McAfee MIS70E001RCA User Guide - Page 53
Record Intrusion Detection IDS Events in Inbound Events Log, Outbound Only access.
UPC - 731944540689
View all McAfee MIS70E001RCA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 53 highlights
Setting the security level Tight Security - When an application requests a specific type of access to the Internet (for example, Outbound Only Access), you can allow or disallow the application an Internet connection. If the application later requests Full Access, you can then grant Full Access or restrict it to Outbound Only access. Standard Security (recommended) - When an application requests and then is granted Internet access, the application receives full Internet access to handle incoming and outgoing traffic. Trusting Security - All applications are automatically trusted when they first attempt to access the Internet. However, you can configure Personal Firewall to use alerts to notify you about new applications on your computer. Use this setting if you find that some games or streaming media do not work. Open - Your firewall is disabled. This setting allows all traffic through Personal Firewall, without filtering. NOTE Previously blocked applications continue to be blocked when the firewall is set to the Open or Lockdown security setting. To prevent this, you can either change the application's permissions to Allow Full Access or delete the Blocked permission rule from the Internet Applications list. 4 Select additional security settings: NOTE If your computer runs Windows XP and multiple XP users have been added, these options are available only if you are logged on to your computer as an administrator. Record Intrusion Detection (IDS) Events in Inbound Events Log - If you select this option, events detected by IDS will appear in the Inbound Events log. The Intrusion Detection System detects common attack types and other suspicious activity. Intrusion detection monitors every inbound and outbound data packet for suspicious data transfers or transfer methods. It compares these to a "signature" database and automatically drops the packets coming from the offending computer. IDS looks for specific traffic patterns used by attackers. IDS checks each packet that your machine receives to detect suspicious or known-attack traffic. For example, if Personal Firewall sees ICMP packets, it analyzes those packets for suspicious traffic patterns by comparing the ICMP traffic against known attack patterns. User Guide 53