The Tools Menu
109
The Tools Menu
Introduction The Tools menu enables you to configure the application by editing the settings; edit the
Advanced Firewall settings; start or stop the BlackICE engine; clear the event list; or
change other preferences.
Edit BlackICE
Settings...
Displays the configuration tabs that control the operation of the Desktop Protector engine.
For more information, see Conf iguration Tabs on page69.
Stop BlackICE
Engine
Turns off the Desktop Protector intrusion detection engine. If the intrusion detection
engine is already stopped, this item is replaced with Start BlackICE Engine.
Note: If the Stop BlackICE Engine menu item is dimmed, the ICEcap Manager to which
this Desktop Protector installation reports has blocked the local user from starting or
stopping intrusion detection. The service can be started or stopped only by a remote
command from ICEcap.
Stop BlackICE
Application
Protection
Turns off the Application Protection and Communications Control features. If Application
Protection is already turned off, this command is replaced with Start BlackICE
Application Protection. For more information, see Working with the Application
Protection Baseline on page42.
Note: If this menu item is dimmed, ICEcap Manager to which this agent reports has
blocked the local user from starting or stopping the Application Protection service.
Application Protection can be started or stopped only by a remote command from ICEcap.
Clear Files... Deletes intrusion information by removing your list of intrusions, evidence logs or packet
logs. For more information, see Clearing the Events list on page 48.
Advanced Firewall
Settings
Displays the Advanced Firewall Settings window, which enables you to control which IP
addresses or TCP/UDP port numbers Desktop Protector blocks or accepts. For more
information, see Blocking Intrusions on page 37.
Advanced
Application
Protection Settings
Displays the Advanced Application Protection Settings window, with which you can
control which applications can run on your system and which applications can access a
network. For more information, see Working with the Application Protection Baseline
on page42.