Chapter 4: Configuring RealSecure Desktop Protector

Configuring Communications Control

Introduction

When you set your communications control preferences, you establish a rule for

 

RealSecure Desktop Protector to follow whenever an application tries to access a network

 

without your approval. You have the option of terminating the application or letting it

 

run. If you choose to let it run, you can block its network access or allow it to reach the

 

network.

How to set your To set your communications control preferences: communications

preferences1. From the Main Menu, select ToolsÆEdit BlackICE Settings, and then select the Communications Control tab.

2.To watch for outbound communications from this computer, select Enable Application Protection.

Note: If ICEcap Manager has disabled Communication Control on this agent, the Enable Application Protection option is dimmed and you cannot change the settings on the Communications Control tab.

For information about using this option, see “Disabling Application Protection” on page 45.

3.Choose one of these options:

To automatically close down any unauthorized application that tries to access a network from your system, select Always terminate the application. If you installed Desktop Protector in Unattended mode, this option is selected by default.

To have Desktop Protector give you the choice of running or terminating the unauthorized process whenever it tries to contact a network, select Prompt before terminating the application. This option is selected by default.

To allow unauthorized processes to run but automatically block them from connecting to a network, select Always block network access for the application.

To have Desktop Protector ask you whether an unauthorized processes can connect to a network, select Prompt before blocking network access for the application.

Managing your

You can change the authorizations of any application in your baseline. You can allow it to

applications’

communicate with a network or prevent it from communicating.

communications

 

 

To change authorizations:

1.On the Tools menu, select Advanced Application Protection Settings.

2.Click the Known Applications button.

The application files on your system are displayed.

3.To automatically close down an application when it attempts to connect to a network, select Terminate in the Communications Control column.

4.To prevent an application from communicating with a network, select Block in the Communications Control column.

5.To explicitly allow an application to communicate with a network, leave the Communications Control column blank.

6.Click Save Changes.

46

Page 54
Image 54
Internet Security Systems Desktop Protector, 3.5 manual Configuring Communications Control, Network, Applications’

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.