Firewall Security Levels Table (Global)
This table displays the security levels that are available globally in the system. The security levels table is
the same for all policy domains, but enabling and disabling individual security levels can be done per policy
domain.
Network Quarantine
In this section you can:
•
Turn network quarantine on or off.
•
Specify the virus definitions age, after which
Network Quarantine
is activated.
•
Specify whether turning real-time scanning off on the host activates
Network Quarantine
.
Intrusion Prevention
In this section you can:
•
Turn intrusion prevention on or off.
•
Select the action to take when a malicious packet is detected. The options available are:
•
Log and drop.
•
Log without dropping.
•
Define the centralized alert severity.
•
Define the alert and performance level.
Firewall rules
This page is used to define the rules applied to the different firewall security levels.
Firewall Rules Table
This table lists the rules defined for different security levels. You can select the level from the
Internet Shield
security level being edited
drop-down menu. When the selected security level is changed, the rules associated
with the new security level are displayed in the table.
When the firewall is in use, the firewall rules are checked in the order in which they are displayed in the table,
from top to bottom. For security levels with the
Normal
filtering mode, it is possible to define domain or
host-specific rules. When
Allow users to define new rules
is selected, the end users are also allowed to
define new rules for that security level. The table also displays the location for these rules.
The
Firewall Rules
table displays the following information for each rule:
•
Whether the rule is turned on or off
•
The name and comment for the rule
•
The type of rule (allow/deny)
•
The related service and direction:
<=
for an inbound service,
=>
for an outbound service and
<=>
for a
bidirectional service.
•
The affected remote hosts
•
Whether alert sending is turned on or off
•
Whether the rule is applied only when a dialup link is used.
To move the location where user-defined new rules are placed in the table, click
User defined rules go here
.
You can then use the
Move Up
and
Move Down
buttons to move where the slot in the table.
In addition,
Application control
will automatically create rules on the host for applications that have been
allowed. The rules are placed just before the first
Deny rest
rule in the rules table, which is the first deny rule
with the
All traffic
service and
Any
remote host. The rules allow incoming packets to server applications,
32
| F-Secure Client Security | Anti-virus mode user interface
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 2: ......
Page 8: ...8 F Secure Client Security TOC...
Page 44: ......
Page 62: ......
Page 86: ......
Page 114: ......
Page 118: ......
Page 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...
Page 148: ......
Page 158: ......