Hp Compaq t5720 Thin Client Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computers Hp Compaq t5720 Thin Client herunter. HP Compaq t5720 Thin Client User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - User Guide

HP Sygate Security Agent 4.0 User Guide Documentation Build 1004 Published: May 1, 2005

Seite 2 - Copyright Information

HP Sygate Security Agent User Guide Technical Support HP provides a variety of service and support programs. To contact HP: 1. Locate the www.hp.c

Seite 3 - Table of Contents

Chapter 1. Overview of the Agent The HP Sygate Security Agent (the Agent) is security software that is installed on embedded devices, such as ATMs an

Seite 4

HP Sygate Security Agent User Guide When you install Policy Editor, the default policy file is automatically installed with it. When you open the Poli

Seite 5

Chapter 2. Getting Around This chapter describes the tools that you use in getting around in the Agent. Starting the Agent The Agent is designed to

Seite 6

HP Sygate Security Agent User Guide Figure 1. Main Console The Agent interface is resizable, so you can view it as a full-screen or part-screen ima

Seite 7 - List of Tables

Getting Around Figure 2. Traffic History Graph The Traffic History graphs are broken into three sections. On the left side of the graphs section ar

Seite 8 - List of Figures

HP Sygate Security Agent User Guide since they are often crucial to the operation of your device, you most likely want to allow them. To change the d

Seite 9 - Preface

Getting Around Table 1. Menus Menu Menu choices File • Close—Closes the Agent main console. • Exit Sygate Agent—Exits the Agent, effectively turni

Seite 10 - Technical Support

HP Sygate Security Agent User Guide Table 1. Menus Menu Menu choices • Connection Details—Provides further information on the type of connection be

Seite 11

Getting Around Table 2. System Tray Icon Colors If the color of the arrow is... ...then... RED ...traffic is being blocked by the Agent. BLUE ..

Seite 12

Copyright Information Copyright© 2003-2005 by Sygate Technologies, Inc. All rights reserved. No part of this document may be reproduced or transmitte

Seite 13 - Chapter 2. Getting Around

HP Sygate Security Agent User Guide Table 3. System Tray Icon Appearance Icon Description Both incoming and outgoing traffic are blocked. There

Seite 14 - Figure 1. Main Console

Getting Around Table 4. System Tray Icon Menu Menu Option Description HP Sygate Security Agent Opens the Agent’s main console. Block All Normal Blo

Seite 15

HP Sygate Security Agent User Guide 3. Enter your new password in the New Password and Confirm New Password fields. Note: You can disable password

Seite 16

Chapter 3. Testing Your System’s Vulnerability This chapter describes ways to test the vulnerability of your system to outside threats by scanning yo

Seite 17

HP Sygate Security Agent User Guide o UDP Scan o ICMP Scan 4. Click Scan Now. A brief document of frequently asked questions about Sygate Online S

Seite 18 - Using the System Tray Icon

Testing Your System's Vulnerability and proxies for users connecting to the web site through such a device. The scan takes about 10 minutes and s

Seite 19

HP Sygate Security Agent User Guide 16

Seite 20

Chapter 4. Working With Rules This chapter describes how to protect your system by creating security rules for applications that you have running on

Seite 21

HP Sygate Security Agent User Guide To set up an advanced rule: 1. On the Tools menu, click Advanced Rules. The Advanced Rules dialog box opens. 2.

Seite 22

Working With Rules Rules are applied in the order they are listed. For example, if a rule that blocks all traffic is listed first, followed by a rule

Seite 23 - Scanning Your System

Table of Contents Preface... ix Related Documentat

Seite 24 - Types of Scans

HP Sygate Security Agent User Guide Apply Rule to Network Interface Specifies which network interface card this rule will apply to. If you have multip

Seite 25

Working With Rules All addresses Applies rule to all addresses. MAC addresses Applies rule to the MAC address of the traffic. IP Address(es) Applies

Seite 26

HP Sygate Security Agent User Guide Protocol Specifies a protocol for the rule. All Protocols Applies to all protocols on all ports, for both incomi

Seite 27 - About Rules

Working With Rules all ports will be affected by the rule. If you enter a port number for the local port entry, but not for the remote port entry, the

Seite 28

HP Sygate Security Agent User Guide Enable Scheduling Enables the scheduling feature. During the period below Enables scheduling to take place during

Seite 29 - General Tab

Working With Rules Applications Tab You can specify applications that will be affected by advanced rules. The Applications tab provides a list of all

Seite 30 - Hosts Tab

HP Sygate Security Agent User Guide Browse Opens the Open dialog box so you can search for applications that are not displayed in the table. Rule Summ

Seite 31 - Ports and Protocols Tab

Chapter 5. Monitoring and Logging This chapter describes how you can monitor your system by using the logs that are present in the Agent. It begins w

Seite 32 - All Protocols

HP Sygate Security Agent User Guide Viewing Logs To view logs on the Agent: 1. Do one of the following: o Click Tools|Logs. o On the toolbar, clic

Seite 33 - Scheduling Tab

Monitoring and Logging Table 5. Security Log Icons Icon Description Critical attack Major attack Minor attack Information Security Log Parameter

Seite 34 - Excluding the period below

HP Sygate Security Agent User Guide Rule Summary field ...

Seite 35 - Applications Tab

HP Sygate Security Agent User Guide Table 6. Security Log Parameters and Description Name of Parameter Description MAC Application Name Name of the

Seite 36

Monitoring and Logging Icons for the Traffic Log When you open a Traffic Log, icons are displayed at the left side of the first column. They are graph

Seite 37 - Types of Logs

HP Sygate Security Agent User Guide Table 8. Traffic Log Parameters and Description Name of Parameter Description Local Port/ICMP Code Port and ICMP

Seite 38 - Security Log

Monitoring and Logging Packet Log The Packet Log captures every packet of data that enters or leaves a port on your device. The Packet Log is disable

Seite 39

HP Sygate Security Agent User Guide Packet Decode and Packet Dump for the Packet Log Below the Log Viewer are two additional data fields that provide

Seite 40 - Traffic Log

Monitoring and Logging Description and Data Fields for the System Log Below the rows of logged events are the Description and Data fields. When you cl

Seite 41 - Icons for the Traffic Log

HP Sygate Security Agent User Guide Back Tracing Logged Events Back tracing enables you to pinpoint the source of data from a logged event. Like retr

Seite 42

Monitoring and Logging The Trace route field provides details, such as IP address, on each hop made by the data packet that was logged by the Agent. A

Seite 43 - Packet Log

HP Sygate Security Agent User Guide To stop an active response: 1. On the main console, click Tools|Logs|Security. 2. Select the row for the applic

Seite 44 - System Log

Chapter 6. Configuring the Agent’s Settings You can set and import security options for the Agent, including e-mail notification of attacks, customiz

Seite 45 - Enabling and Clearing Logs

Table Of Contents System Log Parameters and Description...34 Description and Data Field

Seite 46 - Back Tracing Logged Events

HP Sygate Security Agent User Guide Automatically load HP Sygate Agent service at startup Automatically launches the Agent at startup. Block Network

Seite 47 - Stopping an Active Response

Configuring the Agent's Settings Hide application popup Hides a dialog box that appears when you open an application that has been modified since

Seite 48

HP Sygate Security Agent User Guide Network Interface Specifies the network you want to access. Allow to browse Network Neighborhood files and printer

Seite 49

Configuring the Agent's Settings analyzes network packets and compares them with both known attacks and known patterns of attack, and then blocks

Seite 50

HP Sygate Security Agent User Guide Automatically block attacker’s IP address for... second(s) Blocks all communication from a source host once an att

Seite 51 - Network Neighborhood Tab

Configuring the Agent's Settings Automatically allow all known DLLs Automatically allows DLL modules that are commonly loaded by the network appl

Seite 52 - Security Tab

HP Sygate Security Agent User Guide rule specifically allowing access to that server. By default, this option is disabled on the Agent. Anti-Applicati

Seite 53

Configuring the Agent's Settings The first three options set the frequency of the message. Do Not Notify Disables the e-mail notification option

Seite 54 - Allow initial traffic

HP Sygate Security Agent User Guide Cc: Specifies an e-mail address to send a courtesy copy of each email message. Subject: Describes the subject of t

Seite 55

Configuring the Agent's Settings Enable ... Log Enables the Security, Traffic, System, and Packet Logs. The Packet Log is not enabled by default

Seite 56 - E-Mail Notification Tab

HP Sygate Security Agent User Guide To: ...

Seite 57

HP Sygate Security Agent User Guide 50

Seite 58 - Log Tab

Glossary A access point: A network connection that allows a computer or user to connect to an enterprise network. Virtual Private Networks (VPNs), wi

Seite 59

HP Sygate Security Agent User Guide antivirus: Software and technology that is used to detect malicious computer applications, prevent them from infec

Seite 60

Glossary C client: A device or program that uses shared resources from another computer, called a server. In the context of the Agent, client refers t

Seite 61 - Glossary

HP Sygate Security Agent User Guide DLL fingerprint: A 128-bit number that is generated by performing an MD5 hash of an entire DLL packet. It is uniqu

Seite 62

Glossary F filtering logs: Viewing selected information from logged information. For example, a filter can be set up so that you can view only blocked

Seite 63

HP Sygate Security Agent User Guide icon: A small visual image displayed on a computer screen to represent an application, a command, an object, or to

Seite 64

Glossary Intrusion Prevention System (IPS): A device or software used to prevent intruders from accessing systems from malicious or suspicious activit

Seite 65

HP Sygate Security Agent User Guide logs: Files that store information generated by an application, service, or operating system. The information is u

Seite 66

Glossary O OS Fingerprint Masquerading: An option that keeps programs from detecting the operating system of a computer running the Agent. When OS Fin

Seite 67

Table Of Contents List of Tables Table 1. Menus...

Seite 68

HP Sygate Security Agent User Guide Profile Serial Number: A number that the Policy Editor automatically generates every time an Agent’s security poli

Seite 69

Glossary signature library: A set of IDS signatures. Sygate provides a library of known signatures in the System Library, which can be kept up-to-date

Seite 70

HP Sygate Security Agent User Guide spoofing: A technique used by an intruder to gain unauthorized network access to a computer system or network by f

Seite 71

Glossary System Library: A Sygate library containing preconfigured IDS signatures to help detect and prevent known attacks. System administrators can

Seite 72

HP Sygate Security Agent User Guide User Datagram Protocol (UDP): A communications protocol for the Internet network layer, transport layer, and sessi

Seite 73

Index A Active Response 37 advanced rules creating 17 defined 17 Agent configuring 39 opening 3 allowing traffic 17, 19 Applications tab 25 B blockin

Seite 74

HP Sygate Security Agent User Guide policy file 1 Ports and Protocols tab 21 protecting your system 13, 17, 39 S scanning your system 13 Scheduling ta

Seite 75

HP Sygate Security Agent User Guide List of Figures Figure 1. Main Console......

Seite 76

Preface This document, the HP Sygate Security Agent User Guide, describes how to distribute, install, and use the HP Sygate Standalone Agent (the Age

Kommentare zu diesen Handbüchern

Keine Kommentare