HP t5710 HP Sygate Security Agent User Guide - Page 5

Configuring the Agent's Settings, Description and Data Fields for the System Log - drivers

Page 5 highlights

Table Of Contents System Log Parameters and Description 34 Description and Data Fields for the System Log 35 Enabling and Clearing Logs 35 Back Tracing Logged Events 36 Saving Logs ...37 Stopping an Active Response 37 Chapter 6. Configuring the Agent's Settings 39 General Tab ...39 Automatically load HP Sygate Agent service at startup 40 Block Network Neighborhood traffic while in screensaver mode 40 Hide all notification messages 40 Beep before notify ...40 Hide blocking notification 40 Hide application popup ...41 Set Password...41 Ask password while exiting 41 Network Neighborhood Tab 41 Network Interface ...42 Allow to browse Network Neighborhood files and printer(s 42 Allow others to share my files and printer(s 42 Security Tab ...42 Enable Intrusion Prevention System 42 Enable port scan detection 43 Enable driver level protection 43 Enable stealth mode browsing 43 Enable DoS detection ...43 Block Universal Plug and Play Traffic 43 Automatically block attacker's IP address for... second(s 44 Block all traffic while the service is not loaded 44 Allow initial traffic...44 Enable DLL authentication 44 Reset all fingerprints for all applications 44 Automatically allow all known DLLs 45 Enable anti-MAC spoofing 45 Enable anti-IP spoofing...45 Enable OS fingerprint masquerading 45 NetBIOS protection...45 Anti-Application Hijacking 46 Allow Token Ring Traffic 46 Enable smart DNS ...46 Enable smart DHCP ...46 Enable smart WINS ...46 E-Mail Notification Tab...46 Do Not Notify ...47 Notify Immediately...47 After Every . . . Minutes 47 From:...47 v

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

Table Of Contents
System Log Parameters and Description
..................................................................
34
Description and Data Fields for the System Log
....................................................
35
Enabling and Clearing Logs
...................................................................................................
35
Back Tracing Logged Events
.................................................................................................
36
Saving Logs
..............................................................................................................................
37
Stopping an Active Response
................................................................................................
37
Chapter 6. Configuring the Agent’s Settings
..........................................................
39
General Tab
.............................................................................................................................
39
Automatically load HP Sygate Agent service at startup
...............................................
40
Block Network Neighborhood traffic while in screensaver mode
.............................
40
Hide all notification messages
..........................................................................................
40
Beep before notify
.............................................................................................................
40
Hide blocking notification
................................................................................................
40
Hide application popup
....................................................................................................
41
Set Password
.......................................................................................................................
41
Ask password while exiting
..............................................................................................
41
Network Neighborhood Tab
................................................................................................
41
Network Interface
.............................................................................................................
42
Allow to browse Network Neighborhood files and printer(s)
....................................
42
Allow others to share my files and printer(s)
.................................................................
42
Security Tab
.............................................................................................................................
42
Enable Intrusion Prevention System
..............................................................................
42
Enable port scan detection
...............................................................................................
43
Enable driver level protection
..........................................................................................
43
Enable stealth mode browsing
.........................................................................................
43
Enable DoS detection
.......................................................................................................
43
Block Universal Plug and Play Traffic
............................................................................
43
Automatically block attacker’s IP address for... second(s)
..........................................
44
Block all traffic while the service is not loaded
.............................................................
44
Allow initial traffic
........................................................................................................
44
Enable DLL authentication
..............................................................................................
44
Reset all fingerprints for all applications
........................................................................
44
Automatically allow all known DLLs
........................................................................
45
Enable anti-MAC spoofing
..............................................................................................
45
Enable anti-IP spoofing
....................................................................................................
45
Enable OS fingerprint masquerading
.............................................................................
45
NetBIOS protection
..........................................................................................................
45
Anti-Application Hijacking
..............................................................................................
46
Allow Token Ring Traffic
................................................................................................
46
Enable smart DNS
............................................................................................................
46
Enable smart DHCP
.........................................................................................................
46
Enable smart WINS
..........................................................................................................
46
E-Mail Notification Tab
.........................................................................................................
46
Do Not Notify
...................................................................................................................
47
Notify Immediately
............................................................................................................
47
After Every . . .
Minutes
..................................................................................................
47
From:
..............................................................................................................................
47
v