Index

clearing 48, 54, 109

 

collecting

54

 

 

 

Paranoid protection level

3, 70

ports, blocking

40

 

 

prerequisites

 

 

 

 

installation

22

 

 

printing information

64, 66, 91, 106

profile

 

 

 

 

see baseline

1

 

 

Prompts tab

83

 

 

protection level

 

 

 

choosing

34

 

 

 

effect on applications

3

setting dynamically

4, 9293

r

responding to alerts

50

response levels 10

 

restarting

 

 

application protection 26

BlackICE

26

 

monitoring

26

 

restarting BlackICE

 

by restarting your system 27

from the desktop

26

from the Windows 2000 control panel 26

from the Windows NT control panel

26

from the Windows XP control panel

27

s

scr files

103

 

 

 

 

searching

107

 

 

 

Serious events

9

 

 

 

severity levels

9, 108

 

 

stop monitoring

24

 

 

stopping

 

 

 

 

 

Application Protection 44

 

 

BlackICE engine

109

 

 

stopping application protection

24

stopping BlackICE

24

 

 

from the console

24

 

 

from the desktop

24

 

 

Windows 2000 control panel

25

Windows NTcontrol panel

24

Windows XP control panel

25

support

100, 110

 

 

Suspicious events

9, 67

 

 

sys files

103

 

 

 

 

t

tabs

Application Control 84 Back Trace 76 communications control 86 Events 62

Evidence Log 74 Firewall 70 History 67 Intruders 65 Intrusion Detection 77 Notifications 81 Packet Log 72 Prompts 83

technical support 100, 110

technical support, Internet Security Systems viii

Tools menu

109

 

 

trace file decoders

12, 52

traffic graph

67

 

 

trusting an intruder

39

 

Trusting protection level

3, 70

typographical conventions

vii

u

unblocking an intruder

91

uninstalling

 

BlackICE 28

 

unknown applications

8, 4344,56

v

View menu 108 virus detection 6 visual alerts 48, 81 vxd files 103

w

wav files 48, 81

Web site, Internet Security Systems viii windows

Advanced Application Control Settings 102 Advanced Firewall Settings 90

115

Page 123
Image 123
Internet Security Systems 3.5, Desktop Protector manual 115

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.