
CHAPTER 6
217
1.
Select
Root
in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Application Control
page. On
this page select:
Allow
from the
Default action for server applications
drop-down
list.
Allow
from the
Default action for client applications
drop-down
list.
3.
When creating any application control rules with the Application
Control Rule Wizard, select
Either
Allow
or
Deny
as the action on incoming and outgoing
connection attempts in the
Application Rule Type
dialog box.
No message
in the
Message Shown to Users
dialog box.
4.
When you have made these modifications, save the policy data and
distribute the policy to take the new configuration into use.
6.6
How to use Alerts for Checking that Internet
Shield Works?
In normal use you should not get any alerts from the Internet Shield. If you
suddenly start to receive a lot of alerts it means that there is either a
configuration mistake or then there is a problem.
When configuring alerting you should also remember that you should
have one rule for each type of alert you want. Designing alerting based on
“broad” rules will generate a lot of alerts, and any important information
might be lost in large volumes of useless alerts.
You can also create special rules that you can use for testing that the
Internet Shield works. In this example a rule that allows the use of ping is
created. If this rule included alerting, it can be used for testing that the
alerting works.
1.
Go to
Settings
tab and select the
Firewall Rules
page.
2.
Select the security level you want to use for testing purposes.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...