Internet Security Systems Desktop Protector Version 3.5 Manual do Utilizador Página 39

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 126
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 38
31
Chapter 4
Configuring RealSecure Desktop
Protector
Overview
Introduction This chapter provides the procedures to configure RealSecure Desktop Protector for your
specific conditions. These procedures are designed to be performed in sequence.
In this chapter This chapter includes the following topics:
Topic Page
Connecting to ICEcap Manager 32
Setting Your Protection Level 34
Using Adaptive Protection 35
Blocking Intrusions 37
Trusting Intruders 39
Ignoring Events 40
Working with the Application Protection Baseline 42
Configuring Communications Control 46
Controlling Event Notification 48
Back Tracing 50
Collecting Evidence Files 52
Collecting Packet Logs 54
Responding to Application Protection Alerts 56
Exporting Desktop Protector Data 57
Vista de página 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 125 126

Comentários a estes Manuais

Sem comentários