers |
|
| Control how people use your computer | 61 |
| Connect to a network | 61 |
| Enable file and printer sharing | 62 |
| Organize computers into network zones | 62 |
| Identify computers to Norton Personal Firewall | 64 |
| Control how users access the Internet | 67 |
| If you access the Internet via a cable or DSL router | 67 |
| If multiple computers share a single Internet connection | 67 |
| Control how outside users access your network | 67 |
| If you run Symantec pcAnywhere | 67 |
| If you run a Virtual Private Network | 68 |
Chapter 7 | Guarding against intrusion attempts |
|
| How Norton Personal Firewall protects against network |
|
| attacks | 69 |
| Norton Personal Firewall monitors communications | 70 |
| Intrusion Detection analyzes communications | 70 |
| Visual Tracking locates attackers | 71 |
| Customize firewall protection | 72 |
| Change the Security Level slider | 72 |
| Change individual security settings | 73 |
| Reset security settings to defaults | 75 |
| Customize firewall rules | 75 |
| How firewall rules are processed | 75 |
| Create new firewall rules | 76 |
| Manually add a firewall rule | 80 |
| Change an existing firewall rule | 83 |
| Reset firewall rules to the default settings | 85 |
| Customize Intrusion Detection | 85 |
| Exclude specific network activity from being monitored | 85 |
| Enable or disable AutoBlock | 87 |
| Unblock computers | 87 |
| Exclude computers from AutoBlock | 88 |
| Restrict a blocked computer | 88 |