Hp Compaq t5720 Thin Client Bedienungsanleitung Seite 3

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 76
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 2
Table of Contents
Preface...................................................................................................... ix
Related Documentation .......................................................................................................... ix
Intended Audience................................................................................................................... ix
Technical Support ..................................................................................................................... x
Chapter 1. Overview of the Agent ............................................................................. 1
Modifying the Security Policy.................................................................................................. 1
Using the Policy Editor....................................................................................................... 1
Chapter 2. Getting Around........................................................................................ 3
Starting the Agent ..................................................................................................................... 3
Navigating the Main Console.................................................................................................. 3
Menus and Toolbar Buttons .............................................................................................. 4
Traffic History Graphs ....................................................................................................... 4
Broadcast Traffic............................................................................................................ 5
Running Applications Field................................................................................................ 5
Message Console.................................................................................................................. 6
Status Bar .............................................................................................................................. 6
Using the Menus and the Toolbar.......................................................................................... 6
Toolbar Buttons...................................................................................................................8
Using the System Tray Icon..................................................................................................... 8
What the System Tray Icon Tells You.............................................................................. 8
What Does the Flashing System Tray Icon Mean?.......................................................10
The System Tray Icon Menu............................................................................................10
Enabling Password Protection..............................................................................................11
Chapter 3. Testing Your System’s Vulnerability..................................................... 13
Scanning Your System............................................................................................................13
Types of Scans.........................................................................................................................14
Quick Scans ........................................................................................................................14
Stealth Scans .......................................................................................................................14
Trojan Scans .......................................................................................................................14
TCP Scans...........................................................................................................................14
UDP Scans..........................................................................................................................14
ICMP Scans ........................................................................................................................15
Chapter 4. Working With Rules .............................................................................. 17
About Rules .............................................................................................................................17
Using Rules to Protect Your System....................................................................................17
Setting Up Advanced Rules ...................................................................................................17
General Tab .............................................................................................................................19
Rule Description ................................................................................................................19
Block this traffic.................................................................................................................19
Allow this traffic ................................................................................................................19
Apply Rule to Network Interface....................................................................................20
Apply this rule during Screensaver Mode ......................................................................20
Record this traffic in “Packet Log”.................................................................................20
iii
Seitenansicht 2
1 2 3 4 5 6 7 8 ... 75 76

Kommentare zu diesen Handbüchern

Keine Kommentare