Table Of Contents
System Log Parameters and Description
..................................................................
34
Description and Data Fields for the System Log
....................................................
35
Enabling and Clearing Logs
...................................................................................................
35
Back Tracing Logged Events
.................................................................................................
36
Saving Logs
..............................................................................................................................
37
Stopping an Active Response
................................................................................................
37
Chapter 6. Configuring the Agent’s Settings
..........................................................
39
General Tab
.............................................................................................................................
39
Automatically load HP Sygate Agent service at startup
...............................................
40
Block Network Neighborhood traffic while in screensaver mode
.............................
40
Hide all notification messages
..........................................................................................
40
Beep before notify
.............................................................................................................
40
Hide blocking notification
................................................................................................
40
Hide application popup
....................................................................................................
41
Set Password
.......................................................................................................................
41
Ask password while exiting
..............................................................................................
41
Network Neighborhood Tab
................................................................................................
41
Network Interface
.............................................................................................................
42
Allow to browse Network Neighborhood files and printer(s)
....................................
42
Allow others to share my files and printer(s)
.................................................................
42
Security Tab
.............................................................................................................................
42
Enable Intrusion Prevention System
..............................................................................
42
Enable port scan detection
...............................................................................................
43
Enable driver level protection
..........................................................................................
43
Enable stealth mode browsing
.........................................................................................
43
Enable DoS detection
.......................................................................................................
43
Block Universal Plug and Play Traffic
............................................................................
43
Automatically block attacker’s IP address for... second(s)
..........................................
44
Block all traffic while the service is not loaded
.............................................................
44
Allow initial traffic
........................................................................................................
44
Enable DLL authentication
..............................................................................................
44
Reset all fingerprints for all applications
........................................................................
44
Automatically allow all known DLLs
........................................................................
45
Enable anti-MAC spoofing
..............................................................................................
45
Enable anti-IP spoofing
....................................................................................................
45
Enable OS fingerprint masquerading
.............................................................................
45
NetBIOS protection
..........................................................................................................
45
Anti-Application Hijacking
..............................................................................................
46
Allow Token Ring Traffic
................................................................................................
46
Enable smart DNS
............................................................................................................
46
Enable smart DHCP
.........................................................................................................
46
Enable smart WINS
..........................................................................................................
46
E-Mail Notification Tab
.........................................................................................................
46
Do Not Notify
...................................................................................................................
47
Notify Immediately
............................................................................................................
47
After Every . . .
Minutes
..................................................................................................
47
From:
..............................................................................................................................
47
v