Table of Contents
Preface
......................................................................................................
ix
Related Documentation
..........................................................................................................
ix
Intended Audience
...................................................................................................................
ix
Technical Support
.....................................................................................................................
x
Chapter 1. Overview of the Agent
.............................................................................
1
Modifying the Security Policy
..................................................................................................
1
Using the Policy Editor
.......................................................................................................
1
Chapter 2. Getting Around
........................................................................................
3
Starting the Agent
.....................................................................................................................
3
Navigating the Main Console
..................................................................................................
3
Menus and Toolbar Buttons
..............................................................................................
4
Traffic History Graphs
.......................................................................................................
4
Broadcast Traffic
............................................................................................................
5
Running Applications Field
................................................................................................
5
Message Console
..................................................................................................................
6
Status Bar
..............................................................................................................................
6
Using the Menus and the Toolbar
..........................................................................................
6
Toolbar Buttons
...................................................................................................................
8
Using the System Tray Icon
.....................................................................................................
8
What the System Tray Icon Tells You
..............................................................................
8
What Does the Flashing System Tray Icon Mean?
.......................................................
10
The System Tray Icon Menu
............................................................................................
10
Enabling Password Protection
..............................................................................................
11
Chapter 3. Testing Your System’s Vulnerability
.....................................................
13
Scanning Your System
............................................................................................................
13
Types of Scans
.........................................................................................................................
14
Quick Scans
........................................................................................................................
14
Stealth Scans
.......................................................................................................................
14
Trojan Scans
.......................................................................................................................
14
TCP Scans
...........................................................................................................................
14
UDP Scans
..........................................................................................................................
14
ICMP Scans
........................................................................................................................
15
Chapter 4. Working With Rules
..............................................................................
17
About Rules
.............................................................................................................................
17
Using Rules to Protect Your System
....................................................................................
17
Setting Up Advanced Rules
...................................................................................................
17
General Tab
.............................................................................................................................
19
Rule Description
................................................................................................................
19
Block this traffic
.................................................................................................................
19
Allow this traffic
................................................................................................................
19
Apply Rule to Network Interface
....................................................................................
20
Apply this rule during Screensaver Mode
......................................................................
20
Record this traffic in “Packet Log”
.................................................................................
20
iii