
Chapter 1: Introduction to RealSecure Desktop Protector
2
inbound and outbound traffic on your system for suspicious activity. Desktop Protector
blocks unauthorized activity without affecting normal traffic.
Intrusion detection
RealSecure Desktop Protector contains an intrusion detection system that alerts you to
attacks and blocks threats to your system. Desktop Protector captures information about
the attacker and logs suspicious activity, which preserves evidence of the attack.
Application
protection
RealSecure Desktop Protector prevents unauthorized applications from harming your
system or other computers on a network. Application protection consists of two features:
●
Application Control
: Helps you prevent unknown and possibly destructive
applications from damaging your system. When you suspect an application may have
been modified, Application Control lets you decide whether to let it start. RealSecure
Desktop Protector goes beyond the capabilities of other products by preventing
unauthorized applications from starting other applications or services.
●
Communications Control
: Helps you prevent unauthorized applications from
communicating on the Internet. This can even prevent intruders from using your
system to start attacks against other systems. It does this by letting you control which
applications have access to a local network or the Internet.
Summary of Contents for RealSecure
Page 1: ...TM Desktop Protector User Guide Version 3 5 ...
Page 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Page 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Page 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Page 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Page 67: ...TM Appendixes ...
Page 68: ......
Page 96: ...Appendix B Configuration Tabs 88 ...
Page 106: ...Appendix C Advanced Firewall Settings 98 ...
Page 112: ...Appendix D Advanced Application Protection Settings 104 ...
Page 120: ...Appendix E The Main Menu 112 ...
Page 124: ...Index 116 ...