Internet Security Systems Desktop Protector Version 3.5 Manual de usuario Pagina 1

Busca en linea o descarga Manual de usuario para Software Internet Security Systems Desktop Protector Version 3.5. Internet Security Systems Desktop Protector Version 3.5 User's Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 126
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - User Guide

TMDesktop ProtectorUser GuideVersion 3.5

Pagina 2

Chapter 1: Introduction to RealSecure Desktop Protector2inbound and outbound traffic on your system for suspicious activity. Desktop Protector blocks

Pagina 3 - Contents

Appendix C: Advanced Firewall Settings92The Local Adaptive Protection TabUse this tab to configure your firewall to switch protection levels dynamical

Pagina 4

The Remote Adaptive Protection Tab93The Remote Adaptive Protection TabWhen your firewall detects a connection with a remote system that is using one o

Pagina 5

Appendix C: Advanced Firewall Settings94The Add Firewall Entry DialogIntroduction Use this dialog to create or change firewall settings that block or

Pagina 6

The Add Firewall Entry Dialog95Add Firewall Entry dialog buttonsThe Add Firewall Entry dialog has these buttons:This button... Has this effect...Add C

Pagina 7 - ÆCompare

Appendix C: Advanced Firewall Settings96The Modify Firewall Entry DialogIntroduction Use this dialog to change a firewall setting that you have set up

Pagina 8 - Getting Technical Support

The Modify Firewall Entry Dialog97Modify Firewall Entry dialog buttonsThe Modify Firewall Entry dialog has these buttons:This button... Has this effec

Pagina 9 - RealSecure Desktop

Appendix C: Advanced Firewall Settings98

Pagina 10

99Appendix DAdvanced Application Protection SettingsOverviewIntroduction The Advanced Application Settings window lets you control which applications

Pagina 11 - Protection Levels

Appendix D: Advanced Application Protection Settings100Advanced Application Settings window menu commandsThe Advanced Application Protection Settings

Pagina 12 - Adaptive Protection

The Known Applications Tab101The Known Applications TabIntroduction The Known Applications tab shows the application files Desktop Protector has detec

Pagina 13

Protection Levels3Protection LevelsIntroduction Protection levels are pre-designed sets of security settings developed for different types of Web use.

Pagina 14 - Application Protection

Appendix D: Advanced Application Protection Settings102The Baseline TabIntroduction The Baseline tab allows you to control how RealSecure Desktop Prot

Pagina 15 - Application Control

The Checksum Extensions Dialog103The Checksum Extensions DialogIntroduction The Checksum Extensions dialog enables you to customize the application fi

Pagina 16 - Communications Control

Appendix D: Advanced Application Protection Settings104

Pagina 17 - Desktop Protector Alerts

105Appendix EThe Main MenuOverviewIntroduction The Main Menu appears above the information tabs. This Appendix explains how to use the menu options to

Pagina 18 - ● as an icon beside the event

Appendix E: The Main Menu106The File MenuIntroduction Use the File menu to control the essential operations of RealSecure Desktop Protector.Print... P

Pagina 19 - Collecting Information

The Edit Menu107The Edit MenuIntroduction Use the Edit menu to manipulate the intrusion records that RealSecure Desktop Protector gathers. For more in

Pagina 20 - Filtering Information

Appendix E: The Main Menu108The View MenuIntroduction Use the View menu to choose what items are displayed, and how, on the Events and Intruders lists

Pagina 21 - Overview

The Tools Menu109The Tools MenuIntroduction The Tools menu enables you to configure the application by editing the settings; edit the Advanced Firewal

Pagina 22 - Protector

Appendix E: The Main Menu110The Help MenuIntroduction The Help menu offers links to the Help, the ISS Web site, and information about Desktop Protecto

Pagina 23 - ÆEdit BlackICE Settings

The System Tray Menu111The System Tray MenuIntroduction The system tray menu provides a quick way to access some key Desktop Protector functions. You

Pagina 24

Chapter 1: Introduction to RealSecure Desktop Protector4Adaptive ProtectionIntroduction Adaptive Protection automatically adapts each agent's se

Pagina 25 - ● through a proxy server

Appendix E: The Main Menu112

Pagina 26

113Indexaaccepting events 39adaptive protection 4, 92–93adding an entry 94addressesblocking and accepting 37Advanced Application Control Settings wind

Pagina 27

Index114eEdit menu 107eventsaccepting 39, 96blocking 37, 96clearing 48, 109deleting 48filtering 12, 48, 108finding 107freezing 49, 108ignoring 40notif

Pagina 28

Index115clearing 48, 54, 109collecting 54Paranoid protection level 3, 70ports, blocking 40prerequisitesinstallation 22printing information 64, 66, 91,

Pagina 29

Index116

Pagina 30 - RSDPSetup.exe

117Internet Security Systems, Inc. Software License Agreement THIS SOFTWARE IS LICENSED, NOT SOLD. BY INSTALLING THIS SOFTWARE, YOU AGREE TO ALL OF TH

Pagina 31 - 192.168.0.101:8082

Chapter 0:11813. No High Risk Use - Licensee acknowledges that the Software is not fault tolerant and is not designed or intended for use in hazardous

Pagina 32 - Stopping Desktop Protector

The Desktop Protector Firewall5The Desktop Protector FirewallIntroduction Desktop Protector automatically stops most intrusions according to the prote

Pagina 33 - ÆSettings ÆControl Panel

Chapter 1: Introduction to RealSecure Desktop Protector6Application ProtectionIntroduction BlackICE protects your computer from unknown applications a

Pagina 34 - Restarting Desktop Protector

Application Control7Application ControlIntroduction RealSecure Desktop Protector lets you control which applications and related processes can run on

Pagina 35

Chapter 1: Introduction to RealSecure Desktop Protector8Communications ControlIntroduction To reduce security risks from potential “Trojan horse” appl

Pagina 36

Desktop Protector Alerts9Desktop Protector AlertsIntroduction Your dynamic firewall handles most alerts for you, but you can take additional steps to

Pagina 37 - ■ If no, click No

Chapter 1: Introduction to RealSecure Desktop Protector10Response levels Desktop Protector reports how it responded to each event by showing a symbol.

Pagina 38

Collecting Information11Collecting InformationIntroduction When an intruder attempts to break into your system, RealSecure Desktop Protector can track

Pagina 39

Internet Security Systems, Inc.6303 Barfield RoadAtlanta, Georgia 30328-4233United States(404) 236-2600http://www.iss.net © Internet Security Systems,

Pagina 40 - Connecting to ICEcap Manager

Chapter 1: Introduction to RealSecure Desktop Protector12Filtering InformationIntroduction You probably won't need to inspect all the information

Pagina 41

13Chapter 2Using RealSecure Desktop Protector with ICEcap ManagerOverview Introduction RealSecure Desktop Protector interacts with the ICEcap manageme

Pagina 42 - Setting Your Protection Level

Chapter 2: Using RealSecure Desktop Protector with ICEcap Manager14How ICEcap Manager Works With RealSecure Desktop ProtectorIntroduction ICEcap Manag

Pagina 43 - Using Adaptive Protection

How ICEcap Manager Works With RealSecure Desktop Protector15locally installed. Silent Desktop Protector installations are always completely ICEcap-con

Pagina 44 - 6. Click OK

Chapter 2: Using RealSecure Desktop Protector with ICEcap Manager16How ICEcap Manager Handles InformationIntroduction To help organize information, IC

Pagina 45 - Blocking Intrusions

Transmitting Data to ICEcap Manager17Transmitting Data to ICEcap ManagerIntroduction Desktop Protector must be able to transmit data across your netwo

Pagina 46

Chapter 2: Using RealSecure Desktop Protector with ICEcap Manager18Installing Desktop Protector RemotelyIntroduction In addition to managing event inf

Pagina 47 - Trusting Intruders

Using ICEcap Manager to Control RealSecure Agents19Using ICEcap Manager to Control RealSecure AgentsIntroduction ICEcap Manager manages agents by appl

Pagina 48 - Ignoring Events

Chapter 2: Using RealSecure Desktop Protector with ICEcap Manager20

Pagina 49

21Chapter 3Setting Up RealSecure Desktop ProtectorOverviewIntroduction This chapter provides instructions for installing and configuring RealSecure De

Pagina 50 - ● create a new baseline

iiiContentsPreface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 51

Chapter 3: Setting Up RealSecure Desktop Protector22Installing RealSecure Desktop ProtectorIntroduction This topic gives instructions for installing D

Pagina 52

Installing RealSecure Desktop Protector238. Read the End User License Agreement. If you accept the End User License Agreement, click I Accept, and th

Pagina 53

Chapter 3: Setting Up RealSecure Desktop Protector24Stopping Desktop ProtectorIntroduction When you quit the Desktop Protector application, Desktop Pr

Pagina 54

Stopping Desktop Protector25Stopping Desktop Protector from the control panel (Windows 2000)To stop Desktop Protector from the Windows 2000 control pa

Pagina 55

Chapter 3: Setting Up RealSecure Desktop Protector26Restarting Desktop ProtectorIntroduction You can restart RealSecure Desktop Protector after you ha

Pagina 56 - ÆBlackICE Settings

Restarting Desktop Protector273. Double-click Services.The Services window appears.4. In the right pane, right-click BlackICE, and then select Start.D

Pagina 57 - ÆFreeze

Chapter 3: Setting Up RealSecure Desktop Protector28Uninstalling Desktop ProtectorIntroduction You can remove Desktop Protector from your computer usi

Pagina 58 - Back Tracing

Uninstalling Desktop Protector297. Do you want to remove the remaining intrusion files and delete the directory? If yes, click Yes. If no, click No.

Pagina 59

Chapter 3: Setting Up RealSecure Desktop Protector30

Pagina 60 - Collecting Evidence Files

31Chapter 4Configuring RealSecure Desktop ProtectorOverview Introduction This chapter provides the procedures to configure RealSecure Desktop Protecto

Pagina 61 - Log Tab” on page 74

ivContentsAppendix A: Operating Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Overview . . . . .

Pagina 62 - Collecting Packet Logs

Chapter 4: Configuring RealSecure Desktop Protector32Connecting to ICEcap ManagerIntroduction RealSecure Desktop Protector interacts with ICEcap Manag

Pagina 63 - Tab” on page 72

Connecting to ICEcap Manager33 OK: The local RealSecure agent is successfully exchanging information with ICEcap Manager. Authentication Failure: Th

Pagina 64

Chapter 4: Configuring RealSecure Desktop Protector34Setting Your Protection LevelIntroduction Protection levels are predesigned sets of security sett

Pagina 65 - Procedure To export data:

Using Adaptive Protection35Using Adaptive ProtectionYou can set up your firewall to switch protection levels automatically when it detects a connectio

Pagina 66

Chapter 4: Configuring RealSecure Desktop Protector36Note: This can be a single static IP address or a set of addresses that the conference host provi

Pagina 67 - Appendixes

Blocking Intrusions37Blocking IntrusionsIntroduction Desktop Protector identifies and stops most intrusions according to your preset protection level,

Pagina 68

Chapter 4: Configuring RealSecure Desktop Protector38Blocking a Port If you don't have a specific intruder in mind but you are concerned about in

Pagina 69 - Operating Tabs

Trusting Intruders39Trusting IntrudersIntroduction When an address is trusted, Desktop Protector assumes all communication from that address is author

Pagina 70 - The Events Tab

Chapter 4: Configuring RealSecure Desktop Protector40Ignoring EventsYou can configure RealSecure Desktop Protector to ignore events that are not a thr

Pagina 71 - Optional columns on

Ignoring Events41For more information, see “The Prompts Tab” on page 83.

Pagina 72 - Appendix A: Operating Tabs

vPrefaceOverviewIntroduction This guide is designed to help you use RealSecure Desktop Protector to protect your local system and your network from u

Pagina 73 - The Intruders Tab

Chapter 4: Configuring RealSecure Desktop Protector42Working with the Application Protection BaselineIntroduction When you install RealSecure Desktop

Pagina 74

Working with the Application Protection Baseline433. Repeat for every warning message that appears. The number of messages you see depends on how many

Pagina 75 - The History Tab

Chapter 4: Configuring RealSecure Desktop Protector44Adding file types to the baselineIf you know of application files on your system that have differ

Pagina 76 - Table 19: History tab buttons

Working with the Application Protection Baseline45Disabling Application ProtectionTo permanently prevent Desktop Protector from monitoring your system

Pagina 77 - Configuration Tabs

Chapter 4: Configuring RealSecure Desktop Protector46Configuring Communications ControlIntroduction When you set your communications control preferenc

Pagina 78 - The Firewall Tab

Configuring Communications Control47For more information about setting your Communications Control preferences, see “The Communications Control Tab” o

Pagina 79

Chapter 4: Configuring RealSecure Desktop Protector48Controlling Event NotificationIntroduction You may find that you want regular access to more or l

Pagina 80 - The Packet Log Tab

Controlling Event Notification494. Click OK.For more information about setting your notification preferences, see “The Notifications Tab” on page 81.F

Pagina 81 - Packet Log tab

Chapter 4: Configuring RealSecure Desktop Protector50Back TracingIntroduction RealSecure Desktop Protector can track an intruder’s activities to help

Pagina 82 - The Evidence Log Tab

Back Tracing51want as much information about the intruder as possible. However, intruders can detect and block a direct trace.Where is the back tracin

Pagina 83 - Evidence Log tab

PrefaceviRelated publications The following documents are available for download from the Internet Security Systems Web site at www.iss.net.● For info

Pagina 84 - The Back Trace Tab

Chapter 4: Configuring RealSecure Desktop Protector52Collecting Evidence FilesIntroduction RealSecure Desktop Protector can capture network traffic at

Pagina 85 - The Intrusion Detection Tab

Collecting Evidence Files533. Click OK.For more information about setting your evidence logging preferences, see “The Evidence Log Tab” on page 74.

Pagina 86 - The ICEcap Tab

Chapter 4: Configuring RealSecure Desktop Protector54Collecting Packet LogsIntroduction Packet logging records all the packets that enter your system.

Pagina 87

Collecting Packet Logs55For more information about choosing your packet logging settings, see “The Packet Log Tab” on page 72.

Pagina 88

Chapter 4: Configuring RealSecure Desktop Protector56Responding to Application Protection AlertsIntroduction Programs can start without your knowledge

Pagina 89 - The Notifications Tab

Exporting Desktop Protector Data57Exporting Desktop Protector DataIntroduction You may want to export RealSecure Desktop Protector data into a spreads

Pagina 90 - Notifications tab

Chapter 4: Configuring RealSecure Desktop Protector58

Pagina 93

61Appendix AOperating TabsOverviewIntroduction This appendix describes the operating tabs. RealSecure Desktop Protector gathers information and presen

Pagina 94

Conventions Used in this GuideviiConventions Used in this GuideIntroduction This topic explains the typographic conventions used in this guide to make

Pagina 95 - Protector window

Appendix A: Operating Tabs62The Events TabIntroduction The Events tab summarizes all intrusion and system events on your computer. The tab columns sho

Pagina 96

The Events Tab63Optional columns on the Events tabThis table describes optional columns that you can add to the Events tab. To add an optional column,

Pagina 97 - Advanced Firewall Settings

Appendix A: Operating Tabs64Shortcut commands on the Events tabThis table describes the commands available by right-clicking an item on the Event tab:

Pagina 98 - The Firewall Rules Tab

The Intruders Tab65The Intruders TabIntroduction The Intruders tab displays all the information RealSecure Desktop Protector has collected about all t

Pagina 99

Appendix A: Operating Tabs66Optional columns on the Intruders tabThis table describes the optional columns you can add to the Intruders tab. For infor

Pagina 100

The History Tab67The History TabIntroduction The History tab graphs network and intrusion activity on your system.Note: For detailed information about

Pagina 101

Appendix A: Operating Tabs68History tab buttons This table describes the buttons on the History tab:This button... Has this effect...Close Closes the

Pagina 102 - The Add Firewall Entry Dialog

69Appendix BConfiguration TabsOverviewIntroduction You can control some aspects of the way RealSecure Desktop Protector works by changing the settings

Pagina 103 - Add Firewall Entry

Appendix B: Configuration Tabs70The Firewall TabIntroduction Use the Firewall tab to choose how tightly Desktop Protector controls access to your syst

Pagina 104 - Entry dialog

The Firewall Tab71Desktop Protector rejects or blocks communications on port 139. On Windows 2000, this setting also affects port 445.Allow NetBIOS Ne

Pagina 105 - Entry dialog buttons

PrefaceviiiGetting Technical SupportIntroduction ISS provides technical support through its Web site and by email or telephone. The ISS Web site The I

Pagina 106

Appendix B: Configuration Tabs72The Packet Log TabIntroduction The Packet Log tab allows you to configure the RealSecure Desktop Protector packet logg

Pagina 107 - Settings

The Packet Log Tab73Packet Log tab buttonsThis table describes the buttons that appear on the Packet Log tab.This button... Has this effect...OK Click

Pagina 108

Appendix B: Configuration Tabs74The Evidence Log TabIntroduction When your system is attacked, RealSecure Desktop Protector can capture evidence files

Pagina 109 - The Known Applications Tab

The Evidence Log Tab75Evidence Log tab buttonsThis table describes the buttons that appear on the Evidence Log tab.This button... Has this effect...OK

Pagina 110 - The Baseline Tab

Appendix B: Configuration Tabs76The Back Trace TabIntroduction Back tracing is the process of tracing a network connection to its origin. When somebod

Pagina 111

The Intrusion Detection Tab77The Intrusion Detection TabIntroduction The Intrusion Detection tab allows you to control the IP addresses or intrusions

Pagina 112

Appendix B: Configuration Tabs78The ICEcap TabIntroduction The ICEcap tab allows you to manually control how RealSecure Desktop Protector reports intr

Pagina 113 - The Main Menu

The ICEcap Tab79Last Status Shows the result of RealSecure Desktop Protector’s last attempt to check in with the ICEcap server, at the time displayed

Pagina 114 - The File Menu

Appendix B: Configuration Tabs80ICEcap tab buttons This table describes the buttons that appear on the ICEcap tab.This button... Has this effect...OK

Pagina 115 - The Edit Menu

The Notifications Tab81The Notifications TabIntroduction The Notifications tab allows you to control some interface and notification functions.Notific

Pagina 116 - The View Menu

1Chapter 1Introduction to RealSecure Desktop ProtectorOverviewIntroduction RealSecure Desktop Protector is a comprehensive security solution that help

Pagina 117 - The Tools Menu

Appendix B: Configuration Tabs82Notifications tab buttonsThis table describes the buttons that appear on the Notifications tab.This button... Has this

Pagina 118 - The Help Menu

The Prompts Tab83The Prompts TabIntroduction The Prompts tab enables you to choose the level of feedback you want from the RealSecure Desktop Protecto

Pagina 119 - The System Tray Menu

Appendix B: Configuration Tabs84The Application Control TabIntroduction Use the Application Control tab to prevent unauthorized applications from star

Pagina 120 - Appendix E: The Main Menu

The Application Control Tab85Application Control tab buttonsThis table describes the buttons that appear on the Application Control tab.This button...

Pagina 121

Appendix B: Configuration Tabs86The Communications Control TabIntroduction Use the Communications Control tab to prevent programs on your system from

Pagina 122

The Communications Control Tab87Cancel Click to discard your changes and return to the Desktop Protector window.Apply Click to save your changes and k

Pagina 123

Appendix B: Configuration Tabs88

Pagina 124

89Appendix CAdvanced Firewall SettingsOverviewIntroduction You can use the Advanced Firewall Settings window to block intruders or ports or to configu

Pagina 125

Appendix C: Advanced Firewall Settings90The Firewall Rules Tab Introduction Use the IP Address tab to create, modify and delete firewall settings for

Pagina 126 - Revised May 14, 2002

The Firewall Rules Tab91Buttons The following table describes the buttons on the IP Address tab:Shortcut menu These commands are available when you ri

Comentarios a estos manuales

Sin comentarios