The Intruders Tab
65
The Intruders Tab
Introduction The Intruders tab displays all the information RealSecure Desktop Protector has collected
about all the intruders who have initiated events on your system. This information helps
you determine the severity and location of each intruder.
Sorting By default, the intruder list is sorted first in alphabetical order by intruder and then in
descending order of severity. Click a column header to sort the list by that column. Click
the column header again to reverse the sort order.
Details pane When you select an intruder from the Intruder list, the information RealSecure Desktop
Protector has gathered about the intruder appears in the Details pane.
Default columns on
the Intruders tab
This table describes the columns that appear by default on the Intruders tab:
Shortcut
commands on the
Intruders tab
This table describes the commands available by right-clicking information on the
Intruders tab:
This column... Contains this information...
Severity icon The severity icon is a visual representation of the severity
of an event and the response from Desktop Protector. For
more information, see Severity levels on page 12.
Blocked State icon The blocked state icon indicates that Desktop Protector is
blocking all network traffic from this intruder. For
information about blocking an intruder, see Blocking
Intrusions on page37.
Intruder The NetBIOS or DNS name of the attacking system. When
Desktop Protector cannot determine a name, it displays
the intruders IP address.
Table 13: Intruders tab default columns
This command... Has this effect...
Block Intruder To block an intruder, right-click the intruder, then select
Block Intruder.
Trust Intruder To trust an intruder, right-click the intruder, then select
Trust Intruder. On the submenu, select Trust and Accept
or Trust Only.
Cut To remove an intruder from the list, right-click the intruder,
then select Cut.
Copy To copy an intruder to your system clipboard, right-click the
intruder, and then select Copy.
Delete To remove an intruder from the list, right-click the intruder,
then select Delete.
Select All To select all the intruders in the list, right-click any intruder,
then select Select All.
Table 14: Intruders tab right-click commands