Chapter 2: Using RealSecure Desktop Protector with ICEcap Manager

How ICEcap Manager Works With RealSecure Desktop Protector

Introduction

ICEcap Manager interacts with agents in two ways:

 

 

Collecting and managing information. As each RealSecure agent detects events, it

 

forwards information about those events to the ICEcap server. ICEcap Manager stores

 

and logs the events for enterprise-wide security reporting and analysis.

 

Installing, updating and controlling remote agents. ICEcap administrators can use

 

ICEcap Manager to control the configuration of all RealSecure agents on the network.

 

This provides a central platform for standardizing security settings across the

 

enterprise.

 

 

Independent

ICEcap Manager and RealSecure Desktop Protector work independently from one

operation

another. If either the agent or ICEcap Manager is offline or unavailable, the other system

 

continues working without interruption. RealSecure Desktop Protector and ICEcap

 

Manager interact only when an event or a configuration issue occurs.

 

This table identifies the possible interactions between RealSecure Desktop Protector and

 

ICEcap Manager:

 

 

 

 

 

 

 

 

 

 

 

Interaction

Description

Initiated by:

 

 

 

 

 

Event Reporting

When configured to report to an ICEcap

Desktop Protector

 

 

Manager, Desktop Protector reports information

 

 

 

about each event.

 

 

 

 

 

 

Configuration Updates

ICEcap Manager issues instructions to Desktop

ICEcap Manager

 

 

Protector to update security settings.

 

 

 

Note: Only ICEcap Manager can issue

 

 

 

configuration updates. While end-users may be

 

 

 

able to configure their local installation of

 

 

 

Desktop Protector, this configuration

 

 

 

information is stored locally. It is not transmitted

 

 

 

to ICEcap Manager.

 

 

 

 

 

 

Software Updates

ICEcap Manager installs files on the remote

ICEcap Manager

 

 

agent to add RealSecure functionality.

 

 

 

Note: Only ICEcap Manager can distribute

 

 

 

software updates. Local RealSecure agents

 

 

 

cannot update other systems.

 

 

 

 

 

 

 

 

 

Table 7: Interactions between ICEcap Manager and the agent

 

Control levels

By default, ICEcap Manager has total control over all agents, allowing modification only

 

to display and event notification preferences. However, ICEcap administrators can

 

configure groups to allow agents partial local control or almost complete local control.

The control level can be set only from ICEcap Manager, as part of a policy applied to an ICEcap group and pushed to the remote agents in the group. An end user cannot choose a control level from the local Desktop Protector interface.

Note: RealSecure agents that include the Local Console can have any level of configuration sharing, whether they are remotely installed from ICEcap Manager or

14

Page 22
Image 22
Internet Security Systems 3.5 manual How ICEcap Manager Works With RealSecure Desktop Protector, Independent, Operation

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.