Manual do usuário Internet Security Systems 3.5

Manual para o dispositivo Internet Security Systems 3.5

Dispositivo: Internet Security Systems 3.5
Categoria: Hardware
Fabricante: Internet Security Systems
Tamanho: 1.21 MB
Data de adição: 3/9/2013
Número de páginas: 126
Imprimir o manual

Baixar

Como usar?

Nosso objetivo é fornecer-lhe o mais rapidamente possível o acesso ao conteúdo contido no manual de instruções para Internet Security Systems 3.5. Usando a pré-visualização online, você pode visualizar rapidamente o índice e ir para a página onde você vai encontrar a solução para seu problema com Internet Security Systems 3.5.

Para sua conveniência

Se a consulta dos manuais Internet Security Systems 3.5 diretamente no site não for conveniente para você, você tem duas soluções possíveis:

  • Visualização em tela cheia - Para visualizar facilmente o manual do usuário (sem baixá-lo para seu computador), você pode usar o modo de tela cheia. Para começar a visualização do manual Internet Security Systems 3.5 no modo de tela cheia, use o botão Tela cheia.
  • Download para seu computador - você também pode baixar o manual Internet Security Systems 3.5 em seu computador e mantê-lo em suas coleções. No entanto, se você não quer perder espaço no seu dispositivo, você sempre pode baixá-lo no futuro a partir de ManualsBase.
Internet Security Systems 3.5 Manual de instruções - Online PDF
Advertisement
« Page 1 of 126 »
Advertisement
Versão para impressão

Muitas pessoas preferem ler os documentos não na tela, mas na versão impressa. A opção de imprimir o manual também foi fornecida, você pode usá-la clicando na hiperligação acima - Imprimir o manual. Você não precisa imprimir o manual inteiro Internet Security Systems 3.5, apenas as páginas selecionadas. Respeite o papel.

Resumos

Abaixo você encontrará previews do conteúdo contido nas páginas subseqüentes do manual para Internet Security Systems 3.5. Se você deseja visualizar rapidamente o conteúdo das páginas subseqüentes, você pode usá-los.

Resumos do conteúdo
Resumo do conteúdo contido na página número 8

Preface Getting Technical Support Introduction ISS provides technical support through its Web site and by email or telephone. The ISS Web site The Internet Security Systems (ISS) Resource Center Web site (http://www.iss.net/ support/) provides direct access to much of the information you need. You can find frequently asked questions (FAQs), white papers, online documentation, current versions listings, detailed product literature, and the Technical Support Knowledgebase (http:// www.iss.net/s

Resumo do conteúdo contido na página número 9

Chapter 1 Introduction to RealSecure Desktop Protector Overview Introduction RealSecure Desktop Protector is a comprehensive security solution that helps you protect your system and your network from the following:  theft of passwords, credit card information, personal files and more  computer downtime and system crashes  hackers using your system to start attacks against other systems This chapter describes the basic concepts of RealSecure Desktop Protector. In this chapter This chapter co

Resumo do conteúdo contido na página número 10

Chapter 1: Introduction to RealSecure Desktop Protector inbound and outbound traffic on your system for suspicious activity. Desktop Protector blocks unauthorized activity without affecting normal traffic. Intrusion detection RealSecure Desktop Protector contains an intrusion detection system that alerts you to attacks and blocks threats to your system. Desktop Protector captures information about the attacker and logs suspicious activity, which preserves evidence of the attack. Application R

Resumo do conteúdo contido na página número 11

Protection Levels Protection Levels Introduction Protection levels are pre-designed sets of security settings developed for different types of Web use. You can choose to have Desktop Protector block all communications with your system, some communications with your system, or no communications with your system. You can change protection levels at any time. How protection Protection levels modify your firewall by closing some of the software links, or ports, that levels work your system uses

Resumo do conteúdo contido na página número 12

Chapter 1: Introduction to RealSecure Desktop Protector Adaptive Protection Introduction Adaptive Protection automatically adapts each agent's security level according to the type of network connection it is using. For example, you can set Adaptive Protection to use a more restrictive security level when users are logged on over a VPN, and a less restrictive security level when users are logged directly onto the network. When to use You may need to connect to your corporate network from insi

Resumo do conteúdo contido na página número 13

The Desktop Protector Firewall The Desktop Protector Firewall Introduction Desktop Protector automatically stops most intrusions according to the protection level you have chosen, but you still may notice activity that isn't explicitly blocked. You can configure the Desktop Protector firewall to increase your protection. You can block intrusions from a particular address, or you can block intrusions that use a particular protocol. Protocol analysis The Desktop Protector firewall works by rec

Resumo do conteúdo contido na página número 14

Chapter 1: Introduction to RealSecure Desktop Protector Application Protection Introduction BlackICE protects your computer from unknown applications and from applications connecting to a network, such as the Internet. How the baseline First, BlackICE creates a baseline record (also known as a checksum) of the applications works installed on your computer. Then it compares that baseline with any application that attempts to launch or to communicate with a network. If the application does not

Resumo do conteúdo contido na página número 15

Application Control Application Control Introduction RealSecure Desktop Protector lets you control which applications and related processes can run on your system. Sometimes a program may be installed on your system without your knowledge. Many of these programs are useful or harmless. However, some of these programs can present security risks. They may allow an intruder to locate password information, make the system more vulnerable to future entry, or destroy programs or data on the hard

Resumo do conteúdo contido na página número 16

Chapter 1: Introduction to RealSecure Desktop Protector Communications Control Introduction To reduce security risks from potential “Trojan horse” applications on your system, RealSecure Desktop Protector lets you choose which applications or processes can access a network, such as the Internet or a local area network. How Desktop Protector tracks all the applications (and related processes) that you authorize to Communications access a network from your system. If any software installed on

Resumo do conteúdo contido na página número 17

Desktop Protector Alerts Desktop Protector Alerts Introduction Your dynamic firewall handles most alerts for you, but you can take additional steps to make its responses even more effective. The information in this topic may help you determine which events merit your attention. Severity levels Some network events are more dangerous than others. Desktop Protector assigns each event a numerical rank that reflects the event’s potential risk level, and reports that rank with an icon on the Event

Resumo do conteúdo contido na página número 18

Chapter 1: Introduction to RealSecure Desktop Protector Response levels Desktop Protector reports how it responded to each event by showing a symbol. The symbol for a response can appear two ways:  as an icon beside the event  as a mark over the severity level icon This table describes Desktop Protector response level icons and overlays: Icon Overlay Description Attack Blocked: Desktop Protector successfully blocked the attack. Depending on the severity of the event, Desktop Protector may a

Resumo do conteúdo contido na página número 19

Collecting Information Collecting Information Introduction When an intruder attempts to break into your system, RealSecure Desktop Protector can track the intruder’s activities. You can use this information to determine what an intruder did to your computer. This section explains how to gather and use this information. Back Tracing Desktop Protector can back trace each intrusion to determine where it originated. You can tell Desktop Protector to seek information from the originating computer

Resumo do conteúdo contido na página número 20

Chapter 1: Introduction to RealSecure Desktop Protector Filtering Information Introduction You probably won't need to inspect all the information RealSecure Desktop Protector gathers about the Internet traffic that reaches your system. You can use the configuration tabs to control how much information appears on the information tabs and how often Desktop Protector alerts you to potential risks. You can instruct Desktop Protector to show only events that present risks over a given level. For

Resumo do conteúdo contido na página número 1

TM
Desktop Protector
User Guide
Version 3.5

Resumo do conteúdo contido na página número 2

Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © Internet Security Systems, Inc. 1999-2002. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patents pending

Resumo do conteúdo contido na página número 3

Contents Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Conventions Used in this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Getting Technical Support . . . . . . . . . . . . . . . . . . . . .

Resumo do conteúdo contido na página número 4

Contents Appendix A: Operating Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 The Events Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 The Intruders Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Resumo do conteúdo contido na página número 5

Preface Overview Introduction This guide is designed to help you use RealSecure Desktop Protector to protect your local system and your network from unwanted intrusions. Scope This guide describes the features of RealSecure Desktop Protector and shows you how to use them.  Chapter 1 explains how Desktop Protector protects your local system from attacks and unwanted intrusions.  Chapter 2 provides information about using Desktop Protector to help ICEcap Manager manage network-wide security.

Resumo do conteúdo contido na página número 6

Preface Related publications The following documents are available for download from the Internet Security Systems Web site at www.iss.net.  For information about working with RealSecure Desktop Protector on a corporate network, see the RealSecure ICEcap Manager User Guide.  For answers to questions about Desktop Protector, see RealSecure Desktop Protector Frequently Asked Questions.  For system requirements for Desktop Protector, see System Requirements.  For general information about De

Resumo do conteúdo contido na página número 7

Conventions Used in this Guide Conventions Used in this Guide Introduction This topic explains the typographic conventions used in this guide to make information in procedures and commands easier to recognize. In procedures The typographic conventions used in procedures are shown in the following table: Convention What it Indicates Examples An element on the graphical Bold Type the computer’s user interface. address in the IP Address box. Select the Print check box. Click OK. A key on the


Manuais similares
# Manual do usuário Categoria Baixar
1 Internet Security Systems Desktop Protector Manual de instruções Hardware 1
2 Sony MSAKIT-PC4A Manual de instruções Hardware 2
3 Sony MRW62E-S1 2694866142 Manual de instruções Hardware 5
4 Philips MATCH LINE 9596 Manual de instruções Hardware 17
5 Sony 64GB SDHC Class 10 Memory Card Readers SF32UY Manual de instruções Hardware 1
6 Philips PSC702 Manual de instruções Hardware 1
7 Sony MRW62E/S1/181 Manual de instruções Hardware 3
8 Sony 64GB SDHC Class 10 Memory Card Readers SF32N4/TQM Manual de instruções Hardware 1
9 Philips SAA7345 Manual de instruções Hardware 1
10 Philips SBC MC8650 Manual de instruções Hardware 268
11 Philips PSC 605 Manual de instruções Hardware 1
12 Sony DKA-MC2F Manual de instruções Hardware 1
13 Sony AR-B1570 Manual de instruções Hardware 2
14 Sony Memory Stick Micro MSM8TQ Manual de instruções Hardware 1
15 321 Studios GHDX2-2430S-24F4D Manual de instruções Hardware 1