
Trend Micro™ GateLock™ User’s Guide
3
-
20
F
IGURE
3-20.
Anti-Hacker Options Information Screen
Anti-Hacker Logs
GateLock can also record suspected hacker intrusion attempts on your computer or
network. It can keep up 30 of the most recent suspected hacker attacks.
To view your anti-hacker logs, click Security > Anti-Hacker Logs.
The log loads, displaying the most recent suspected hacker attacks that were detected
by GateLock. The record includes the date and time of the suspected hacker attack,
the method used by the hacker, the IP address of the computer used by the hacker and
the number of attempts made.
F
IGURE
3-21.
Anti-Hacker Logs - Viewing Recent Suspected Hacker Attacks
Note:
Resetting GateLock will delete all Anti-Hacker Logs.
Содержание Gatelock X200
Страница 1: ......
Страница 2: ......
Страница 8: ...Trend Micro GateLock User s Guide iv...
Страница 18: ...Trend Micro GateLock User s Guide 1 10...
Страница 76: ...Trend Micro GateLock User s Guide 4 12...
Страница 90: ...Trend Micro GateLock User s Guide A 14...
Страница 94: ...Trend Micro GateLock User s Guide I 4...