Appendix B: Configuration Tabs

The Packet Log Tab

Introduction

The Packet Log tab allows you to configure the RealSecure Desktop Protector packet

 

logging features. When packet logging is enabled, Desktop Protector records all the

 

network traffic that passes through your system.

Packet logs or

Because they contain a record of all network traffic, packet logs can grow very large and

evidence logs?

occupy a lot of disk space. If you do not need to record every packet, evidence logging

 

may be a better choice. See “Collecting Evidence Files” on page 52.

Reading packet logs

Packet logs are stored in the Desktop Protector installation directory. If you installed

 

Desktop Protector in the default location, you can find the packet log files at C:/Program

 

Files/ISS/BlackICE. Use a trace file decoding application such as Network Monitor to

 

view the information in these files.

 

Note: If you upgraded to 3.5 from a previous version of BlackICE, your evidence log files

 

are still stored in C:\Program Files\Network ICE\BlackICE.

 

Packet log files are encoded as trace files. You must have decoding application. See the

 

Windows NT or Windows 2000 documentation for more information.

Packet Log settings

This table describes the settings on the Packet Log tab:

 

 

 

 

 

 

 

 

 

This setting...

Has this effect...

 

 

 

 

 

Logging Enabled

When selected, Desktop Protector captures packet logs.

 

 

Packet logging is disabled by default.

 

 

 

 

 

File Prefix

Specifies the prefix for the packet log file names. Desktop

 

 

Protector automatically places an incremental counter in the

 

 

filename. For example, if you enter ABC, the file names will

 

 

be ABC0001.enc, ABC0002.enc, etc. The default file

 

 

prefix is log.

 

 

 

 

 

Maximum Size

Specifies the maximum size, in kilobytes, for each log file.

 

(kilobytes)

The default value is 2048 kilobytes.

 

 

 

 

 

Maximum

Specifies the maximum number of log files to generate. The

 

Number of Files

default value for the maximum number of files to log is 10.

 

 

 

 

 

 

 

 

Table 21: Packet Log tab settings

For more information about setting your packet logging preferences, see “Collecting

Packet Logs” on page 54.

72

Page 80
Image 80
Internet Security Systems Desktop Protector, 3.5 manual Packet Log Tab, Packet logs or, Evidence logs?, Reading packet logs

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.