The Intrusion Detection Tab
77
The Intrusion Detection Tab
Introduction The Intrusion Detection tab allows you to control the IP addresses or intrusions the
Desktop Protector engine trusts or ignores.
For information about trusting and ignoring, see Trusting Intruders on page39 and
Ignoring Events on page 40.
Intrusion Detection
tab columns
This table describes the information that appears in the columns on the Intrusion
Detection tab.
Table 23: Intrusion Detection tab columns
Intrusion Detection
tab buttons
This table describes the buttons that appear on the Intrusion Detection tab.
Table 24: Intrusion Detection tab buttons
This column... Contains this information...
Intruder IP The IP address of the system you want to trust.
Intruder The machine name of the system you want to trust.
Event name The name of the event type you want to ignore.
Event ID The standard numerical designation for the event type you
want to ignore. You can look up the numerical Event ID in the
ID: field of the Exclude from Reporting dialog.
This button... Has this effect...
Add Click to open the Exclude from Reporting dialog. For
information about using the Exclude from Reporting dialog to
trust addresses or ignore events, see Blocking Intrusions on
page37.
Delete Click to remove the Trust or Ignore instruction associated with
the highlighted record.
Modify Click to open the Exclude from Reporting dialog to make
changes to the highlighted Trust or Ignore record.
OK Click to save your changes and return to the main Desktop
Protector window.
Cancel Click to discard your changes and return to the Desktop
Protector window.
Apply Click to save your changes and keep the current tab open.
Help Displays the online Help for this tab.