Protection Levels

Protection Levels

Introduction

Protection levels are pre-designed sets of security settings developed for different types of

 

Web use. You can choose to have Desktop Protector block all communications with your

 

system, some communications with your system, or no communications with your

 

system. You can change protection levels at any time.

How protection

Protection levels modify your firewall by closing some of the software links, or ports, that

levels work

your system uses to receive communications from other computers. The more restrictive

 

the protection level, the more ports are blocked.

Protection level

Paranoid: Desktop Protector blocks all unsolicited inbound traffic. Very restrictive, but

definitions

useful if your system faces frequent or repeated attacks. This setting may restrict some

 

Web browsing and interactive content.

 

Nervous: Desktop Protector blocks all unsolicited inbound traffic except for some

 

interactive content on Web sites (such as streaming media and other application-specific

 

uses of the Internet). Preferable if you are experiencing frequent intrusions.

 

Cautious: Desktop Protector blocks unsolicited network traffic that accesses operating

 

system and networking services. Good for regular use of the Internet.

 

Trusting: All ports are open and unblocked and all inbound traffic is allowed. Acceptable

 

if you have a minimal threat of intrusions. This is the default protection level setting. If

 

your local agent is not centrally controlled by ICEcap Manager, you should consider

 

customizing your protection level immediately after installing Desktop Protector.

How protection

This table shows how the protection levels affect some representative applications:

levels affect

 

 

 

 

applications

 

 

 

 

Level

Blocked

Configurable

Not Blocked

 

 

 

 

 

 

 

Paranoid

IRC file transfer (DCC)

Quake (II/III)

FTP file transfers

 

 

NetMeeting

Internet Phone

Sending/receiving email

 

 

PC Anywhere

Net2Phone

Real Audio

 

 

ICQ

 

IRC Chat

 

 

 

 

 

 

Nervous

IRC file transfer (DCC)

ICQ

All of the above, plus PC

 

 

NetMeeting

Internet Phone

Anywhere, Quake (II,III)

 

 

 

 

 

 

Net2Phone

 

 

 

 

 

 

 

Cautious

Unsolicited traffic that

None

All of the above, plus IRC

 

 

accesses operating

 

file transfer (DCC)

 

 

system and networking

 

NetMeeting

 

 

services

 

 

 

 

 

 

 

 

 

 

 

Trusting

None

None

All inbound traffic

 

 

 

 

 

 

 

 

 

 

Note: To use an application that is blocked under a selected protection level, use the Advanced Firewall Settings feature to open the ports the application uses. For more information on opening ports, see “Blocking Intrusions” on page 37.

3

Page 11
Image 11
Internet Security Systems 3.5, Desktop Protector manual Protection Levels

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.