
The Intrusion Detection Tab
77
The Intrusion Detection Tab
Introduction
The Intrusion Detection tab allows you to control the IP addresses or intrusions the
Desktop Protector engine trusts or ignores.
For information about trusting and ignoring, see “Trusting Intruders” on page 39 and
“Ignoring Events” on page 40.
Intrusion Detection
tab columns
This table describes the information that appears in the columns on the Intrusion
Detection tab.
Table 23:
Intrusion Detection tab columns
Intrusion Detection
tab buttons
This table describes the buttons that appear on the Intrusion Detection tab.
Table 24:
Intrusion Detection tab buttons
This column...
Contains this information...
Intruder IP
The IP address of the system you want to trust.
Intruder
The machine name of the system you want to trust.
Event name
The name of the event type you want to ignore.
Event ID
The standard numerical designation for the event type you
want to ignore. You can look up the numerical Event ID in the
ID:
field of the Exclude from Reporting dialog.
This button...
Has this effect...
Add
Click to open the Exclude from Reporting dialog. For
information about using the Exclude from Reporting dialog to
trust addresses or ignore events, see “Blocking Intrusions” on
page 37.
Delete
Click to remove the Trust or Ignore instruction associated with
the highlighted record.
Modify
Click to open the Exclude from Reporting dialog to make
changes to the highlighted Trust or Ignore record.
OK
Click to save your changes and return to the main Desktop
Protector window.
Cancel
Click to discard your changes and return to the Desktop
Protector window.
Apply
Click to save your changes and keep the current tab open.
Help
Displays the online Help for this tab.
Summary of Contents for RealSecure
Page 1: ...TM Desktop Protector User Guide Version 3 5 ...
Page 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Page 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Page 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Page 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Page 67: ...TM Appendixes ...
Page 68: ......
Page 96: ...Appendix B Configuration Tabs 88 ...
Page 106: ...Appendix C Advanced Firewall Settings 98 ...
Page 112: ...Appendix D Advanced Application Protection Settings 104 ...
Page 120: ...Appendix E The Main Menu 112 ...
Page 124: ...Index 116 ...