46
Becoming familiar with the SGMI
Using online Help
■
When viewing Help from a dialog box, the Help window describes what the dialog box tab is used
for, provides one or more links to procedures that apply to the tab, and contains a table of the fields
on the tab and how you can use them.
For example, when you click Help on the Alert Thresholds tab of the Rules dialog box, the Help
window describes the fields that you use to set up alert thresholds.
Prerequisites
None.
To display Help
1
In the SGMI, if your focus is on a right pane tab, do one of the following:
■
Click
F1
.
■
In the Help menu, click
Symantec Gateway Security 5000 Series v3.0 Help
.
2
If you are creating or modifying an object using its properties dialog box, do one of the following:
■
Click
FI
.
■
On the properties tab, click
Help
.
Related information
For further information related to this topic, see the following:
■
Searching Help
The Help search engine uses different techniques to ensure that as many relevant topics are returned
as possible. For example, if you search for the term build, the terms build, built, builder, building, and
builds are also returned. If you search for the term best, the terms good and better are also returned.
The search engine also looks for help topics in which the query terms occur in the same form and
order. The search engine automatically relaxes these constraints to identify passages in which:
■
Not all of the terms occur ·
■
The terms occur in different forms ·
■
The terms occur in a different order ·
■
The terms occur with intervening words ·
For example, if you search for content filtering, you get results with the terms content filtering,
content filters, filtering content, or filtering unwanted content. You may also get topics returned that
have just the term content or just the term filtering.
The search engine returns a maximum of 100 topics.
JavaHelp 2.0 System User’s Guide.
(2004). Santa Clara, CA: Sun Microsystems.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...