HP T5700 HP Sygate Security Agent User Guide - Page 3

Table of Contents, Preface - flash

Page 3 highlights

Table of Contents Preface ...ix Related Documentation ...ix Intended Audience...ix Technical Support ...x Chapter 1. Overview of the Agent 1 Modifying the Security Policy 1 Using the Policy Editor...1 Chapter 2. Getting Around 3 Starting the Agent ...3 Navigating the Main Console 3 Menus and Toolbar Buttons 4 Traffic History Graphs ...4 Broadcast Traffic ...5 Running Applications Field 5 Message Console...6 Status Bar ...6 Using the Menus and the Toolbar 6 Toolbar Buttons...8 Using the System Tray Icon...8 What the System Tray Icon Tells You 8 What Does the Flashing System Tray Icon Mean 10 The System Tray Icon Menu 10 Enabling Password Protection 11 Chapter 3. Testing Your System's Vulnerability 13 Scanning Your System...13 Types of Scans ...14 Quick Scans ...14 Stealth Scans ...14 Trojan Scans ...14 TCP Scans...14 UDP Scans...14 ICMP Scans ...15 Chapter 4. Working With Rules 17 About Rules ...17 Using Rules to Protect Your System 17 Setting Up Advanced Rules 17 General Tab ...19 Rule Description ...19 Block this traffic...19 Allow this traffic ...19 Apply Rule to Network Interface 20 Apply this rule during Screensaver Mode 20 Record this traffic in "Packet Log 20 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

Table of Contents
Preface
......................................................................................................
ix
Related Documentation
..........................................................................................................
ix
Intended Audience
...................................................................................................................
ix
Technical Support
.....................................................................................................................
x
Chapter 1. Overview of the Agent
.............................................................................
1
Modifying the Security Policy
..................................................................................................
1
Using the Policy Editor
.......................................................................................................
1
Chapter 2. Getting Around
........................................................................................
3
Starting the Agent
.....................................................................................................................
3
Navigating the Main Console
..................................................................................................
3
Menus and Toolbar Buttons
..............................................................................................
4
Traffic History Graphs
.......................................................................................................
4
Broadcast Traffic
............................................................................................................
5
Running Applications Field
................................................................................................
5
Message Console
..................................................................................................................
6
Status Bar
..............................................................................................................................
6
Using the Menus and the Toolbar
..........................................................................................
6
Toolbar Buttons
...................................................................................................................
8
Using the System Tray Icon
.....................................................................................................
8
What the System Tray Icon Tells You
..............................................................................
8
What Does the Flashing System Tray Icon Mean?
.......................................................
10
The System Tray Icon Menu
............................................................................................
10
Enabling Password Protection
..............................................................................................
11
Chapter 3. Testing Your System’s Vulnerability
.....................................................
13
Scanning Your System
............................................................................................................
13
Types of Scans
.........................................................................................................................
14
Quick Scans
........................................................................................................................
14
Stealth Scans
.......................................................................................................................
14
Trojan Scans
.......................................................................................................................
14
TCP Scans
...........................................................................................................................
14
UDP Scans
..........................................................................................................................
14
ICMP Scans
........................................................................................................................
15
Chapter 4. Working With Rules
..............................................................................
17
About Rules
.............................................................................................................................
17
Using Rules to Protect Your System
....................................................................................
17
Setting Up Advanced Rules
...................................................................................................
17
General Tab
.............................................................................................................................
19
Rule Description
................................................................................................................
19
Block this traffic
.................................................................................................................
19
Allow this traffic
................................................................................................................
19
Apply Rule to Network Interface
....................................................................................
20
Apply this rule during Screensaver Mode
......................................................................
20
Record this traffic in “Packet Log”
.................................................................................
20
iii