Internet Security Systems Desktop Protector Version 3.5 Manuale Utente Pagina 39

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 126
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 38
31
Chapter 4
Configuring RealSecure Desktop
Protector
Overview
Introduction This chapter provides the procedures to configure RealSecure Desktop Protector for your
specific conditions. These procedures are designed to be performed in sequence.
In this chapter This chapter includes the following topics:
Topic Page
Connecting to ICEcap Manager 32
Setting Your Protection Level 34
Using Adaptive Protection 35
Blocking Intrusions 37
Trusting Intruders 39
Ignoring Events 40
Working with the Application Protection Baseline 42
Configuring Communications Control 46
Controlling Event Notification 48
Back Tracing 50
Collecting Evidence Files 52
Collecting Packet Logs 54
Responding to Application Protection Alerts 56
Exporting Desktop Protector Data 57
Vedere la pagina 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 125 126

Commenti su questo manuale

Nessun commento