The Desktop Protector Firewall

The Desktop Protector Firewall

Introduction

Desktop Protector automatically stops most intrusions according to the protection level

 

you have chosen, but you still may notice activity that isn't explicitly blocked. You can

 

configure the Desktop Protector firewall to increase your protection. You can block

 

intrusions from a particular address, or you can block intrusions that use a particular

 

protocol.

Protocol analysis

The Desktop Protector firewall works by recognizing the special languages computers use

 

to communicate. For example, your browser receives messages encoded in Hypertext

 

Transfer Protocol (HTTP) from the Web. These information packets are usually received

 

through port 80. When Desktop Protector detects traffic coming in through port 80 that is

 

not correctly encoded in HTTP packets, there may be cause for suspicion.

Dynamic Firewall

Your firewall uses information from the BlackICE intrusion detection engine to

 

reconfigure itself in response to intrusions. The intrusion detection component analyzes

 

unusual packets and, if they are dangerous, instantly configures the firewall to block them

 

before they can have any effect on your system.

Blocking an intruder

You can block any intruder listed on your events list by adding an IP address to your

 

firewall. When you do this, no traffic from that intruder's IP address can enter your

 

system. For information about blocking IP addresses, see “Blocking an IP address” on

 

page 37.

Blocking a port

If you don't have an intruder in mind but you are concerned about intrusion attempts

 

using a specific internet protocol, you can block the port (or ports) that protocol uses.

 

Adding a port entry to your firewall ensures that no traffic from any IP address can enter

 

your system using that port. For information about blocking ports, see “Ignoring Events”

 

on page 40.

Ignoring events

To help reduce the amount of information you have to deal with, you can choose to ignore

 

events that don't pose any threat to your system. For example, your company’s

 

Information Services department may carry out routine port scans for network

 

management purposes. When such a scan appears on your events list, you can right-click

 

the event and select Ignore. For information about ignoring events, see “Ignoring Events”

 

on page 40.

Trusting an address

When you know a particular IP address is safe, you can choose to ignore all events from

 

that address. This is called trusting an address. For example, when another computer on

 

your internal network accesses files on your system, it can appear as an intrusion on your

 

events list. You can right-click these events and select Trust and Accept to tell Desktop

 

Protector not to record any events from that computer. For information about trusting and

 

accepting, see “Trusting Intruders” on page 39.

5

Page 13
Image 13
Internet Security Systems 3.5 manual Desktop Protector Firewall

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.