Chapter 1: Introduction to R ealSecure Desktop Protector
8
Communications Control
Introduction To reduce security risks from potential Troja n ho rse applications on your system,
RealSecure Desktop Protector lets you choose which applications or processes can access a
network, such as the Internet or a local area network.
How
Communications
Control works
Desktop Protector tracks all the applications (and related processes) that you authorize to
access a network from your system. If any software installed on your system attempts to
access a network without your authorization, Desktop Protector detects its outbound
transmissions and asks you what to do:
If you recognize the application, you can allow it to continue or you can block it.
If you block it, you can have Desktop Protector automatically block the application in
the future.
Example: auto-
update
For example, some applications include a feature that automatically checks the
application providers Web site for software updates. The first time a newly installed or
modified program tries to do this, Desktop Protector asks if you want this application to
access the network. You can control this behavior by altering the settings on the
Communications Control tab.
More information For instructions, see Configuring Communications Control on page46.