Table of Contents

 

Preface......................................................................................................

ix

Related Documentation ..........................................................................................................

ix

Intended Audience...................................................................................................................

ix

Technical Support .....................................................................................................................

x

Chapter 1. Overview of the Agent .............................................................................

1

Modifying the Security Policy..................................................................................................

1

Using the Policy Editor.......................................................................................................

1

Chapter 2. Getting Around........................................................................................

3

Starting the Agent .....................................................................................................................

3

Navigating the Main Console..................................................................................................

3

Menus and Toolbar Buttons ..............................................................................................

4

Traffic History Graphs .......................................................................................................

4

Broadcast Traffic............................................................................................................

5

Running Applications Field................................................................................................

5

Message Console..................................................................................................................

6

Status Bar ..............................................................................................................................

6

Using the Menus and the Toolbar..........................................................................................

6

Toolbar Buttons...................................................................................................................

8

Using the System Tray Icon.....................................................................................................

8

What the System Tray Icon Tells You..............................................................................

8

What Does the Flashing System Tray Icon Mean?.......................................................

10

The System Tray Icon Menu............................................................................................

10

Enabling Password Protection..............................................................................................

11

Chapter 3. Testing Your System’s Vulnerability.....................................................

13

Scanning Your System............................................................................................................

13

Types of Scans.........................................................................................................................

14

Quick Scans ........................................................................................................................

14

Stealth Scans .......................................................................................................................

14

Trojan Scans .......................................................................................................................

14

TCP Scans...........................................................................................................................

14

UDP Scans..........................................................................................................................

14

ICMP Scans ........................................................................................................................

15

Chapter 4. Working With Rules ..............................................................................

17

About Rules .............................................................................................................................

17

Using Rules to Protect Your System....................................................................................

17

Setting Up Advanced Rules ...................................................................................................

17

General Tab .............................................................................................................................

19

Rule Description ................................................................................................................

19

Block this traffic.................................................................................................................

19

Allow this traffic ................................................................................................................

19

Apply Rule to Network Interface....................................................................................

20

Apply this rule during Screensaver Mode ......................................................................

20

Record this traffic in “Packet Log”.................................................................................

20

 

iii