Table Of Contents

System Log Parameters and Description..................................................................

34

Description and Data Fields for the System Log ....................................................

35

Enabling and Clearing Logs...................................................................................................

35

Back Tracing Logged Events.................................................................................................

36

Saving Logs ..............................................................................................................................

37

Stopping an Active Response................................................................................................

37

Chapter 6. Configuring the Agent’s Settings ..........................................................

39

General Tab .............................................................................................................................

39

Automatically load HP Sygate Agent service at startup...............................................

40

Block Network Neighborhood traffic while in screensaver mode.............................

40

Hide all notification messages..........................................................................................

40

Beep before notify .............................................................................................................

40

Hide blocking notification................................................................................................

40

Hide application popup ....................................................................................................

41

Set Password.......................................................................................................................

41

Ask password while exiting ..............................................................................................

41

Network Neighborhood Tab ................................................................................................

41

Network Interface .............................................................................................................

42

Allow to browse Network Neighborhood files and printer(s)....................................

42

Allow others to share my files and printer(s).................................................................

42

Security Tab .............................................................................................................................

42

Enable Intrusion Prevention System ..............................................................................

42

Enable port scan detection...............................................................................................

43

Enable driver level protection..........................................................................................

43

Enable stealth mode browsing.........................................................................................

43

Enable DoS detection .......................................................................................................

43

Block Universal Plug and Play Traffic............................................................................

43

Automatically block attacker’s IP address for... second(s) ..........................................

44

Block all traffic while the service is not loaded .............................................................

44

Allow initial traffic........................................................................................................

44

Enable DLL authentication..............................................................................................

44

Reset all fingerprints for all applications ........................................................................

44

Automatically allow all known DLLs........................................................................

45

Enable anti-MAC spoofing ..............................................................................................

45

Enable anti-IP spoofing....................................................................................................

45

Enable OS fingerprint masquerading .............................................................................

45

NetBIOS protection..........................................................................................................

45

Anti-Application Hijacking ..............................................................................................

46

Allow Token Ring Traffic ................................................................................................

46

Enable smart DNS ............................................................................................................

46

Enable smart DHCP .........................................................................................................

46

Enable smart WINS ..........................................................................................................

46

E-Mail Notification Tab.........................................................................................................

46

Do Not Notify ...................................................................................................................

47

Notify Immediately............................................................................................................

47

After Every . . .

Minutes ..................................................................................................

47

From:..............................................................................................................................

47

v