22
Application Control
Application Control can be used to prevent unauthorized applications
from getting access to the network. In addition, application launch control
and application manipulation control protect computers against malicious
applications that try to launch or use other applications on the computer.
Application Control offers the administrator a possibility to control network
usage and restrict the use of applications that are prohibited by company
security policy. These mechanisms make it easy to prevent many of the
attacks mentioned above, and also to enforce security policies. It is
possible to configure different rules for different applications: applications
that are considered safe can be granted free access, other applications
can be either denied access, or the user is prompted to decide whether
the application can initiate a connection. For more information, see
“
Configuring Application Control
.
Intrusion Prevention System
Intrusion Prevention System (IPS) can be used for detecting malicious
patterns in network traffic. It can also be used to monitor viruses that try to
attack computers in the LAN. It registers the systematic connection
attempts made from the outside, which are often a sign of somebody
trying to find open ports on the host. Intrusion Detection System stops the
malicious packets aimed at open ports in the host. For more information,
see “
Configuring the Intrusion Prevention
1.2.3
Application Management
SNMP Agent
The F-Secure SNMP Agent is a Windows NT SNMP extension agent,
which is loaded and unloaded with the master agent. The F-Secure
SNMP Agent offers a subset of Policy Manager functionality, and it is
meant primarily for alert and statistics monitoring.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...