Preface......................................................................................................
ix
Related Documentation ..........................................................................................................
Intended Audience...................................................................................................................
Technical Support .....................................................................................................................
x
Chapter 1. Overview of the Agent .............................................................................
1
Modifying the Security Policy..................................................................................................
Using the Policy Editor.......................................................................................................
Chapter 2. Getting Around........................................................................................
3
Starting the Agent .....................................................................................................................
Navigating the Main Console..................................................................................................
Menus and Toolbar Buttons ..............................................................................................
4
Traffic History Graphs .......................................................................................................
Broadcast Traffic............................................................................................................
5
Running Applications Field................................................................................................
Message Console..................................................................................................................
6
Status Bar ..............................................................................................................................
Using the Menus and the Toolbar..........................................................................................
Toolbar Buttons...................................................................................................................
8
Using the System Tray Icon.....................................................................................................
What the System Tray Icon Tells You..............................................................................
What Does the Flashing System Tray Icon Mean?.......................................................
10
The System Tray Icon Menu............................................................................................
Enabling Password Protection..............................................................................................
11
Chapter 3. Testing Your System’s Vulnerability.....................................................
13
Scanning Your System............................................................................................................
Types of Scans.........................................................................................................................
14
Quick Scans ........................................................................................................................
Stealth Scans .......................................................................................................................
Trojan Scans .......................................................................................................................
TCP Scans...........................................................................................................................
UDP Scans..........................................................................................................................
ICMP Scans ........................................................................................................................
15
Chapter 4. Working With Rules ..............................................................................
17
About Rules .............................................................................................................................
Using Rules to Protect Your System....................................................................................
Setting Up Advanced Rules ...................................................................................................
General Tab .............................................................................................................................
19
Rule Description ................................................................................................................
Block this traffic.................................................................................................................
Allow this traffic ................................................................................................................
Apply Rule to Network Interface....................................................................................
20
Apply this rule during Screensaver Mode ......................................................................
Record this traffic in “Packet Log”.................................................................................
iii