218
3.
To start the creation of the new rule, click
Add Before
. This starts the
Firewall Rule Wizard.
4.
In the
Rule Type
window select
Allow
.
5.
In the
Remote hosts
window select
Any remote host
.
6.
In the
Services
window select
Ping
from the
Service
drop-down list,
and
both
from the
Directions
drop-down list.
7.
In the
Advanced Options
window select the following options:
Security alert
from the
Send alert
drop-down list
Network Event: Potentially Dangerous Service Allowed
from the
Alert trap
drop-down list
You can also enter a comment for the alert in the
Alert comment
field.
8.
In the
Summary
window you can verify that the rule is correct and
enter a descriptive comment for the rule.
9.
Click
to save the policy data.
10. Click
to distribute the policy.
11. You can now test the rule by pinging one of the managed hosts and
checking that an alert is created and displayed on the
Alerts
tab.
6.7
Configuring the Intrusion Prevention
The Intrusion Prevention monitors inbound traffic and tries to find
intrusion attempts. It can also be used to monitor viruses that try to attack
computers in the LAN. The Intrusion Prevention analyses the payload
(the contents) and the header information of an IP packet, and compares
this information with the known attack patterns. If the information is similar
or identical to one of the known attack patterns, the Intrusion Prevention
creates an alert and takes the action it has been configured to take.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...