
Chapter 4: Configuring RealSecure Desktop Protector
52
Collecting Evidence Files
Introduction
RealSecure Desktop Protector can capture network traffic attributed to an intrusion and
place that information into an evidence file. Desktop Protector captures and decodes each
packet coming into the system, so it can generate files that contain detailed information
about the intruder's network traffic.
Where are my
evidence files?
Desktop Protector evidence files are stored in the installation directory folder. For
example, if you install Desktop Protector in the
Program Files
directory on the
C:
drive,
the evidence files are located in
C:\Program Files\ISS\BlackICE
. Each file has an
*.enc
extension.
Note:
If you upgraded to RealSecure Desktop Protector 3.5 from a previous version of
BlackICE, your evidence log files are still stored in
C:\Program Files\Network
ICE\BlackICE
.
Evidence file format
The evidence and packet log files are trace files. You must have a trace file decoding
application to view the contents of these files. Many networking and security product
companies produce such decoders. Some shareware decoders are also available on the
Internet. If you are using Windows NT or Windows 2000 Server, you can install the
Network Monitoring service, which includes Network Monitor, a decoding application.
See the Windows NT or Windows 2000 documentation for more information.
Procedure
To collect evidence files:
1. From the Main Menu, select
Tools
Æ
Edit BlackICE Settings
.
2. Select the
Evidence Log
tab.
3. Select
Logging Enabled
.
4. In the
File prefix
box, specify the prefix for the evidence file names.
■
To place a date stamp (format YYYYMMDD) and number (NN) in the file name,
enter
%d
after the prefix. For example, if you enter
evd%d
, the file names will look
like this:
evdYYYYMMDD-NN.enc
. The time is in 24-hour format in Greenwich Mean
Time (GMT).
5. In the
Maximum Size
box, specify how large each evidence file can get.
Note:
For best results, keep this value smaller than 2048 kilobytes (2 MB).
6. In the
Maximum Number of Files
box, choose how many files Desktop Protector can
generate in the specified collection time period.
Note:
For example, if the maximum number of files is 32 (the default value), Desktop
Protector does not generate more than 32 evidence files in any 24-hour period.
Clearing evidence
logs
To delete evidence logs:
Note:
Clearing evidence log data does not affect the Desktop Protector intrusion
detection and firewall functions.
1. From the Main Menu, click
Tools
Æ
Clear Files
.
The Files to Delete window appears.
2. Select
Evidence logs
.
Summary of Contents for RealSecure
Page 1: ...TM Desktop Protector User Guide Version 3 5 ...
Page 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Page 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Page 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Page 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Page 67: ...TM Appendixes ...
Page 68: ......
Page 96: ...Appendix B Configuration Tabs 88 ...
Page 106: ...Appendix C Advanced Firewall Settings 98 ...
Page 112: ...Appendix D Advanced Application Protection Settings 104 ...
Page 120: ...Appendix E The Main Menu 112 ...
Page 124: ...Index 116 ...