Blocking Intrusions

Blocking Intrusions

Introduction

Desktop Protector identifies and stops most intrusions according to your preset protection

 

level, but you may still notice activity that isn't explicitly blocked. This topic explains how

 

to handle intrusions from a particular address or intrusions that use a particular protocol.

 

Caution: Do not block port scans from your own internal network. This may interfere

 

with normal network management procedures.

Blocking an event You can block any intruder listed on your events list. When you do, Desktop Protector

or an intruder creates an IP address entry in your firewall that prevents all traffic from that IP address from entering your system. To block an intruder or an event:

1.Do one of the following:

On the Intruders tab, right-click the name of the intruder.

On the Events tab, right-click the name of the event.

2.On the submenu, select the duration of the block.

Note: A month is defined as 30 days.

3.Click Yes.

Blocking an IP

To block an IP address:

address

 

1.From the Tools menu, select Advanced Firewall Settings. The Advanced Firewall Properties window appears.

2.Click Add.

The Add Firewall Entry window appears.

3.Type a name for the IP address filter.

Note: This should be the name of the system to block, if you know it. For example, if you are creating a filter to block all port scans from a known intruder, use the intruder’s computer name for the name of this address filter. For information about how to learn about intruders, see “Back Tracing” on page 50.

4.Type the IP address or range of addresses for the system to block.

Use standard 000.000.000.000 notation.

If you are specifying a range of IP addresses, place a dash between them. For example, 192.168.10.23–192.168.10.32.

To block transmissions from all IP addresses through a specific port, select All

Addresses.

Note: You cannot block all transmissions from all IP addresses in this window. To block all unsolicited inbound traffic, select the “Paranoid” protection level on the Firewall tab.

5.In the Mode area, select Reject.

6.In the Duration of Rule area, select the length of the block.

7.Click Add.

Desktop Protector adds the entry to the list in the Advanced Firewall Settings window.

37

Page 45
Image 45
Internet Security Systems 3.5, Desktop Protector manual Blocking Intrusions, Blocking an IP, Addresses

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.