Table Of Contents
System Log Parameters and Description..................................................................
34
Description and Data Fields for the System Log ....................................................
35
Enabling and Clearing Logs...................................................................................................
Back Tracing Logged Events.................................................................................................
36
Saving Logs ..............................................................................................................................
37
Stopping an Active Response................................................................................................
Chapter 6. Configuring the Agent’s Settings ..........................................................
39
General Tab .............................................................................................................................
Automatically load HP Sygate Agent service at startup...............................................
40
Block Network Neighborhood traffic while in screensaver mode.............................
Hide all notification messages..........................................................................................
Beep before notify .............................................................................................................
Hide blocking notification................................................................................................
Hide application popup ....................................................................................................
41
Set Password.......................................................................................................................
Ask password while exiting ..............................................................................................
Network Neighborhood Tab ................................................................................................
Network Interface .............................................................................................................
42
Allow to browse Network Neighborhood files and printer(s)....................................
Allow others to share my files and printer(s).................................................................
Security Tab .............................................................................................................................
Enable Intrusion Prevention System ..............................................................................
Enable port scan detection...............................................................................................
43
Enable driver level protection..........................................................................................
Enable stealth mode browsing.........................................................................................
Enable DoS detection .......................................................................................................
Block Universal Plug and Play Traffic............................................................................
Automatically block attacker’s IP address for... second(s) ..........................................
44
Block all traffic while the service is not loaded .............................................................
Allow initial traffic........................................................................................................
Enable DLL authentication..............................................................................................
Reset all fingerprints for all applications ........................................................................
Automatically allow all known DLLs........................................................................
45
Enable anti-MAC spoofing ..............................................................................................
Enable anti-IP spoofing....................................................................................................
Enable OS fingerprint masquerading .............................................................................
NetBIOS protection..........................................................................................................
Anti-Application Hijacking ..............................................................................................
46
Allow Token Ring Traffic ................................................................................................
Enable smart DNS ............................................................................................................
Enable smart DHCP .........................................................................................................
Enable smart WINS ..........................................................................................................
E-Mail Notification Tab.........................................................................................................
Do Not Notify ...................................................................................................................
47
Notify Immediately............................................................................................................
After Every . . .
Minutes ..................................................................................................
From:..............................................................................................................................
v