Manuals
/
Brands
/
Computer Equipment
/
Computer Hardware
/
Internet Security Systems
/
Computer Equipment
/
Computer Hardware
Internet Security Systems
3.5, Desktop Protector manual
1
1
126
126
Download
126 pages, 1.15 Mb
TM
Desktop Protector
User Guide
Versio n 3.5
Contents
Main
Page
Contents
Preface
Chapter 1: Introduction to RealSecure Desktop Protector
Chapter 2: Using RealSecure Desktop Protector with ICEcap Manager
Chapter 3: Setting Up RealSecure Desktop Protector
Appendix A: Operating Tabs
Appendix B: Configuration Tabs
Index
Appendix C: Advanced Firewall Se ttings
Appendix D: Advanced Application Protection Settings
Preface
Page
Conventions Used in this Guide
Getting Technical Support
Chapter 1
Introduction to RealSecure Desktop
Protector
Page
Protection Levels
Adaptive Protection
The Desktop Protector Firewall
Application Protection
Application Control
Communications Control
Desktop Protector Alerts
This table describes Desktop Protector response level icons and overlays:
Collecting Information
Filtering Information
Chapter 2
Using RealSecure Desktop Protector with ICEcap Manager
How ICEcap Manager Works With RealSecure Desktop Protector
Page
How ICEcap Manager Handles Information
Transmitting Data to ICEcap Manager
Installing Desktop Protector Remotely
Using ICEcap Manager to Control RealSecure Age nts
Page
Page
Installing RealSecure Desktop Protector
Page
Stopping Desktop Protector
Page
Restarting Desktop Protector
Page
Uninstalling Desktop Protector
Page
Page
Chapter 4
Configuring RealSecure Desktop Protector
Connecting to ICEcap Manager
Page
Setting Your Protection Level
Using Adaptive Protection
Page
Blocking Intrusions
Page
Trusting Intruders
Ignoring Events
Page
Working with the Application Protection Baseline
Page
Page
Page
Configuring Communications Control
Page
Controlling Event Notification
Page
Back Tracing
Page
Collecting Evidence Files
Page
Collecting Packet Logs
Page
Responding to Application Protection Alerts
Page
Page
Page
Page
Appendix A
Operating Tabs
The Events Tab
Optional columns on the Events tab
U
P
R
Shortcut commands on the Events tab
This table describes the commands available by right-clicking an item on the Event tab:
This table describes the buttons that appear on the Intruders tab:
Buttons on the Events tab
The Intruders Tab
Page
The History Tab
Page
Appendix B
Configuration Tabs
The Firewall Tab
Page
The Packet Log Tab
Page
The Evidence Log Tab
Page
The Back Trace Tab
The Intrusion Detection Tab
The ICEcap Tab
http://ICECAP:8082
http:// <ICEcap server name>:<HTTP event port number>
Page
ICEcap tab buttons This table describes the buttons that appear on the ICEcap tab.
The Notifications Tab
This table describes the settings you can configure on the Notifications tab:
Page
The Prompts Tab
This table describes the settings on the Prompts tab:
The Application Control Tab
Page
The Communications Control Tab
Page
Page
Appendix C
Advanced Firewall Settings
The Firewall Rules Tab
Buttons The following table describes the buttons on the IP Address tab:
Shortcut menu These commands are available when you right-click an item in the firewall list:
The Local Adaptive Protection Tab
The Remote Adaptive Protection Tab
The Add Firewall Entry Dialog
65535
1
0.0.0.0-1.1.1.1
The Add Firewall Entry dialog features these fields:
Page
The Modify Firewall Entry Dialog
The Modify Firewall Entry dialog features these fields:
Page
Page
Appendix D
Advanced Application Protection Settings
Advanced Application Settings window menu commands
The Advanced Application Protection Settings window features these menus:
www.iss.net
,
The Known Applications Tab
The Baseline Tab
The Checksum Extensions Dialog
Page
Appendix E
The Main Menu
The File Menu
The Edit Menu
The View Menu
The Tools Menu
The Help Menu
The System Tray Menu
Page
Index
a
b
c
d
e
f
h
i
m
r
s
t
u
v
Page
117
Internet Security Systems, Inc. Software License Agreement