v
Preface
Overview
Introduction This guide is designed to help you use RealSecure Desktop Protector to protect your local
system and your network from unwanted intrusions.
Scope This guide describes the features of RealSecure Desktop Protector and shows you how to
use them.
Chapter 1 explains how Desktop Protector protects your local system from attacks
and unwanted intrusions.
Chapter 2 provides information about using Desktop Prot ector to help ICEcap
Manager manage network-wide security.
Chapter 3 provides instructions for installing and configuring Desktop Protector on
your computer.
Chapter 4 provides detailed procedures for configuring Desktop Protector for your
particular circumstances.
Appendixes A through E describe the screens and dialog boxes you can use to control
RealSecure Desktop Protector.
Audience This guide is intended for network administrators responsible for installing and
maintaining software on corporate systems.
What’s new in this
guide
This guide replaces the BlackICE Agent 3.0 User Guide. This guide includes information
about a new layer of safety for your desktop, called Application Protection. Application
Protection consists of two features:
Application Control. Desktop Protector prevents unauthorized applications from
running on your local system. This helps to keep potentially harmful software from
compromising your security, even the software has been successfully installed on
your computer.
Communications Control. Desktop Protector blocks applications from contacting the
Internet without your authorization. This prevents harmful Trojans from working
even if they have been successfully installed on your local system.
Using this guide Use this guide to help you configure and work with RealSecure Desktop Protector. To get
the most effective protection possible, you can follow the steps provided in Chapter 3 to
configure Desktop Protector. The instructions are designed to be followed in the order
given, but you can skip any step without endangering your system.