31
Chapter 4
Configuring RealSecure Desktop
Protector
Overview
Introduction
This chapter provides the procedures to configure RealSecure Desktop Protector for your
specific conditions. These procedures are designed to be performed in sequence.
In this chapter
This chapter includes the following topics:
Topic
Page
Connecting to ICEcap Manager
32
Setting Your Protection Level
34
Using Adaptive Protection
35
Blocking Intrusions
37
Trusting Intruders
39
Ignoring Events
40
Working with the Application Protection Baseline
42
Configuring Communications Control
46
Controlling Event Notification
48
Back Tracing
50
Collecting Evidence Files
52
Collecting Packet Logs
54
Responding to Application Protection Alerts
56
Exporting Desktop Protector Data
57
Содержание RealSecure
Страница 1: ...TM Desktop Protector User Guide Version 3 5 ...
Страница 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Страница 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Страница 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Страница 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Страница 67: ...TM Appendixes ...
Страница 68: ......
Страница 96: ...Appendix B Configuration Tabs 88 ...
Страница 106: ...Appendix C Advanced Firewall Settings 98 ...
Страница 112: ...Appendix D Advanced Application Protection Settings 104 ...
Страница 120: ...Appendix E The Main Menu 112 ...
Страница 124: ...Index 116 ...