
31
Chapter 4
Configuring RealSecure Desktop
Protector
Overview
Introduction
This chapter provides the procedures to configure RealSecure Desktop Protector for your
specific conditions. These procedures are designed to be performed in sequence.
In this chapter
This chapter includes the following topics:
Topic
Page
Connecting to ICEcap Manager
32
Setting Your Protection Level
34
Using Adaptive Protection
35
Blocking Intrusions
37
Trusting Intruders
39
Ignoring Events
40
Working with the Application Protection Baseline
42
Configuring Communications Control
46
Controlling Event Notification
48
Back Tracing
50
Collecting Evidence Files
52
Collecting Packet Logs
54
Responding to Application Protection Alerts
56
Exporting Desktop Protector Data
57
Summary of Contents for RealSecure
Page 1: ...TM Desktop Protector User Guide Version 3 5 ...
Page 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Page 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Page 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Page 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Page 67: ...TM Appendixes ...
Page 68: ......
Page 96: ...Appendix B Configuration Tabs 88 ...
Page 106: ...Appendix C Advanced Firewall Settings 98 ...
Page 112: ...Appendix D Advanced Application Protection Settings 104 ...
Page 120: ...Appendix E The Main Menu 112 ...
Page 124: ...Index 116 ...