Appendix B: Configuration Tabs
76
The Back Trace Tab
Introduction Back tracing is the process of tracing a network connection to its origin. When somebody
connects to your system over a network such as the Internet, your system and the
intruder's system exchange packets. Before an intruder's packets reach your system, they
travel through several routers. RealSecure Desktop Protector can read information from
these packets and identify each router the intruder's packets had to travel through.
Desktop Protector can often identify the intruder's system in this way.
For more information about setting your back tracing preferences, see Introduction on
page 50.
Threshold The threshold setting indicates the event severity level that will trigger a trace of the
attack. Severity refers to the numeric level of each event.
The default event severity for the indirect trace threshold is 3.
The default event severity for the direct trace threshold is 6.
DNS lookup When this option is selected, RealSecure Desktop Protector queries available DNS
(Domain Name Service) servers for information about the intruder.
Note: DNS Lookup is enabled by default.
NetBIOS
nodestatus
When this option is selected, Desktop Protector performs a NetBIOS lookup on the
intruder's system.
Note: NetBIOS Node Status is enabled by default.
Back Trace Tab
buttons
This table describes the buttons that appear on the Back Trace tab.
This button... Has this effect...
OK Click to save your changes and return to the main Desktop
Protector window.
Cancel Click to discard your changes and return to the Desktop
Protector window.
Apply Click to save your changes and keep the current tab open.
Help Displays the online Help for this tab.