Desktop Protector Alerts
9
Desktop Protector Alerts
Introduction Your dynamic firewall handles most alerts for you, but you can take additional steps to
make its responses even more effective. The information in this topic may help you
determine which events merit your attention.
Severity levels Some network events are more dangerous than others. Desktop Protector assigns each
event a numerical rank that reflects the events potential risk level, and reports that rank
with an icon on the Events tab. The following table lists the severity levels Desktop
Protector uses:
Tabl e 5: Desktop Protector severity icons
Icon Rank Description
7-10 Critical. These are deliberate attacks on your system for the purpose of
damaging data, extracting data, or crashing the system. Critical events
always trigger protection measures.
4-6 Serious. These are deliberate attempts to access information on your
system without directly damaging anything. Some serious events trigger
protection measures.
1-3 Suspicious. These are network activities that are not immediately
threatening, but may indicate that someone is attempting to locate
security vulnerabilities in your system. For example, intruders may scan
the available ports or services on a system before attacking it. Suspicious
events do not trigger protection measures.
0Informational. These are network events that are not threatening but
worth noting. Informational events do not trigger protection measures.